Enabling identity-based authorized encrypted diagnostic data sharing for cloud-assisted E-health information systems
Tài liệu tham khảo
Lee, 2011, Challenges and research directions in medical cyber-physical systems, 75
Ullah, 2012, A comprehensive survey of wireless body area networks, J Med Syst, 36, 1065, 10.1007/s10916-010-9571-3
Singh, 2013, A view of cloud computing, Commun ACM, 4, 50
Zhang, 2015, Health-CPS: healthcare cyber-physical system assisted by cloud and big data, IEEE Syst J, 11, 88, 10.1109/JSYST.2015.2460747
Zhang, 2018, Healthdep: an efficient and secure deduplication scheme for cloud-assisted ehealth systems, IEEE Trans Ind Inf, 14, 4101, 10.1109/TII.2018.2832251
Zhang, 2019, Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems, Pervasive Mob Comput, 56, 18, 10.1016/j.pmcj.2019.03.004
Sun, 2009, Cross-domain data sharing in distributed electronic health record systems, IEEE Trans Parallel Distrib Syst, 21, 754
Boneh, 2004, Public key encryption with keyword search, 506
Chen, 2015, Dual-server public-key encryption with keyword search for secure cloud storage, IEEE Trans Inf Forensics Secur, 11, 789, 10.1109/TIFS.2015.2510822
Chen, 2016, Server-aided public key encryption with keyword search, vol. 11, 2833
Shamir, 1984, Identity-based cryptosystems and signature schemes, 47
Yau, 2008, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, 100
Huang, 2017, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Inf Sci (Ny), 403, 1, 10.1016/j.ins.2017.03.038
Zhang, 2016, Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation, IEEE Trans Inf Forensics Secur, 12, 676, 10.1109/TIFS.2016.2631951
Zhang, 2019, Identity-based key-exposure resilient cloud storage public auditing scheme from lattices, Inf Sci (Ny), 472, 223, 10.1016/j.ins.2018.09.013
Zhang, 2019, Blockchain-based public integrity verification for cloud storage against procrastinating auditors, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2908400
Zhang, 2019, CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2927219
Liu, 2016, Efficient and privacy-preserving outsourced calculation of rational numbers, IEEE Trans Dependable Secure Comput, 15, 27, 10.1109/TDSC.2016.2536601
Zhang, 2017, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Inf Sci (Ny), 379, 42, 10.1016/j.ins.2016.04.015
Fu, 2018, Large universe attribute based access control with efficient decryption in cloud storage system, Journal of Systems and Software, 135, 157, 10.1016/j.jss.2017.10.020
Cheng, 2019, Person re-identification over encrypted outsourced surveillance videos
Zhang, 2020, Chronos+: an accurate blockchain-based time-stamping scheme for cloud storage, IEEE Trans Serv Comput, 13, 216
Zhang, 2020, PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage
Nagasubramanian, 2020, Securing e-health records using keyless signature infrastructure blockchain technology in the cloud, Neural Computing and Applications, 32, 639, 10.1007/s00521-018-3915-1
Kim, 2018, Blockchain-based edge computing for deep neural network applications, 53
Bashir, 2019, Secure framework for internet of things based e-health system, International Journal of E-Health and Medical Communications, 10, 16, 10.4018/IJEHMC.2019100102
Devarajan, 2019, Fog-assisted personalized healthcare-support system for remote patients with diabetes, J Ambient Intell Humaniz Comput, 10, 3747, 10.1007/s12652-019-01291-5
Song, 2000, Practical techniques for searches on encrypted data, 44
Baek, 2008, Public key encryption with keyword search revisited, 1249
Byun, 2006, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, 75
Rhee, 2010, Trapdoor security in a searchable public-key encryption scheme with a designated tester, Journal of Systems and Software, 83, 763, 10.1016/j.jss.2009.11.726
Rhee, 2012, Generic construction of designated tester public-key encryption with keyword search, Inf Sci (Ny), 205, 93, 10.1016/j.ins.2012.03.020
Fang, 2013, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Inf Sci (Ny), 238, 221, 10.1016/j.ins.2013.03.008
Shao, 2010, Proxy re-encryption with keyword search, Inf Sci (Ny), 180, 2576, 10.1016/j.ins.2010.03.026
Fang, 2012, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Theor Comput Sci, 462, 39, 10.1016/j.tcs.2012.08.017
Zheng, 2015, CLKS: Certificateless keyword search on encrypted data, 239
Ma, 2017, Certificateless searchable public key encryption scheme for industrial internet of things, IEEE Trans Ind Inf, 14, 759, 10.1109/TII.2017.2703922
Ma, 2018, Certificateless searchable public key encryption scheme for mobile healthcare system, Computers & Electrical Engineering, 65, 413, 10.1016/j.compeleceng.2017.05.014
Miao, 2017, VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings, Pervasive Mob Comput, 40, 205, 10.1016/j.pmcj.2017.06.016
Zhang, 2019, FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things, IEEE Trans Dependable Secure Comput, 10.1109/TDSC.2019.2914117
Zhang, 2019, Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2944367
Sultan, 2019, Authorized keyword search over outsourced encrypted data in cloud environment, IEEE Trans Cloud Comput, 10.1109/TCC.2019.2931896
Islam, 2017, Design of a certificateless designated server based searchable public key encryption scheme, 3
Wu, 2019, Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things, Ann Telecommun, 74, 423, 10.1007/s12243-018-00701-7
Pakniat, 2019, Designated tester certificateless encryption with keyword search, Journal of Information Security and Applications, 49, 102394, 10.1016/j.jisa.2019.102394
Xu, 2012, Public-key encryption with fuzzy keyword search: aprovably secure scheme under keyword guessing attack, IEEE Trans Comput, 62, 2266, 10.1109/TC.2012.215
Li, 2015, An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, Nonlinear Dyn, 80, 1601, 10.1007/s11071-015-1965-9
Noroozi, 2018, Comments on a chaos-based public key encryption with keyword search scheme, Nonlinear Dyn, 94, 1127, 10.1007/s11071-018-4413-9
Noroozi, 2018, Public key authenticated encryption with keyword search: revisited, IET Inf Secur, 13, 336, 10.1049/iet-ifs.2018.5315
He, 2017, Certificateless public key authenticated encryption with keyword search for industrial internet of things, IEEE Trans Ind Inf, 14, 3618, 10.1109/TII.2017.2771382
Wu, 2014, Efficient searchable ID-based encryption with a designated server, Ann Telecommun, 69, 391, 10.1007/s12243-013-0398-z
Lu, 2017, Efficient designated server identity-based encryption with conjunctive keyword search, Ann Telecommun, 72, 359, 10.1007/s12243-017-0574-7
Noroozi, 2018, Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved, Ann Telecommun, 73, 769, 10.1007/s12243-018-0653-4
Li, 2019, Designated-server identity-based authenticated encryption with keyword search for encrypted emails, Inf Sci (Ny), 481, 330, 10.1016/j.ins.2019.01.004
Zhang, 2019, Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage, Inf Sci (Ny), 494, 193, 10.1016/j.ins.2019.04.051