A review on the state-of-the-art privacy-preserving approaches in the e-health clouds

A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …

Post-quantum asynchronous deniable key exchange and the signal handshake

J Brendel, R Fiedler, F Günther, C Janson… - … Conference on Public …, 2022 - Springer
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …

The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks

T Ristenpart, S Yilek - Advances in Cryptology-EUROCRYPT 2007: 26th …, 2007 - Springer
Multiparty signature protocols need protection against rogue-key attacks, made possible
whenever an adversary can choose its public key (s) arbitrarily. For many schemes …

[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture

F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024 - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …

Image recognition with deep learning

MT Islam, BMNK Siddique, S Rahman… - 2018 International …, 2018 - ieeexplore.ieee.org
Image recognition is one of the most important fields of image processing and computer
vision. Food image classification is an unique branch of image recognition problem. In …

Designated verifier signature schemes: Attacks, new security notions and a new construction

H Lipmaa, G Wang, F Bao - … , ICALP 2005, Lisbon, Portugal, July 11-15 …, 2005 - Springer
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …

Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map

F Laguillaumie, D Vergnaud - … , SCN 2004, Amalfi, Italy, September 8-10 …, 2005 - Springer
Abstract The concept of Designated Verifier Signatures (DVS) was introduced by Jakobsson,
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …

An efficient authentication scheme for intra-vehicular controller area network

B Palaniswamy, S Camtepe, E Foo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Communication in modern cars is managed by a controller area network (CAN) bus protocol
and its extensions for electronic control units (ECUs). The CAN bus is a preferred method for …

Efficient blockchain-based electronic medical record sharing with anti-malicious propagation

C Lin, X Huang, D He - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Electronic Medical Records (EMRs) sharing enhances healthcare and biomedical
discoveries but faces challenges: data provider centralization and limited interoperability …

Chameleon hashing without key exposure

X Chen, F Zhang, K Kim - International Conference on Information Security, 2004 - Springer
Chameleon signatures are based on well established hash-and-sign paradigm, where a
chameleon hash function is used to compute the cryptographic message digest. Chameleon …