EBIAC: Efficient biometric identity-based access control for wireless body area networks

[1]  Xavier Boyen,et al.  Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.

[2]  Fagen Li,et al.  A biometric identity-based signcryption scheme , 2012, Future Gener. Comput. Syst..

[3]  Fagen Li,et al.  A combined public-key scheme in the case of attribute-based for wireless body area networks , 2019, Wirel. Networks.

[4]  Fagen Li,et al.  An efficient and practical certificateless signcryption scheme for wireless body area networks , 2020, Comput. Commun..

[5]  Jing Liu,et al.  Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks , 2015, ICA3PP.

[6]  Yupu Hu,et al.  An Efficient Biometric Identity Based Signature Scheme , 2013, KSII Trans. Internet Inf. Syst..

[7]  Dan Boneh,et al.  Short Signatures Without Random Oracles , 2004, EUROCRYPT.

[8]  Lin You,et al.  Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings , 2021, IEEE Access.

[9]  R. Venkateswari,et al.  Security Challenges and Solutions for Wireless Body Area Networks , 2018, Advances in Intelligent Systems and Computing.

[10]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[11]  Kyung-Ah Shim,et al.  EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks , 2013, Ad Hoc Networks.

[12]  Joonsang Baek,et al.  Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment , 2018, Advances in Cyber Security.

[13]  Donghoon Chang,et al.  Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message , 2015, ACISP.

[14]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[15]  Keita Emura,et al.  A KEM/DEM-Based Construction for Secure and Anonymous Communication , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[16]  Changji Wang A provable secure fuzzy identity based signature scheme , 2011, Science China Information Sciences.

[17]  Ronald Cramer,et al.  Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..

[18]  Victor Shoup,et al.  OAEP Reconsidered , 2001, CRYPTO.

[19]  Adam Duffy,et al.  A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..

[20]  Eike Kiltz,et al.  Hybrid Encryption in a Multi-user Setting, Revisited , 2018, Public Key Cryptography.

[21]  Bin Liu,et al.  Efficient and privacy-preserving authentication scheme for wireless body area networks , 2020, J. Inf. Secur. Appl..

[22]  Ted Taekyoung Kwon,et al.  Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM , 2015, WISA.

[23]  Hizbullah Khattak,et al.  An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things , 2019, Electronics.

[24]  Peilin Hong,et al.  Distributed access control with adaptive privacy preserving property for wireless sensor networks , 2014, Secur. Commun. Networks.

[25]  Yupu Hu,et al.  Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe , 2019, J. Inf. Secur. Appl..

[26]  Abdelfettah Belghith,et al.  Wireless Body Area Networks: Applications and Technologies , 2016, ANT/SEIT.

[27]  Jacques Stern,et al.  Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.

[28]  Puwen Wei,et al.  Identity-based Broadcast Encryption with Efficient Revocation , 2019, IACR Cryptol. ePrint Arch..

[29]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[30]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[31]  Zhoujun Li,et al.  A novel fuzzy identity based signature scheme based on the short integer solution problem , 2014, Comput. Electr. Eng..

[32]  Chunhua Jin,et al.  Cost-Effective and Anonymous Access Control for Wireless Body Area Networks , 2018, IEEE Systems Journal.

[33]  Xiaolei Dong,et al.  Fuzzy identity based signature with applications to biometric authentication , 2011, Comput. Electr. Eng..

[34]  Chunhua Jin,et al.  Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.

[35]  Kyung-Ah Shim,et al.  S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks , 2014, Ad Hoc Networks.

[36]  Peyman Dodangeh,et al.  A biometric security scheme for wireless body area networks , 2018, J. Inf. Secur. Appl..

[37]  Sherali Zeadally,et al.  Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN) , 2021, Microprocess. Microsystems.

[38]  Xianhui Lu,et al.  Identity-based encryption with non-interactive opening , 2008 .

[39]  Kaoru Kurosawa,et al.  Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.

[40]  Gary M. Weiss,et al.  Biometric Authentication and Verification for Medical Cyber Physical Systems , 2018, Electronics.

[41]  Yohei Watanabe,et al.  CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance , 2017, Int. J. Appl. Cryptogr..

[42]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[43]  Kim-Kwang Raymond Choo,et al.  Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems , 2019, IEEE Transactions on Dependable and Secure Computing.

[44]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[45]  Qiaoyan Wen,et al.  Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing , 2016, IEEE Transactions on Parallel and Distributed Systems.

[46]  R. Nidhya,et al.  Security and Privacy Issues in Remote Healthcare Systems Using Wireless Body Area Networks , 2019 .

[47]  Fagen Li,et al.  Efficient Certificateless Access Control for Wireless Body Area Networks , 2016, IEEE Sensors Journal.

[48]  Daojing He,et al.  A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[49]  Yiliang Han,et al.  Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data , 2017, Inscrypt.