2020
DOI: 10.1016/j.ins.2019.01.051
|View full text |Cite
|
Sign up to set email alerts
|

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT

Abstract: In CloudIoT platform, the data is collected and shared by different nodes of Internet of Things(IoT), and data is processed and stored based on cloud servers.It has increased the abilities of IoT on information computation. Meanwhile, it also has enriched the resource in cloud and improved integration of the Internet and human world. All of this offer advantages as well as the new challenges of information security and privacy protection. As the energy limitation of the nodes in IoT, they are particularly vuln… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 31 publications
(58 reference statements)
1
9
0
Order By: Relevance
“…OTRE scheme has low computational cost for ReKeyGen and ReEnc algorithm than all mentioned schemes in table 3. OTRE Dec algorithm computational cost is higher than KRE scheme and almost as same as Su et al's [37]. So, the proposed OTRE scheme has higher overall computational cost than proposed KRE scheme due to providing receiver data privacy needed in between patient and research station but proposed OTRE scheme has lower overall computational cost than Xu et al's [32], Huang et al' [33], Sur et al's [34], Lu et al's [35] and Deng et al's [36] and almost same overall computational cost as Su et al's [37].…”
Section: Resultssupporting
confidence: 57%
“…OTRE scheme has low computational cost for ReKeyGen and ReEnc algorithm than all mentioned schemes in table 3. OTRE Dec algorithm computational cost is higher than KRE scheme and almost as same as Su et al's [37]. So, the proposed OTRE scheme has higher overall computational cost than proposed KRE scheme due to providing receiver data privacy needed in between patient and research station but proposed OTRE scheme has lower overall computational cost than Xu et al's [32], Huang et al' [33], Sur et al's [34], Lu et al's [35] and Deng et al's [36] and almost same overall computational cost as Su et al's [37].…”
Section: Resultssupporting
confidence: 57%
“…The true identity information of voters is hidden and the voter is able to vote anonymously. This cost is considerably lower than latest PRE schemes [37,40,41,42,43] and marginally higher than the some of classic PRE schemes for the better security and data integrity. For the communication cost of or original lengthen and transformed lengthen, our scheme does not bear paring communication cost in ciphertext and the slight high cost in the element in is to verify the data integrity.…”
Section: Efficiency Comparisonmentioning
confidence: 90%
“…In addition, to further analyze the advantage of our encryption schemes in the e-voting system, some applied in voting system encryption schemes [37][38][39] are also compared. Meantime, the latest proxy re-encryption schemes [40][41][42][43] are also compared to further justify that the results of our proposed research are better. From the compared result in level)" due to the demand for the voting system.…”
Section: Efficiency Comparisonmentioning
confidence: 90%
See 2 more Smart Citations