Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access


    Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things

    Chaoyang Li1, Yanbu Guo1, Mianxiong Dong2,*, Gang Xu3, Xiu-Bo Chen4, Jian Li4, Kaoru Ota2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2043-2059, 2023, DOI:10.32604/cmc.2023.033670

    Abstract Internet of Medical Things (IoMT) plays an essential role in collecting and managing personal medical data. In recent years, blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data. However, some problems in the information transfer process between wireless medical devices and mobile medical apps, such as information leakage and privacy disclosure. This paper first designs a cross-device key agreement model for blockchain-enabled IoMT. This model can establish a key agreement mechanism for secure medical data sharing. Meanwhile, a certificateless authenticated key agreement (KA) protocol has been… More >

  • Open Access


    Data Anonymous Authentication for BIoMT with Proxy Group Signature

    Chaoyang Li1,*, Yalan Wang2, Gang Xu3, Xiubo Chen4, Xiangjun Xin1, Jian Li4

    Journal of Cyber Security, Vol.3, No.4, pp. 207-216, 2021, DOI:10.32604/jcs.2021.026926

    Abstract Along with the increase of wearable medical device, the privacy leakage problem in the process of transmission between these edge medical devices. The blockchain-enabled Internet of Medical Things (BIoMT) has been developed to reform traditional centralized medical system in recent years. This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT. Then, a proxy group signature (PGS) scheme has been proposed based on lattice assumption. This scheme can well satisfy the anonymous authentication demand for the proposed model, and provide anti-quantum attack security for BIoMT in the future general quantum computer age.… More >

Displaying 1-10 on page 1 of 2. Per Page