http://scholars.ntou.edu.tw/handle/123456789/26473| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.author | Tsai, Tung-Tso | en_US |
| dc.contributor.author | Lin, Han-Yu | en_US |
| dc.contributor.author | Huang, Wei-Ning | en_US |
| dc.contributor.author | Kumar, Sachin | en_US |
| dc.contributor.author | Agarwal, Kadambri | en_US |
| dc.contributor.author | Chen, Chien-Ming | en_US |
| dc.date.accessioned | 2026-03-12T03:36:50Z | - |
| dc.date.available | 2026-03-12T03:36:50Z | - |
| dc.date.issued | 2025/5/1 | - |
| dc.identifier.issn | 0098-3063 | - |
| dc.identifier.uri | http://scholars.ntou.edu.tw/handle/123456789/26473 | - |
| dc.description.abstract | In the realm of consumer Internet of Things environments, data related to personal health and medical records can be collected. However, as this healthcare data falls under personal privacy, it must undergo encryption procedures before being uploaded to the cloud to ensure data confidentiality. Additionally, there is a desire for the encrypted data uploaded to the cloud to be compared, enabling the timely detection of anomalous data. If there are issues with healthcare data, the cloud system can issue alerts. Indeed, there already exists a mechanism, namely identity-based signcryption with equality test (IBSCET), which can accomplish the desire by comparing whether two encrypted data contain the same message. However, IBSCET does not address the issue of user revocation, which is crucial in any system. To address this problem, we enhance the existing IBSCET to propose the first outsourced revocable IBSCET (OR-IBSCET) scheme. Under the bilinear Diffie-Hellman and the computational Diffie-Hellman assumptions, we also demonstrate that the proposed scheme possesses security of the indistinguishability under chosen ciphertext attacks, the existential unforgeability under chosen message attacks, and one-wayness under chosen ciphertext attacks. | en_US |
| dc.language.iso | English | en_US |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | en_US |
| dc.relation.ispartof | IEEE TRANSACTIONS ON CONSUMER ELECTRONICS | en_US |
| dc.subject | Cloud computing | en_US |
| dc.subject | Encryption | en_US |
| dc.subject | Public key | en_US |
| dc.subject | Medical services | en_US |
| dc.subject | Servers | en_US |
| dc.subject | Clouds | en_US |
| dc.subject | Symbols | en_US |
| dc.subject | Revocation | en_US |
| dc.subject | identity-based signcryption | en_US |
| dc.subject | consumer IoT | en_US |
| dc.title | Anomaly Detection Through Outsourced Revocable Identity-Based Signcryption With Equality Test for Sensitive Data in Consumer IoT Environments | en_US |
| dc.type | journal article | en_US |
| dc.identifier.doi | 10.1109/tce.2024.3460753�?0.1109/TCE.2024.346 | - |
| dc.identifier.isi | WOS:001554481300021 | - |
| dc.relation.journalvolume | 71 | en_US |
| dc.relation.journalissue | 2 | en_US |
| dc.relation.pages | 6327-6339 | en_US |
| dc.identifier.eissn | 1558-4127�?558- | - |
| item.grantfulltext | none | - |
| item.fulltext | no fulltext | - |
| item.cerifentitytype | Publications | - |
| item.languageiso639-1 | English | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_6501 | - |
| item.openairetype | journal article | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.dept | College of Electrical Engineering and Computer Science | - |
| crisitem.author.dept | Department of Computer Science and Engineering | - |
| crisitem.author.dept | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| crisitem.author.parentorg | National Taiwan Ocean University,NTOU | - |
| crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
| 顯示於: | 資訊工程學系 | |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。