咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >An efficient and authenticated... 收藏

An efficient and authenticated key establishment scheme based on fog computing for healthcare system

作     者:Xinghua Li Ting Chen Qingfeng Cheng Jianfeng Ma Xinghua LI;Ting CHEN;Qingfeng CHENG;Jianfeng MA

作者机构:School of Cyber EngineeringXidian UniversityXi’an710071China 

出 版 物:《Frontiers of Computer Science》 (中国计算机科学前沿(英文版))

年 卷 期:2022年第16卷第4期

页      面:173-184页

核心收录:

学科分类:08[工学] 0835[工学-软件工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 081202[工学-计算机软件与理论] 

基  金:supported by the National Natural Science Foundation of China(Grant Nos.Ui708262 U1736203 61872449) 

主  题:authenticated key establishment ephemeral key compromise attack fog-driven healthcare system elliptic curve cryptography provable security ProVerif simulation 

摘      要:Because of its closeness to users,fog computing responds faster than cloud ***,it has been deployed to various applications,such as healthcare ***,to ensure the secure communication of the fog-based healthcare system,Jia et *** an authenticated key agreement ***,in view of the high computation cost existing in Jia et al.’s scheme,Ma et *** an efficient one using elliptic curve *** this paper,we observe that both the two schemes may potentially risk ephemeral key compromise attacks and need ***,to overcome this potential risk,we propose a new authenticated scheme based on Jia et al.’s scheme using elliptic curve computational Diffie-Hellman hypothesis and hash ***,we provide provable security under the adopted adversarial model and ProVerif simulation,and also analyze the performance in terms of computation and communication costs by *** analysis results show that the improved scheme resists the common attacks,reduces computation overhead,and has a certain significance.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分