2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2018
DOI: 10.1109/waina.2018.00146
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Privacy in a Cloud-Based Health Information System by Means of Fuzzy Conditional Identity-Based Proxy Re-encryption (FCI-PRE)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…The improved encrypted version of proxy scheme called Fuzzy based Conditional Identity (FCI), in which exchange of medical data in a privacy-preserving where keys are extracted from user's biometric measures. The content of medical data transactions kept in privacy and consensus efficiency by using blockchain-based medical data storage platform [38]. The ring signature scheme is adopted the elliptic curve model to enhance a privacy medical data storage protocol in user's identity privacy and protection of medical data.…”
Section: Related Workmentioning
confidence: 99%
“…The improved encrypted version of proxy scheme called Fuzzy based Conditional Identity (FCI), in which exchange of medical data in a privacy-preserving where keys are extracted from user's biometric measures. The content of medical data transactions kept in privacy and consensus efficiency by using blockchain-based medical data storage platform [38]. The ring signature scheme is adopted the elliptic curve model to enhance a privacy medical data storage protocol in user's identity privacy and protection of medical data.…”
Section: Related Workmentioning
confidence: 99%
“…e purpose is to solve the problem of fine-grained access control of data in the cloud storage environment, the problem of large-scale user dynamic expansion [25]. ABE is essentially an asymmetric encryption technology, but it uses one-to-many encryption.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Cloud verification system: It is the core of the entire encryption system and exists in the cloud server [10] of the system. This system mainly provides employee authentication, key distribution, data storage and management, information transmission, logistics tracking and other functions.…”
Section: Privacy Information Encryption System Based Onmentioning
confidence: 99%