메뉴 건너뛰기




Volumn 52, Issue , 2015, Pages 67-76

Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption

Author keywords

Attribute based signcryption; Cloud computing; Fine grained access control; Personal Health Records (PHR)

Indexed keywords

ACCESS CONTROL; CLOUD COMPUTING; DIGITAL STORAGE; HEALTH; SECURITY OF DATA;

EID: 84938073542     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2014.10.014     Document Type: Article
Times cited : (210)

References (35)
  • 1
    • 84892178040 scopus 로고    scopus 로고
    • Making use of cloud computing for healthcare provision: opportunities and challenges
    • N. Sultan Making use of cloud computing for healthcare provision: opportunities and challenges Int. J. Inf. Manage. 34 2014 177 184
    • (2014) Int. J. Inf. Manage. , vol.34 , pp. 177-184
    • Sultan, N.1
  • 2
    • 85018108745 scopus 로고    scopus 로고
    • Personal health records sharing in cloud computing environment
    • D. Jennifer, and M. Saranya Personal health records sharing in cloud computing environment Asia Pac. J. Res. I XI 2014
    • (2014) Asia Pac. J. Res. , vol.1 , Issue.11
    • Jennifer, D.1    Saranya, M.2
  • 7
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
    • Springer
    • B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Public Key Cryptography - PKC 2011 2011 Springer 53 70
    • (2011) Public Key Cryptography - PKC 2011 , pp. 53-70
    • Waters, B.1
  • 9
    • 84884636818 scopus 로고    scopus 로고
    • Privacy engineering: personal health records in cloud computing environments
    • A. Kaletsch, A. Sunyaev, Privacy engineering: personal health records in cloud computing environments, in: ICIS.
    • ICIS
    • Kaletsch, A.1    Sunyaev, A.2
  • 14
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
    • M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption IEEE Trans. Parallel Distrib. Syst. 24 2013 131 143
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 19
    • 70350676690 scopus 로고    scopus 로고
    • Threshold attribute-based signatures and their application to anonymous credential systems
    • Springer
    • S.F. Shahandashti, and R. Safavi-Naini Threshold attribute-based signatures and their application to anonymous credential systems Progress in Cryptology - AFRICACRYPT 2009 2009 Springer 198 216
    • (2009) Progress in Cryptology - AFRICACRYPT 2009 , pp. 198-216
    • Shahandashti, S.F.1    Safavi-Naini, R.2
  • 20
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption)? cost (signature) + cost (encryption)
    • Springer
    • Y. Zheng Digital signcryption or how to achieve cost (signature & encryption)? cost (signature) + cost (encryption) Advances in Cryptology - CRYPTO'97 1997 Springer 165 179
    • (1997) Advances in Cryptology - CRYPTO'97 , pp. 165-179
    • Zheng, Y.1
  • 22
    • 84876794757 scopus 로고    scopus 로고
    • Attribute-based ring signcryption scheme
    • Z. Guo, M. Li, and X. Fan Attribute-based ring signcryption scheme Secur. Commun. Netw. 6 2013 790 796
    • (2013) Secur. Commun. Netw. , vol.6 , pp. 790-796
    • Guo, Z.1    Li, M.2    Fan, X.3
  • 23
    • 84891050675 scopus 로고    scopus 로고
    • Body area network security: a fuzzy attribute-based signcryption scheme
    • C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao Body area network security: a fuzzy attribute-based signcryption scheme IEEE J. Sel. Areas Commun. 31 2013 37 46
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , pp. 37-46
    • Hu, C.1    Zhang, N.2    Li, H.3    Cheng, X.4    Liao, X.5
  • 26
    • 84857704862 scopus 로고    scopus 로고
    • Dynamic attribute-based signcryption without random oracles
    • K. Emura, A. Miyaji, and M.S. Rahman Dynamic attribute-based signcryption without random oracles Int. J. Appl. Cryptogr. 2 2012 199 211
    • (2012) Int. J. Appl. Cryptogr. , vol.2 , pp. 199-211
    • Emura, K.1    Miyaji, A.2    Rahman, M.S.3
  • 30
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E.F. Brickell, and D.M. Davenport On the classification of ideal secret sharing schemes J. Cryptology 4 1991 123 134
    • (1991) J. Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 31
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Springer
    • D. Boneh, X. Boyen, and E.-J. Goh Hierarchical identity based encryption with constant size ciphertext Advances in Cryptology - EUROCRYPT 2005 2005 Springer 440 456
    • (2005) Advances in Cryptology - EUROCRYPT 2005 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 33
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM J. Comput. 32 2003 586 615
    • (2003) SIAM J. Comput. , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.