Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Tung-Tso Tsai"'
Publikováno v:
IEEE Access, Vol 12, Pp 143392-143400 (2024)
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information
Externí odkaz:
https://doaj.org/article/c69d71de1aa040eca79904808092d300
Publikováno v:
IEEE Access, Vol 12, Pp 28155-28168 (2024)
By side-channel attacks, a fraction part of secret keys used in cryptographic schemes could be leaked to adversaries. Recently, adversaries have realized practical side-channel attacks so that these existing cryptographic schemes could be broken. Ind
Externí odkaz:
https://doaj.org/article/3e263ab80042440fa0c889bc161900bd
Publikováno v:
IEEE Access, Vol 11, Pp 54448-54461 (2023)
Signature can be used to verify the integrity of both a message and the identity of a signer, whereas encryption can be used to ensure the confidentiality of a message. In the past, cryptography researchers have studied and proposed numerous certific
Externí odkaz:
https://doaj.org/article/97c9c84895f24d44b6617f0670e44606
Publikováno v:
IEEE Access, Vol 11, Pp 51617-51630 (2023)
Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key infrastructur
Externí odkaz:
https://doaj.org/article/e21b773827664d139ef9f7bba55785af
Publikováno v:
Mathematical Biosciences and Engineering, Vol 19, Iss 11, Pp 11367-11379 (2022)
In the era of cloud computing, the technique of access control is vital to protect the confidentiality and integrity of cloud data. From the perspective of servers, they should only allow authenticated clients to gain the access of data. Specifically
Externí odkaz:
https://doaj.org/article/e12fa9c2ae7e48b590570f3930d59101
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 3, Pp 137-148 (2022)
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity-based public key systems. In the past, many authenticated key exchange (A
Externí odkaz:
https://doaj.org/article/bea595618c8f484c81bd00ad549b2d05
Publikováno v:
IEEE Access, Vol 10, Pp 104636-104648 (2022)
A multi-recipient signcryption (MRSC) scheme possesses the functionalities of both multi-recipient public-key encryption and digital signature to ensure both integrity and confidentiality of transmitted messages. Moreover, an anonymous MRSC (AMRSC) s
Externí odkaz:
https://doaj.org/article/3879beb749644a6990ee30874686ec29
Publikováno v:
Sensors, Vol 23, Iss 5, p 2706 (2023)
In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will f
Externí odkaz:
https://doaj.org/article/4946930596d2480fa40e65c34ca2c353
Publikováno v:
IEEE Access, Vol 9, Pp 128633-128647 (2021)
Establishing a session key (SSK) is very important for real-world deployment in open networks, which enables secure communication between remote parties. In the past, some authenticated key exchange (AKE) protocols have been proposed to generate a SS
Externí odkaz:
https://doaj.org/article/367521a16f054160a347ba21dd465347
Publikováno v:
IEEE Open Journal of the Computer Society, Vol 1, Pp 131-144 (2020)
In the past, the security of most public-key encryption or key encapsulation schemes is shown in an ideal model, where private keys, secret keys and random values are assumed to be absolutely secure to adversaries. However, this ideal model is not pr
Externí odkaz:
https://doaj.org/article/4f1f20362dcd4b6c9e9cc9098a7ab53b