2018 International Electronics Symposium on Engineering Technology and Applications (IES-ETA) 2018
DOI: 10.1109/elecsym.2018.8615549
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sharing Scheme using Identity-based Encryption for e-Health Record

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 5 publications
0
1
0
1
Order By: Relevance
“…Another advantage is that the identity used can be any string such as name, email, telephone number, etc. In general, IBE is a scheme that has 4 stages, namely Setup, Encrypt, Extract and Decrypt [15]. To be clearer, Figure 1 shows the whole process of the IBE scheme.…”
Section: Identity-based Encryption (Ibe)mentioning
confidence: 99%
“…Another advantage is that the identity used can be any string such as name, email, telephone number, etc. In general, IBE is a scheme that has 4 stages, namely Setup, Encrypt, Extract and Decrypt [15]. To be clearer, Figure 1 shows the whole process of the IBE scheme.…”
Section: Identity-based Encryption (Ibe)mentioning
confidence: 99%
“…Telah banyak para peneliti yang membahas tentang data rekam medis dengan tujuan untuk mengamankan isi dari data tersebut. Umumnya untuk mengamankan sebuah data rekam medis digunakan teknik kriptografi baik dengan algoritma simetris [3][4][5], asimetris [6][7][8][9][10][11] maupun kombinasi dari keduanya [12][13]. Adapun terdapat empat aspek pada kriptografi untuk menjamin sebuah informasi terlindungi dengan aman yaitu Confidentiality, Integrity, Authentication, dan Non-Repudiation.…”
Section: Pendahuluanunclassified