+

Zhao et al., 2023 - Google Patents

A lightweight CP‐ABE scheme in the IEEEP1363 standard with key tracing and verification and its application on the Internet of Vehicles

Zhao et al., 2023

Document ID
14039856582836310241
Author
Zhao Y
Li H
Liu Z
Zhu G
Publication year
Publication venue
Transactions on Emerging Telecommunications Technologies

External Links

Snippet

Automated vehicle applications are becoming more and more widespread, and the data security of the vehicle network involved is particularly important. Similar to traditional data, the characteristics of autonomous driving data security are mainly confidentiality, integrity …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Similar Documents

Publication Publication Date Title
Mei et al. Blockchain-enabled privacy-preserving authentication mechanism for transportation CPS with cloud-edge computing
Zhang et al. Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
Zhao et al. A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANET
Murugesan et al. Analysis on homomorphic technique for data security in fog computing
Shen et al. Toward data privacy preservation with ciphertext update and key rotation for IoT
Yang et al. An efficient blockchain‐based batch verification scheme for vehicular ad hoc networks
Zhang et al. Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks
Yuan et al. Post quantum blockchain architecture for internet of things over NTRU lattice
Li et al. Security analysis of a lightweight identity‐based two‐party authenticated key agreement protocol for IIoT environments
Zhang et al. V‐Lattice: A Lightweight Blockchain Architecture Based on DAG‐Lattice Structure for Vehicular Ad Hoc Networks
Yang et al. Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute‐Based Encryption
Jiang et al. Lightweight data security protection method for AMI in power Internet of Things
Shi et al. QKBAKA: a quantum-key-based authentication and key agreement scheme for internet of vehicles
Wen et al. Security and efficiency enhanced revocable access control for fog-based smart grid system
Pu et al. liteGAP: Lightweight group authentication protocol for internet of drones systems
Zhao et al. A lightweight CP‐ABE scheme in the IEEEP1363 standard with key tracing and verification and its application on the Internet of Vehicles
Guo et al. A multifactor combined data sharing scheme for vehicular fog computing using blockchain
Xie et al. ECLB: Edge‐Computing‐Based Lightweight Blockchain Framework for Mobile Systems
Zhan et al. Cryptanalysis of a certificateless aggregate signature scheme for healthcare wireless sensor network
Zhang et al. A Traceable and Revocable Multiauthority Attribute‐Based Encryption Scheme with Fast Access
Yao et al. Efficient data sharing scheme with fine-grained access control and integrity auditing in terminal–edge–cloud network
CN114615006A (en) Edge layer data security protection method and system for power distribution Internet of things and storage medium
Wang et al. Application of IoT authentication key management algorithm to personnel information management
Yang et al. Privacy Protection of Task in Crowdsourcing: Policy‐Hiding and Attribute Updating Attribute‐Based Access Control Based on Blockchain
Wang et al. Attribute‐Based User Revocable Data Integrity Audit for Internet‐of‐Things Devices in Cloud Storage
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载