Efficient medical big data management with keyword-searchable encryption in healthchain

C Li, M Dong, J Li, G Xu, XB Chen, W Liu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
Along with applying blockchain technology in the health care service system (HSS), many
distributed solutions have been proposed to solve the centralized, data island problems …

Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search

H Li, Q Huang, J Huang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
To improve the quality of medical care and reduce unnecessary medical errors, electronic
medical records (EMRs) are widely applied in hospital information systems. However …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation

ZY Liu, YF Tseng, R Tso, M Mambo… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
With the rapid development of cloud computing, an increasing number of companies are
adopting cloud storage technology to reduce overhead. However, to ensure the privacy of …

Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system

Y Bao, W Qiu, X Cheng - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
It is a new trend in healthcare informatization construction to build the smart healthcare
system by using the Internet of Things (IoT) and cloud. This IoT-oriented and cloud-assisted …

A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA

VB Chenam, ST Ali - Computer Standards & Interfaces, 2022 - Elsevier
With the massive growth of the World Wide Web (ie, internet), individual users or companies
can store and manage large amounts of sensitive data to outsource it to the cloud server …

An encrypted medical blockchain data search method with access control mechanism

C Gan, H Yang, Q Zhu, Y Zhang, A Saini - Information Processing & …, 2023 - Elsevier
The use of medical blockchain enables the safe sharing of electronic medical data (EMD).
With the continuous growth of EMD, how to efficiently find EMD on the medical blockchain is …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H Xiong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …

Generic construction of public-key authenticated encryption with keyword search revisited: Stronger security and efficient construction

K Emura - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
Public-key encryption with keyword search (PEKS) does not provide trapdoor privacy, ie,
keyword information is leaked through trapdoors. To prevent this information leakage, public …

Lattice-based public key searchable encryption with fine-grained access control for edge computing

P Wang, B Chen, T Xiang, Z Wang - Future Generation Computer Systems, 2022 - Elsevier
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices,
edge computing provides various on-demand data services to reduce latency and network …