- Cryptography and Data Security
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Complexity and Algorithms in Graphs
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Nanocluster Synthesis and Applications
- Vehicular Ad Hoc Networks (VANETs)
Northwest Normal University
2020-2023
China Telecom (China)
2023
China Telecom
2023
The sharing of electronic health records (EHRs) has shown great advantages in the accurate treatment patients and development medical institutions. However, it is easy to cause some security problems process data sharing. Generally, after a patient's EHRs are generated by different institutions, they outsourced cloud server (CS) authorized institutions for storage, which causes patient lose control EHRs. Moreover, malicious semi-trusted servers may collude tamper with seek benefits,...
Cloud storage is a popular model of the application in various fields, and security data access permission have been widely considered. Attribute-based encryption (ABE) provides fine-grained user control ensures confidentiality. However, current ABE schemes rely on trusted cloud servers provide low level security. To solve these problems traditional schemes, we propose blockchain-based scheme. In this article, blockchain smart contract technology are core elements to ensure integrity build...
Vehicular ad hoc networks (VANETs) apply the Internet of Things technology to provide secure communication among vehicles, thereby improving safe driving utilization traffic resources, and efficiency information services. Due openness vulnerability wireless in VANETs, messages sharing transmission are easily attacked destroyed. Therefore, a large number schemes for VANETs were proposed protect privacy vehicles ensure authentication, integrity, nonrepudiation messages. However, most these...
Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, data is usually difficult to resist malicious attacks because it transmitted an open insecure channel. In our paper, new sharing scheme proposed by using attribute-based encryption, identity-based signature cloud computing technology meet requirements confidentiality, integrity, verifiability, unforgerability data. The equipment encrypts...
In view of the problems inefficient data encryption, non-support malicious user revocation and integrity checking in current smart grid sharing schemes, this paper proposes a blockchain-based multi-authority revocable scheme grid. Using online/offline encryption technology with hybrid enhances performance for owner. The use binary tree enables traceability revocability users. introduction multiple attribute authorization authorities eliminates threat collusive attacks that exist traditional...
Abstract The sharing of electronic health records (EHR) has shown significant advantages in the accurate diagnosis patients and development medical institutions. However, due to privacy sensitivity data, it is easy cause security issues such as difficulty data among different institutions leakage privacy. Because blockchain characteristics non-tampering, anonymity, decentralization. We propose a blockchain-based searchable proxy re-encryption scheme for EHR storage sharing. First, we use...
Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled areas conduct access control for UAVs. However, the current cloud-assisted IoD scheme cannot efficiently achieve secure communication between heterogeneous cryptosystems, does not support multi-ciphertext equality tests. To improve security performance traditional schemes, we propose signcryption (HSC-MET) that supports test. In this...
Liu et al. proposed a verifiable data aggregation scheme for Internet of Things based on certificateless aggregate signature algorithm. (DOI: 10.1109/ICC.2017.7996720, 2017 IEEE International Conference Communications). Under the random oracle model, al.'s was proved that there is unforgeability under adaptive chosen message attack. However, we analyze security and show it cannot resist type II attacks, coalition attacks forge without any secret authorization. To overcome above flaws,...