Utilizing Blockchain for IoT Privacy through Enhanced ECIES with Secure Hash Function.
Yurika Pant KhanalAbeer AlsadoonKhurram ShahzadAhmad B. Al-KhalilPenatiyana W. C. PrasadSabih ur RehmanRafiqul IslamPublished in: Future Internet (2022)
Keyphrases
- hash functions
- authentication protocol
- rfid systems
- stream cipher
- security issues
- provably secure
- identity management
- block cipher
- secret key
- key management
- hashing algorithm
- similarity search
- cloud computing
- user privacy
- hamming distance
- cryptographic protocols
- encryption scheme
- management system
- security mechanisms
- sensitive data
- authentication scheme
- privacy preserving
- hash table
- security properties
- locality sensitive hashing
- user authentication
- data security
- hash tables
- diffie hellman
- security protocols
- hashing methods
- security analysis
- rfid tags
- data distribution
- neural network
- nearest neighbor search
- data analysis
- electronic payment
- feature extraction