Zhao et al., 2023 - Google Patents
A lightweight CP‐ABE scheme in the IEEEP1363 standard with key tracing and verification and its application on the Internet of VehiclesZhao et al., 2023
- Document ID
- 14039856582836310241
- Author
- Zhao Y
- Li H
- Liu Z
- Zhu G
- Publication year
- Publication venue
- Transactions on Emerging Telecommunications Technologies
External Links
Snippet
Automated vehicle applications are becoming more and more widespread, and the data security of the vehicle network involved is particularly important. Similar to traditional data, the characteristics of autonomous driving data security are mainly confidentiality, integrity …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mei et al. | Blockchain-enabled privacy-preserving authentication mechanism for transportation CPS with cloud-edge computing | |
| Zhang et al. | Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing | |
| Zhao et al. | A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANET | |
| Murugesan et al. | Analysis on homomorphic technique for data security in fog computing | |
| Shen et al. | Toward data privacy preservation with ciphertext update and key rotation for IoT | |
| Yang et al. | An efficient blockchain‐based batch verification scheme for vehicular ad hoc networks | |
| Zhang et al. | Efficient and Privacy‐Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks | |
| Yuan et al. | Post quantum blockchain architecture for internet of things over NTRU lattice | |
| Li et al. | Security analysis of a lightweight identity‐based two‐party authenticated key agreement protocol for IIoT environments | |
| Zhang et al. | V‐Lattice: A Lightweight Blockchain Architecture Based on DAG‐Lattice Structure for Vehicular Ad Hoc Networks | |
| Yang et al. | Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute‐Based Encryption | |
| Jiang et al. | Lightweight data security protection method for AMI in power Internet of Things | |
| Shi et al. | QKBAKA: a quantum-key-based authentication and key agreement scheme for internet of vehicles | |
| Wen et al. | Security and efficiency enhanced revocable access control for fog-based smart grid system | |
| Pu et al. | liteGAP: Lightweight group authentication protocol for internet of drones systems | |
| Zhao et al. | A lightweight CP‐ABE scheme in the IEEEP1363 standard with key tracing and verification and its application on the Internet of Vehicles | |
| Guo et al. | A multifactor combined data sharing scheme for vehicular fog computing using blockchain | |
| Xie et al. | ECLB: Edge‐Computing‐Based Lightweight Blockchain Framework for Mobile Systems | |
| Zhan et al. | Cryptanalysis of a certificateless aggregate signature scheme for healthcare wireless sensor network | |
| Zhang et al. | A Traceable and Revocable Multiauthority Attribute‐Based Encryption Scheme with Fast Access | |
| Yao et al. | Efficient data sharing scheme with fine-grained access control and integrity auditing in terminal–edge–cloud network | |
| CN114615006A (en) | Edge layer data security protection method and system for power distribution Internet of things and storage medium | |
| Wang et al. | Application of IoT authentication key management algorithm to personnel information management | |
| Yang et al. | Privacy Protection of Task in Crowdsourcing: Policy‐Hiding and Attribute Updating Attribute‐Based Access Control Based on Blockchain | |
| Wang et al. | Attribute‐Based User Revocable Data Integrity Audit for Internet‐of‐Things Devices in Cloud Storage |