TY - GEN
T1 - Poster Abstract
T2 - 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024
AU - Xie, Qipeng
AU - Zhao, Zhihe
AU - Jiang, Linshan
AU - Jiang, Siyang
AU - Khan, Salabat
AU - Wang, Weizheng
AU - Wu, Kaishun
N1 - Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).
PY - 2024
Y1 - 2024
N2 - With the advancement of the Internet of Medical Things (IoMT) and cryptographic technologies, remote healthcare services have become more widespread, presenting new challenges for patient privacy and data security. Conventional security mechanisms, such as centralized authentication and key distribution systems, are susceptible to single points of failure and significant management burdens, potentially leading to compromised authentication centers and internal security threats. In response, this study presents a threshold signature algorithm, it uses Distributed Key Generation (DKG) that distributes private keys without the need for a trusted key distributor, requiring the cooperative signature of at least two nodes for authentication. This approach not only circumvents the risk of single points of failure but also enhances the system's robustness and efficiency. The experimental results validate its prospective utility in safeguarding remote healthcare data. © 2024 IEEE.
AB - With the advancement of the Internet of Medical Things (IoMT) and cryptographic technologies, remote healthcare services have become more widespread, presenting new challenges for patient privacy and data security. Conventional security mechanisms, such as centralized authentication and key distribution systems, are susceptible to single points of failure and significant management burdens, potentially leading to compromised authentication centers and internal security threats. In response, this study presents a threshold signature algorithm, it uses Distributed Key Generation (DKG) that distributes private keys without the need for a trusted key distributor, requiring the cooperative signature of at least two nodes for authentication. This approach not only circumvents the risk of single points of failure but also enhances the system's robustness and efficiency. The experimental results validate its prospective utility in safeguarding remote healthcare data. © 2024 IEEE.
KW - Authentication Protocol
KW - IoMT
KW - Threshold Cryptography
UR - http://www.scopus.com/inward/record.url?scp=85198555031&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85198555031&origin=recordpage
U2 - 10.1109/IPSN61024.2024.00052
DO - 10.1109/IPSN61024.2024.00052
M3 - RGC 32 - Refereed conference paper (with host publication)
T3 - Proceedings - ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN
SP - 303
EP - 304
BT - Proceedings - 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2024)
PB - IEEE
Y2 - 13 May 2024 through 16 May 2024
ER -