An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System

被引:4
作者
Li, Li [1 ,2 ]
Zhou, Siqin [1 ,2 ]
Choo, Kim-Kwang Raymond [3 ]
Li, Xiaohong [4 ]
He, Debiao [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Hubei, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing, Jiangsu, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[4] Wuhan Univ, Comp Sch, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2018/7524102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic prescription is increasingly popular in our society, particularly in technologically advanced countries. Due to strict legal requirements and privacy regulations, authorization and data confidentiality are two important features in electronic prescription system. By combining signature and encryption functions, signcryption is an efficient cryptographic primitive that can be used to provide these two features. While signcryption is a fairly established research area, most signcryption schemes proposed recently have several limitations (e.g., high communication costs, limited bandwidth, and insecurity), and designing secure and practical signcryption schemes remains challenging. In this paper, we propose an improved certificateless proxy signcryption (CLPSC) scheme, based on elliptic curve cryptography (ECC). We also demonstrate that the proposed CLPSC scheme is secure in the random oracle model and evaluate its performance with related schemes. The security and performance evaluations show that the proposed CLPSC scheme can potentially be implemented on resource-constrained low-computing mobile devices in an electronic prescription system.
引用
收藏
页数:11
相关论文
共 21 条
  • [11] Certificateless signcryption scheme in the standard model
    Liu, Zhenhua
    Hu, Yupu
    Zhang, Xiangsong
    Ma, Hua
    [J]. INFORMATION SCIENCES, 2010, 180 (03) : 452 - 464
  • [12] A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
    Lo, Nai-Wei
    Tsai, Jia-Lun
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [13] Makinen M., 2001, TELEMEDICINE E HLTH, V17, P217
  • [14] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [15] Qu Minghua., 1999, Sec 2: Recommended elliptic curve domain parameters
  • [16] Samadbeik M, 2017, J RES PHARM PRACT, V6, P3, DOI 10.4103/2279-042X.200993
  • [17] Saraswat V, 2017, J MATH CRYPTOL, V11, P63, DOI 10.1515/jmc-2015-0014
  • [18] Shamus Software Ltd, 2016, MIR LIB
  • [19] Steinfeld R., 2000, Information Security. Third International Workshop, ISW 2000. Proceedings (Lecture Notes in Computer Science Vol.1975), P308
  • [20] Ullah Z, 2016, INT J COMPUT SCI INF, V14, P1009