Identity-based ring signatureIdentity-based ring signcryptionKey-policy attribute-based encryptionKey-policy attribute-based ring signcryptionWireless body area networksWireless body area network (WBAN) technology has attracted intensive attention from the academic and industrial research communities in recent ...
we propose a cloud data deduplication scheme based on certificateless proxy re-encryption. It contains certificateless proxy re-encryption (CL-PRE) and proof of ownership based on certificateless signature (PoW-CLS). Compared with the existing scheme, we use certificateless cryptography to solve the ...
Identity-based ring signatureIdentity-based ring signcryptionKey-policy attribute-based encryptionKey-policy attributebased ring signcryptionWireless body area networksWireless body area network (WBAN) technology has attracted intensive attention from the academic and industrial research communities in recent ...
Identity-based ring signatureCiphertext-policy attribute-based encryptionWireless body area networkThe technology of wireless body area network (WBAN) has attracted intensive attention in recent years. For widespread deployment of WBANs, security and privacy issues must be addressed properly. Recently, Hu...
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area NetworksThe technology of wireless body area network (WBAN) has attracted intensive attention in recent years. For widespread deployment of WBANs, security and...