Yu et al., 2020 - Google Patents
Enabling attribute revocation for fine-grained access control in blockchain-IoT systemsYu et al., 2020
View PDF- Document ID
- 16303092331313507357
- Author
- Yu G
- Zha X
- Wang X
- Ni W
- Yu K
- Yu P
- Zhang J
- Liu R
- Guo Y
- Publication year
- Publication venue
- IEEE Transactions on Engineering Management
External Links
Snippet
The attribute-based encryption (ABE) has drawn a lot of attention for fine-grained access control in blockchains, especially in blockchain-enabled tampering-resistant Internet-of- Things (IoT) systems. However, its adoption has been severely hindered by the …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | Enabling attribute revocation for fine-grained access control in blockchain-IoT systems | |
Liang et al. | PDPChain: A consortium blockchain-based privacy protection scheme for personal data | |
Xu et al. | Healthchain: A blockchain-based privacy preserving scheme for large-scale health data | |
Dilawar et al. | Blockchain: securing internet of medical things (IoMT) | |
Nilizadeh et al. | Cachet: a decentralized architecture for privacy preserving social networking with caching | |
Shafagh et al. | Droplet: Decentralized authorization and access control for encrypted data streams | |
Shi et al. | Blockchain-based multimedia sharing in vehicular social networks with privacy protection | |
Gao et al. | BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control | |
Li et al. | Blockchain-empowered data-driven networks: A survey and outlook | |
Murugesan et al. | Analysis on homomorphic technique for data security in fog computing | |
She et al. | A double steganography model combining blockchain and interplanetary file system | |
Beato et al. | For some eyes only: protecting online information sharing | |
Chen et al. | Blockchain meets covert communication: A survey | |
Yang et al. | An efficient blockchain-based bidirectional friends matching scheme in social networks | |
Peng et al. | A blockchain‐based mobile crowdsensing scheme with enhanced privacy | |
Zaghloul et al. | d-emr: Secure and distributed electronic medical record management | |
US20230164121A1 (en) | Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network | |
Abubakar et al. | A survey on the integration of blockchain and IoT: challenges and opportunities | |
Liao | Design of the secure smart home system based on the blockchain and cloud service | |
Lou et al. | Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system | |
Palit et al. | AUGChain: blockchain-based mobile user authentication scheme in global mobility network | |
Guo et al. | A multifactor combined data sharing scheme for vehicular fog computing using blockchain | |
Kamel et al. | D3vn: Decentralized abe-based distributed data validation network | |
Saxena et al. | A Lightweight and Efficient Scheme for e-Health Care System using Blockchain Technology | |
KR20190139742A (en) | Distributed Ledger for logging inquiry time in blockchain |