Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems☆

被引:0
作者
Zhang, Qiu [1 ]
Sun, Yinxia [1 ]
Lu, Yang [1 ]
Zhang, Guoqiang [2 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Elect Informat, Nanjing 210023, Peoples R China
[2] Hainan Normal Univ, Sch Informat Sci & Technol, Haikou 571158, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; EHR sharing; Revocation; Proxy re-signature; Signature evolution; ENCRYPTION; CLOUD; SECURE;
D O I
10.1016/j.jisa.2024.103892
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has revolutionized in the healthcare industry, particularly in the management and accessibility of Electronic health records (EHR). However, maintaining the integrity and authenticity of EHR in cloud environments remains a crucial concern. To tackle this challenge, certificateless proxy re-signature is a promising cryptographic primitive for developing a practical EHR sharing system in the cloud. User revocation is a necessary issue in such system, but revocation introduces anew challenge, namely the continued validity of signatures from revoked users. A conventional method to solve this problem is to make the unrevoked users re-sign those valid EHR by using their current signing keys, which brings a lot of burden to the users. Therefore, we should establish an efficient mechanism to ensure that only signatures of valid data from non-revoked users can pass verification. In this paper, we propose a notion called revocable certificateless proxy re-signature with signature evolution (RCLPRS-SE), which allows for dynamic management of users and the ability to update signatures efficiently in accordance with evolving data requirements. We present a concrete construction of RCLPRS-SE and provide formal security proofs in the standard model. Compared with the existing related works, our scheme has a significant advantage in terms of signature updating efficiency.
引用
收藏
页数:14
相关论文
共 45 条
  • [1] Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
  • [2] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [3] Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] A New Certificateless Proxy Re-signature Scheme In The Standard Model
    Chen, Liang
    Chen, XingYuan
    Sun, Yi
    Du, XueHui
    [J]. 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 202 - 206
  • [6] Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key
    Chen, Wenbin
    Li, Jin
    Huang, Zhengan
    Gao, Chongzhi
    Yiu, Siuming
    Jiang, Zoe L.
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2021, 120 : 137 - 148
  • [7] Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract
    Ge, Chunpeng
    Liu, Zhe
    Susilo, Willy
    Fang, Liming
    Wang, Hao
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 937 - 948
  • [8] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [9] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919
  • [10] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800