Cloud centric authentication for wearable healthcare monitoring system
Security and privacy are the major concerns in cloud computing as users have limited
access on the stored data at the remote locations managed by different service providers …
access on the stored data at the remote locations managed by different service providers …
[图书][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
Secure integration of asymmetric and symmetric encryption schemes
E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
Probabilistic public key encryption with equality test
We present a (probabilistic) public key encryption (PKE) scheme such that when being
implemented in a bilinear group, anyone is able to check whether two ciphertexts are …
implemented in a bilinear group, anyone is able to check whether two ciphertexts are …
Tightly secure signatures and public-key encryption
D Hofheinz, T Jager - Designs, Codes and Cryptography, 2016 - Springer
We construct the first public-key encryption (PKE) scheme whose chosen-ciphertext (ie, IND-
CCA) security can be proved under a standard assumption and does not degrade in either …
CCA) security can be proved under a standard assumption and does not degrade in either …
Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …
Strongly secure authenticated key exchange from factoring, codes, and lattices
An unresolved problem in research on authenticated key exchange (AKE) in the public-key
setting is to construct a secure protocol against advanced attacks such as key compromise …
setting is to construct a secure protocol against advanced attacks such as key compromise …
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem
M Shuai, L Xiong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …
on solving special requirements in industrial applications. In IIoT environments, remote …
Non-interactive key exchange
Non-interactive key exchange (NIKE) is a fundamental but much-overlooked cryptographic
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …
primitive. It appears as a major contribution in the ground-breaking paper of Diffie and …
Programmable hash functions and their applications
D Hofheinz, E Kiltz - Advances in Cryptology–CRYPTO 2008: 28th Annual …, 2008 - Springer
We introduce a new information-theoretic primitive called programmable hash functions
(PHFs). PHFs can be used to program the output of a hash function such that it contains …
(PHFs). PHFs can be used to program the output of a hash function such that it contains …