Cloud centric authentication for wearable healthcare monitoring system

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Security and privacy are the major concerns in cloud computing as users have limited
access on the stored data at the remote locations managed by different service providers …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

Secure integration of asymmetric and symmetric encryption schemes

E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …

Probabilistic public key encryption with equality test

G Yang, CH Tan, Q Huang, DS Wong - … in Cryptology-CT-RSA 2010: The …, 2010 - Springer
We present a (probabilistic) public key encryption (PKE) scheme such that when being
implemented in a bilinear group, anyone is able to check whether two ciphertexts are …

Tightly secure signatures and public-key encryption

D Hofheinz, T Jager - Designs, Codes and Cryptography, 2016 - Springer
We construct the first public-key encryption (PKE) scheme whose chosen-ciphertext (ie, IND-
CCA) security can be proved under a standard assumption and does not degrade in either …

Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts

V Odelu, AK Das, MK Khan, KKR Choo, M Jo - IEEE Access, 2017 - ieeexplore.ieee.org
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …

Strongly secure authenticated key exchange from factoring, codes, and lattices

A Fujioka, K Suzuki, K Xagawa… - Designs, Codes and …, 2015 - Springer
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

M Shuai, L Xiong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …

Non-interactive key exchange

ESV Freire, D Hofheinz, E Kiltz, KG Paterson - Public-Key Cryptography …, 2013 - Springer
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …

Programmable hash functions and their applications

D Hofheinz, E Kiltz - Advances in Cryptology–CRYPTO 2008: 28th Annual …, 2008 - Springer
We introduce a new information-theoretic primitive called programmable hash functions
(PHFs). PHFs can be used to program the output of a hash function such that it contains …