Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Taehoon | - |
dc.contributor.author | Kim, Wonbin | - |
dc.contributor.author | Seo, Daehee | - |
dc.contributor.author | Lee, Imyeong | - |
dc.date.accessioned | 2021-09-10T05:48:25Z | - |
dc.date.available | 2021-09-10T05:48:25Z | - |
dc.date.issued | 2021-05 | - |
dc.identifier.issn | 1424-8220 | - |
dc.identifier.issn | 1424-3210 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/18858 | - |
dc.description.abstract | Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems' security. For instance, if a key used for encryption is lost or corrupted, then ciphertexts produced with this key cannot be decrypted any more. Hence, this paper presents two schemes for key recovery systems that can recover the lost or the corrupted keys of an Internet of Medical Things. In our proposal, when the key used for the ciphertext is needed, this key is obtained from a Key Recovery Field present in the cyphertext. Thus, the recovered key will allow decrypting the ciphertext. However, there are threats to this proposal, including the case of the Key Recovery Field being forged or altered by a malicious user and the possibility of collusion among participating entities (Medical Institution, Key Recovery Auditor, and Key Recovery Center) which can interpret the Key Recovery Field and abuse their authority to gain access to the data. To prevent these threats, two schemes are proposed. The first one enhances the security of a multi-agent key recovery system by providing the Key Recovery Field with efficient integrity and non-repudiation functions, and the second one provides a proxy re-encryption function resistant to collusion attacks against the key recovery system. | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Multidisciplinary Digital Publishing Institute (MDPI) | - |
dc.title | Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments | - |
dc.type | Article | - |
dc.publisher.location | 스위스 | - |
dc.identifier.doi | 10.3390/s21103474 | - |
dc.identifier.scopusid | 2-s2.0-85105788795 | - |
dc.identifier.wosid | 000662621500001 | - |
dc.identifier.bibliographicCitation | Sensors, v.21, no.10 | - |
dc.citation.title | Sensors | - |
dc.citation.volume | 21 | - |
dc.citation.number | 10 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Chemistry | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Instruments & Instrumentation | - |
dc.relation.journalWebOfScienceCategory | Chemistry, Analytical | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Instruments & Instrumentation | - |
dc.subject.keywordAuthor | CL-PKC | - |
dc.subject.keywordAuthor | key encapsulation | - |
dc.subject.keywordAuthor | key recovery system | - |
dc.subject.keywordAuthor | proxy re-encryption | - |
dc.subject.keywordAuthor | signcryption | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.