Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://scholars.ntou.edu.tw/handle/123456789/26473
Title: Anomaly Detection Through Outsourced Revocable Identity-Based Signcryption With Equality Test for Sensitive Data in Consumer IoT Environments
Authors: Tsai, Tung-Tso 
Lin, Han-Yu 
Huang, Wei-Ning
Kumar, Sachin
Agarwal, Kadambri
Chen, Chien-Ming
Keywords: Cloud computing;Encryption;Public key;Medical services;Servers;Clouds;Symbols;Revocation;identity-based signcryption;consumer IoT
Issue Date: 2025
Publisher: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Journal Volume: 71
Journal Issue: 2
Start page/Pages: 6327-6339
Source: IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
Abstract: 
In the realm of consumer Internet of Things environments, data related to personal health and medical records can be collected. However, as this healthcare data falls under personal privacy, it must undergo encryption procedures before being uploaded to the cloud to ensure data confidentiality. Additionally, there is a desire for the encrypted data uploaded to the cloud to be compared, enabling the timely detection of anomalous data. If there are issues with healthcare data, the cloud system can issue alerts. Indeed, there already exists a mechanism, namely identity-based signcryption with equality test (IBSCET), which can accomplish the desire by comparing whether two encrypted data contain the same message. However, IBSCET does not address the issue of user revocation, which is crucial in any system. To address this problem, we enhance the existing IBSCET to propose the first outsourced revocable IBSCET (OR-IBSCET) scheme. Under the bilinear Diffie-Hellman and the computational Diffie-Hellman assumptions, we also demonstrate that the proposed scheme possesses security of the indistinguishability under chosen ciphertext attacks, the existential unforgeability under chosen message attacks, and one-wayness under chosen ciphertext attacks.
URI: http://scholars.ntou.edu.tw/handle/123456789/26473
ISSN: 0098-3063
DOI: 10.1109/tce.2024.3460753�?0.1109/TCE.2024.346
Appears in Collections:資訊工程學系

Show full item record

Google ScholarTM

Check

Altmetric

Altmetric

Related Items in TAIR


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback