A secure data sharing using identity-based encryption scheme for e-healthcare system

A Sudarsono, M Yuliana… - 2017 3rd International …, 2017 - ieeexplore.ieee.org
… In this section, we describe our identity-based encryption scheme with signature used in the
proposed security system for data sharing in the e-healthcare system. Our proposed system …

Securing wireless sensor networks: an identity-based cryptography approach

P Szczechowiak, M Scott… - International Journal of …, 2010 - inderscienceonline.com
… requirements can be addressed by using an Identity-Based Cryptography (IBC) approach. …
a practical identity-based key agreement scheme that does not require any communication

A secure data getting/transmitting protocol for WSN in IoT using revocable storage identity based cryptography

P Lavanya, A Sangeetha… - … on Communication and …, 2018 - ieeexplore.ieee.org
Data Getting and Data transmit was done in secure manner using secure revocable storage
Identity based encryption… in case of losing data while getting from client and transmitting. The …

Identity-based cryptography techniques and applications (a review)

D Anand, V Khemchandani… - … and communication …, 2013 - ieeexplore.ieee.org
… , we can say it is better approach for the secure information exchange in any type of
network and any scale of users. This technique has its benefit over the competent techniques. …

Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey

MA Al-Shareeda, M Anbar, S Manickam, A Khalil… - IEEE …, 2021 - ieeexplore.ieee.org
… The main goal of this paper is to critically review identity-based security and privacy schemes
… one-time identity-based aggregate signature technique for secure VANET communication. …

Securing communication in inter domains Internet of Things using identity-based cryptography

B Anggorojati, R Prasad - … International Workshop on Big Data …, 2017 - ieeexplore.ieee.org
… In order to ensure security of communication in IoT … Identity-Based Cryptography (IBC) is
proposed in this paper. The proposed scheme is based on variant of Identity-Based Encryption (…

[图书][B] Security for wireless sensor networks using identity-based cryptography

HK Patil, SA Szygenda, SA Szygenda - 2013 - api.taylorfrancis.com
… addresses the problems associated with providing efficient tools to secure data or
information. A number of different approaches have been developed over the years. Historically, …

Using identitybased cryptography as a foundation for an effective and secure cloud model for e‐health

S Mittal, A Bansal, D Gupta, S Juneja… - Computational …, 2022 - Wiley Online Library
… In our proposed methodology, an identity-based encryption technique is utilized for uploading
data into the clouds. The identity of the user is extracted initially to generate the public key. …

[Retracted] An Improved Secure Key Generation Using Enhanced IdentityBased Encryption for Cloud Computing in Large‐Scale 5G

RK Gupta, KK Almuzaini, RK Pateriya… - … Communications …, 2022 - Wiley Online Library
… One of the most popular methods used to secure data over the cloud is the identity-based
encryption (IBE). It is an access policy that allows only authorized users to access legible data

Identity-based secure distributeddata storage schemes

J Han, W Susilo, Y Mu - IEEE Transactions on computers, 2013 - ieeexplore.ieee.org
Identity-based cryptosystem introduced by Shamir [36] is a system where the public key
can be any arbitrary string and the secret key is issued by a trusted party called the private key …