Aijia Chen

ORCID: 0000-0002-9260-1430
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Complexity and Algorithms in Graphs
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Nanocluster Synthesis and Applications
  • Vehicular Ad Hoc Networks (VANETs)

Northwest Normal University
2020-2023

China Telecom (China)
2023

China Telecom
2023

The sharing of electronic health records (EHRs) has shown great advantages in the accurate treatment patients and development medical institutions. However, it is easy to cause some security problems process data sharing. Generally, after a patient's EHRs are generated by different institutions, they outsourced cloud server (CS) authorized institutions for storage, which causes patient lose control EHRs. Moreover, malicious semi-trusted servers may collude tamper with seek benefits,...

10.1109/access.2020.3025060 article EN cc-by IEEE Access 2020-01-01

Cloud storage is a popular model of the application in various fields, and security data access permission have been widely considered. Attribute-based encryption (ABE) provides fine-grained user control ensures confidentiality. However, current ABE schemes rely on trusted cloud servers provide low level security. To solve these problems traditional schemes, we propose blockchain-based scheme. In this article, blockchain smart contract technology are core elements to ensure integrity build...

10.1155/2022/2204832 article EN cc-by Security and Communication Networks 2022-05-11

Vehicular ad hoc networks (VANETs) apply the Internet of Things technology to provide secure communication among vehicles, thereby improving safe driving utilization traffic resources, and efficiency information services. Due openness vulnerability wireless in VANETs, messages sharing transmission are easily attacked destroyed. Therefore, a large number schemes for VANETs were proposed protect privacy vehicles ensure authentication, integrity, nonrepudiation messages. However, most these...

10.1155/2022/4472945 article EN cc-by Security and Communication Networks 2022-04-14

Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However, data is usually difficult to resist malicious attacks because it transmitted an open insecure channel. In our paper, new sharing scheme proposed by using attribute-based encryption, identity-based signature cloud computing technology meet requirements confidentiality, integrity, verifiability, unforgerability data. The equipment encrypts...

10.1371/journal.pone.0258062 article EN cc-by PLoS ONE 2021-09-30

In view of the problems inefficient data encryption, non-support malicious user revocation and integrity checking in current smart grid sharing schemes, this paper proposes a blockchain-based multi-authority revocable scheme grid. Using online/offline encryption technology with hybrid enhances performance for owner. The use binary tree enables traceability revocability users. introduction multiple attribute authorization authorities eliminates threat collusive attacks that exist traditional...

10.3934/mbe.2023531 article EN cc-by Mathematical Biosciences & Engineering 2023-01-01

Abstract The sharing of electronic health records (EHR) has shown significant advantages in the accurate diagnosis patients and development medical institutions. However, due to privacy sensitivity data, it is easy cause security issues such as difficulty data among different institutions leakage privacy. Because blockchain characteristics non-tampering, anonymity, decentralization. We propose a blockchain-based searchable proxy re-encryption scheme for EHR storage sharing. First, we use...

10.1088/1742-6596/1828/1/012120 article EN Journal of Physics Conference Series 2021-02-01

Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled areas conduct access control for UAVs. However, the current cloud-assisted IoD scheme cannot efficiently achieve secure communication between heterogeneous cryptosystems, does not support multi-ciphertext equality tests. To improve security performance traditional schemes, we propose signcryption (HSC-MET) that supports test. In this...

10.1371/journal.pone.0274695 article EN cc-by PLoS ONE 2022-09-29

Liu et al. proposed a verifiable data aggregation scheme for Internet of Things based on certificateless aggregate signature algorithm. (DOI: 10.1109/ICC.2017.7996720, 2017 IEEE International Conference Communications). Under the random oracle model, al.'s was proved that there is unforgeability under adaptive chosen message attack. However, we analyze security and show it cannot resist type II attacks, coalition attacks forge without any secret authorization. To overcome above flaws,...

10.1109/cncit56797.2022.00029 article EN 2022-06-01
Coming Soon ...