Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing

被引:16
作者
Zhang, Yu-lei [1 ]
Wen, Long [1 ]
Zhang, Yong-jie [2 ]
Wang, Cai-fen [3 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
[2] Gansu Hlth Vocat Coll, Lanzhou 730000, Peoples R China
[3] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518000, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Deniably authenticated encryption; Identity privacy; Searchable encryption; Medical image; PUBLIC-KEY ENCRYPTION; KEYWORD SEARCH; DESIGNATED TESTER; INTERNET;
D O I
10.1007/s11042-020-09213-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the cloud applications of medical data based on blockchain, doctors and managers usually want to obtain image data shared by other healthcare institutions. To ensure the privacy and workability of the image data, it is necessary to encrypt plain image data, retrieve cypher data and verify the authenticity of the data. Public key authenticated searchable encryption (PAEKS) is an effective mechanism to realize the privacy and workability properties of data. However, the existing PAEKS schemes are unable to realize the identity privacy protection of the data owner, and the traditional blockchain system (such as the Bitcoin) cannot achieve these goals directly. To overcome the above drawback, we first present a deniably authenticated searchable encryption scheme for medical image data sharing (DASES) that is based on blockchain and deniably authenticated encryption technology. The DASES takes advantage of blockchain technology to ensure the non-tampered, unforgettable and traceability of the image data, and it also avoids the limitation of the blockchain's own storage and computing power. The DASES can not only withstand inside keyword guessing attack (IKGA) but also provide effective privacy protection and verify the authenticity of medical image data. Hence, it can better protect the privacy of data senders and provide stronger security. Next, we prove that the DASES satisfies the indistinguishability of the ciphertext and trapdoor. It is regrettable that the DASES is less efficient than related schemes in the literature, but its greatest strength is its ability to provide better identity privacy protection and stronger security.
引用
收藏
页码:27075 / 27090
页数:16
相关论文
共 28 条
[1]   Certificateless deniably authenticated encryption and its application to e-voting system [J].
Ahene, Emmanuel ;
Jin, Chunhua ;
Li, Fagen .
TELECOMMUNICATION SYSTEMS, 2019, 70 (03) :417-434
[2]  
[Anonymous], 2010, PAIRING BASED CRYPTO
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[5]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[6]   Medical Internet of Things and Big Data in Healthcare [J].
Dimitrov, Dimiter V. .
HEALTHCARE INFORMATICS RESEARCH, 2016, 22 (03) :156-163
[7]   Generic constructions of secure-channel free searchable encryption with adaptive security [J].
Emura, Keita ;
Miyaji, Atsuko ;
Rahman, Mohammad Shahriar ;
Omote, Kazumasa .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) :1547-1560
[8]   Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things [J].
He, Debiao ;
Ma, Mimi ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3618-3627
[9]  
Huang Dong-Mei, 2016, Journal of Software, V27, P1729, DOI 10.13328/j.cnki.jos.005039
[10]   A Secure Outsourcing Search Scheme for Encrypted Remote Sensing Images [J].
Huang Dongmei ;
Wu Guojian ;
Wei Lifei ;
Wei Quanmiao ;
Liang, Dai .
LASER & OPTOELECTRONICS PROGRESS, 2019, 56 (03)