Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022‏ - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

On the integration of structure indexes and inverted lists

R Kaushik, R Krishnamurthy, JF Naughton… - Proceedings of the …, 2004‏ - dl.acm.org
Several methods have been proposed to evaluate queries over a native XML DBMS, where
the queries specify both path and keyword constraints. These broadly consist of graph …

Lightweight authentication scheme for data dissemination in cloud-assisted healthcare IoT

J Liu, J Yang, W Wu, X Huang… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Recent advancements in the Internet of Things (IoT) and cloud computing technologies have
accelerated the development of various practical applications, including healthcare systems …

Server-aided continuous group key agreement

J Alwen, D Hartmann, E Kiltz, M Mularczyk - Proceedings of the 2022 …, 2022‏ - dl.acm.org
Continuous Group Key Agreement (CGKA)--or Group Ratcheting--lies at the heart of a new
generation of scalable End-to-End secure (E2E) cryptographic multi-party applications. One …

VerITAS: verifying image transformations at scale

T Datta, B Chen, D Boneh - Cryptology ePrint Archive, 2024‏ - eprint.iacr.org
Verifying image provenance has become an important topic, especially in the realm of news
media. To address this issue, the Coalition for Content Provenance and Authenticity (C2PA) …

Locally verifiable signature and key aggregation

R Goyal, V Vaikuntanathan - Annual International Cryptology Conference, 2022‏ - Springer
Abstract Aggregate signatures (Boneh, Gentry, Lynn, Shacham, Eurocrypt 2003) enable
compressing a set of N signatures on N different messages into a short aggregate signature …

RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications

J Liu, C Chen, Y Qu, S Yang, L Xu - ISA transactions, 2023‏ - Elsevier
Powered by the rapid progress of analytics techniques and the increasing availability of
healthcare data, artificial intelligence (AI) is bringing a paradigm shift to healthcare …

Cost-effective authenticated data redaction with privacy protection in IoT

F Zhu, X Yi, A Abuadbba, I Khalil… - IEEE Internet of …, 2021‏ - ieeexplore.ieee.org
In a typical e-healthcare system, it is common for users' physiological data collected by
Internet-of-Things (IoT) devices to be processed and shared in a third-party environment. To …

Authenticated data sharing with privacy protection and batch verification for healthcare IoT

F Zhu, X Yi, A Abuadbba, I Khalil… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
The healthcare Internet of Things (IoT) is rapidly becoming an invaluable tool in the
healthcare industry. However, sharing data in healthcare IoT raises many security and …

Policy-based sanitizable signatures

K Samelin, D Slamanig - Topics in Cryptology–CT-RSA 2020: The …, 2020‏ - Springer
Sanitizable signatures are a variant of signatures which allow a single, and signer-defined,
sanitizer to modify signed messages in a controlled way without invalidating the respective …