Although attribute-based signcryption (ABSC) offers a promising technology to ensure the security of IoT data sharing, it faces a two-fold challenge in practical implementation, namely, the linearly increasing computation and communication costs and the heavy load of single authority based key management. To this end, we propose a Secure and Lightweight Multi-authority ABSC scheme called SLIM in this paper. The signcryption and de-signcryption costs of devices are reduced to a small constant by offloading most of the computation to the edge server. To minimize communication and storage costs, a short and constant-size ciphertext is designed. Moreover, we adopt a hierarchical multi-authority architecture, setting up multiple attribute author...
In the environment of big data of the Internet of Things, smart healthcare is developed in combinati...
This paper presents an ongoing work toward the proposal of the new concept of the attribute-based cr...
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mo...
In this paper, we present C-ABSC, a cooperative privacy preserving attribute based signcryption mec...
Nowadays, fog computing provides computation, storage, and application services to end users in the ...
Abstract. Designing attribute-based systems supporting highly expressive access policies has been on...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The information transmitted in IoT is susceptible to affect the user’s privacy, and hence the inform...
Attribute-based signature (ABS) enables users to sign messages over attributes without revealing any...
IoT devices often collect data and store the data in the cloud for sharing and further processing. A...
© 2019 Elsevier B.V. The ever-growing number of Internet connected devices poses several cybersecuri...
The Internet of Things technology has been used in a wide range of fields, ranging from industrial a...
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) an...
The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the...
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs)...
In the environment of big data of the Internet of Things, smart healthcare is developed in combinati...
This paper presents an ongoing work toward the proposal of the new concept of the attribute-based cr...
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mo...
In this paper, we present C-ABSC, a cooperative privacy preserving attribute based signcryption mec...
Nowadays, fog computing provides computation, storage, and application services to end users in the ...
Abstract. Designing attribute-based systems supporting highly expressive access policies has been on...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The information transmitted in IoT is susceptible to affect the user’s privacy, and hence the inform...
Attribute-based signature (ABS) enables users to sign messages over attributes without revealing any...
IoT devices often collect data and store the data in the cloud for sharing and further processing. A...
© 2019 Elsevier B.V. The ever-growing number of Internet connected devices poses several cybersecuri...
The Internet of Things technology has been used in a wide range of fields, ranging from industrial a...
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) an...
The ever-growing number of Internet connected devices poses several cybersecurity risks. Most of the...
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs)...
In the environment of big data of the Internet of Things, smart healthcare is developed in combinati...
This paper presents an ongoing work toward the proposal of the new concept of the attribute-based cr...
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mo...