메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2730-2735

Multiparty privacy protection for electronic health records

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; HOSPITAL DATA PROCESSING; PERSONAL COMPUTING; PUBLIC KEY CRYPTOGRAPHY; RECORDS MANAGEMENT;

EID: 84904119074     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2013.6831487     Document Type: Conference Paper
Times cited : (22)

References (17)
  • 1
    • 85184300816 scopus 로고    scopus 로고
    • Securing electronic medical records using attribute-based encryption on mobile devices
    • October 17, Chicago, Illinois, USA
    • J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. J. Peterson, and A. D. Rubin. Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices. SPSM'11, October 17, 2011, Chicago, Illinois, USA.
    • (2011) SPSM'11
    • Akinyele, J.A.1    Lehmann, C.U.2    Green, M.D.3    Pagano, M.W.4    Peterson, Z.N.J.5    Rubin, A.D.6
  • 4
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, 31: 469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In ACM CCS'06, pp. 89-98, 2006.
    • (2006) ACM CCS'06 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 8
    • 80755167409 scopus 로고    scopus 로고
    • Mediated ciphertext-policy attribute-based encryption and its application
    • L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker. Mediated ciphertext-policy attribute-based encryption and its application. In WISA, 2009.
    • (2009) WISA
    • Ibraimi, L.1    Petkovic, M.2    Nikova, S.3    Hartel, P.4    Jonker, W.5
  • 9
    • 0002920278 scopus 로고    scopus 로고
    • Mix and match: Secure function evaluation via ciphertexts
    • M. Jakobsson, A. Juels, Mix and match: secure function evaluation via ciphertexts, in: Proceedings of the Asiacrypt'00, 2000, pp. 162177.
    • (2000) Proceedings of the Asiacrypt'00 , pp. 162177
    • Jakobsson, M.1    Juels, A.2
  • 10
    • 84864536476 scopus 로고    scopus 로고
    • Unbounded hibe and attribute-based encryption
    • A. B. Lewko and B. Waters. Unbounded hibe and attribute-based encryption. In EUROCRYPT, 2011.
    • (2011) EUROCRYPT
    • Lewko, A.B.1    Waters, B.2
  • 11
    • 84937438236 scopus 로고    scopus 로고
    • Threshold passwordauthenticated key exchange
    • M. Yung, editor
    • P. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold passwordauthenticated key exchange. In M. Yung, editor, CRYPTO'02, pages 385-400, 2002.
    • (2002) CRYPTO'02 , pp. 385-400
    • Mackenzie, P.1    Shrimpton, T.2    Jakobsson, M.3
  • 13
    • 78650118369 scopus 로고    scopus 로고
    • Privacy preserving ehr system using attribute-based infrastructure
    • S. Narayan, M. Gagne, and R. Safavi-Naini. Privacy preserving ehr system using attribute-based infrastructure. In ACM CCSW, 2010.
    • (2010) ACM CCSW
    • Narayan, S.1    Gagne, M.2    Safavi-Naini, R.3
  • 14
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • D. Pointcheval and J. Stern, "Security proofs for signature schemes", in Proc. EUROCRYPT'96, pages 387-398, 1996.
    • (1996) Proc. EUROCRYPT'96 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 15
    • 33645998872 scopus 로고    scopus 로고
    • Fuzzy identity based encryption
    • A. Sahai and B. Waters. Fuzzy identity based encryption. In Eurocrypt 2005.
    • (2005) Eurocrypt
    • Sahai, A.1    Waters, B.2
  • 16
    • 84958979582 scopus 로고    scopus 로고
    • On the security of ElGamal based encryption
    • Y. Tsiounis and M. Yung, "On the security of ElGamal based encryption", in Proc. PKC'98, pages 117-134, 1998.
    • (1998) Proc. PKC'98 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2
  • 17
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. PKC'11, Pages 53-70, 2011.
    • (2011) PKC'11 , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.