Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
From MaRDI portal
Publication:6191626
DOI10.1016/j.ins.2022.05.007OpenAlexW4229034507WikidataQ114848372 ScholiaQ114848372MaRDI QIDQ6191626
No author found.
Publication date: 7 March 2024
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2022.05.007
identity-based proxy re-encryptioncryptographic reverse firewallexfiltration-resistantwireless body area networks
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Proxy re-encryption with keyword search
- Anonymous attestation with subverted TPMs
- Mobile access and flexible search over encrypted cloud data in heterogeneous systems
- Efficient attribute-based encryption with attribute revocation for assured data deletion
- Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- PRTA: a proxy re-encryption based trusted authorization scheme for nodes on CloudIoT
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
- Security of Symmetric Encryption against Mass Surveillance
- Cliptography: Clipping the Power of Kleptographic Attacks
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
- Fully Secure Unidirectional Identity-Based Proxy Re-encryption
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Proxy Re-encryption
- Proxy Re-encryption from Lattices
This page was built for publication: Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks