Poster Abstract: Threshold Cryptography-based Authentication Protocol for Remote Healthcare

Qipeng Xie, Zhihe Zhao, Linshan Jiang, Siyang Jiang, Salabat Khan, Weizheng Wang, Kaishun Wu

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

5 Citations (Scopus)

Abstract

With the advancement of the Internet of Medical Things (IoMT) and cryptographic technologies, remote healthcare services have become more widespread, presenting new challenges for patient privacy and data security. Conventional security mechanisms, such as centralized authentication and key distribution systems, are susceptible to single points of failure and significant management burdens, potentially leading to compromised authentication centers and internal security threats. In response, this study presents a threshold signature algorithm, it uses Distributed Key Generation (DKG) that distributes private keys without the need for a trusted key distributor, requiring the cooperative signature of at least two nodes for authentication. This approach not only circumvents the risk of single points of failure but also enhances the system's robustness and efficiency. The experimental results validate its prospective utility in safeguarding remote healthcare data. © 2024 IEEE.
Original languageEnglish
Title of host publicationProceedings - 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2024)
PublisherIEEE
Pages303-304
ISBN (Electronic)979-8-3503-6201-5
DOIs
Publication statusPublished - 2024
Event23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024 - Hong Kong, China
Duration: 13 May 202416 May 2024

Publication series

NameProceedings - ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN

Conference

Conference23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2024
Country/TerritoryChina
CityHong Kong
Period13/05/2416/05/24

Bibliographical note

Full text of this publication does not contain sufficient affiliation information. With consent from the author(s) concerned, the Research Unit(s) information for this record is based on the existing academic department affiliation of the author(s).

Research Keywords

  • Authentication Protocol
  • IoMT
  • Threshold Cryptography

Fingerprint

Dive into the research topics of 'Poster Abstract: Threshold Cryptography-based Authentication Protocol for Remote Healthcare'. Together they form a unique fingerprint.

Cite this