2017
DOI: 10.1007/s11280-017-0475-8
|View full text |Cite
|
Sign up to set email alerts
|

Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…Many researchers have designed blockchain-aided IoT systems in order to improve the performance of traditional IoT architecture. Rahulamathavan et al combined the merits of attribute-based encryption (ABE) [9][10][11] and blockchain to improve the privacy of IoT systems. 12 They also proved that the calculation cost is acceptable on IoT terminal devices.…”
Section: Blockchain-based Iot Systemsmentioning
confidence: 99%
“…Many researchers have designed blockchain-aided IoT systems in order to improve the performance of traditional IoT architecture. Rahulamathavan et al combined the merits of attribute-based encryption (ABE) [9][10][11] and blockchain to improve the privacy of IoT systems. 12 They also proved that the calculation cost is acceptable on IoT terminal devices.…”
Section: Blockchain-based Iot Systemsmentioning
confidence: 99%
“…The algorithm is emulating the real attack environment to . Therefore, returns with probability at minimum: (5) By combining Equations (5) and (6), we have (6) The proof of Theorem 6.2.1 is completed.…”
Section: Pke-et-hs-ibcmentioning
confidence: 91%
“…Cloud computing offers a virtualized resource pool that uses distributed storage, where the immense data can be accessed with virtual applications over the internet on user demand. However, the knowledge that the cloud server is many times regarded as untrusted raises concerns by users [4] [5]. It would be difficult for users to consider storing data that is sensitive to the cloud server.…”
Section: Introductionmentioning
confidence: 99%
“…The data will be stored in the cloud in encrypted form and will not be accessible to any third party as long as the original key is not exposed. Hong and Sun 32 proposed a key separation ABPRE scheme is for the IoT scenario. By using attribute‐based encryption on encrypted data and adopting a key insulation mechanism to provide forward security for users' reencryption keys and private keys, safe and fine‐grained data sharing is achieved, and the security level during data reencryption is improved .…”
Section: Related Researchesmentioning
confidence: 99%