An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System

被引:4
作者
Li, Li [1 ,2 ]
Zhou, Siqin [1 ,2 ]
Choo, Kim-Kwang Raymond [3 ]
Li, Xiaohong [4 ]
He, Debiao [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Jiangsu, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[4] Wuhan Univ, Comp Sch, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2018/7524102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic prescription is increasingly popular in our society, particularly in technologically advanced countries. Due to strict legal requirements and privacy regulations, authorization and data confidentiality are two important features in electronic prescription system. By combining signature and encryption functions, signcryption is an efficient cryptographic primitive that can be used to provide these two features. While signcryption is a fairly established research area, most signcryption schemes proposed recently have several limitations (e.g., high communication costs, limited bandwidth, and insecurity), and designing secure and practical signcryption schemes remains challenging. In this paper, we propose an improved certificateless proxy signcryption (CLPSC) scheme, based on elliptic curve cryptography (ECC). We also demonstrate that the proposed CLPSC scheme is secure in the random oracle model and evaluate its performance with related schemes. The security and performance evaluations show that the proposed CLPSC scheme can potentially be implemented on resource-constrained low-computing mobile devices in an electronic prescription system.
引用
收藏
页数:11
相关论文
共 21 条
  • [1] An JH, 2002, LECT NOTES COMPUT SC, V2332, P83
  • [2] [Anonymous], IACR CRYPTOL EPRINT
  • [3] Cryptanalysis and improvement of certificateless proxy signcryption scheme for e-prescription system in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    [J]. ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 563 - 576
  • [4] Brits H, 2017, S AFR FAM PRACT, V59, P52, DOI 10.1080/20786190.2016.1254932
  • [5] Chao Wang, 2009, Proceedings of the Second International Symposium on Information Science and Engineering (ISISE 2009), P376, DOI 10.1109/ISISE.2009.132
  • [6] Primary Medication Non-Adherence: Analysis of 195,930 Electronic Prescriptions
    Fischer, Michael A.
    Stedman, Margaret R.
    Lii, Joyce
    Vogeli, Christine
    Shrank, William H.
    Brookhart, M. Alan
    Weissman, Joel S.
    [J]. JOURNAL OF GENERAL INTERNAL MEDICINE, 2010, 25 (04) : 284 - 290
  • [7] Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 64 - 73
  • [8] Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Wu, Wei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2052 - 2064
  • [9] Perceptions of e-prescribing efficiencies and inefficiencies in ambulatory care
    Lapane, Kate L.
    Rosen, Rochelle K.
    Dube, Catherine
    [J]. INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2011, 80 (01) : 39 - 46
  • [10] Efficient proxy signcryption scheme with provable CCA and CMA security
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    Yeh, Yi-Shiung
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (07) : 1850 - 1858