Authenticated Medical Documents Releasing with Privacy Protection and Release Control

被引:15
作者
Liu, Jianghua [1 ]
Ma, Jinhua [2 ]
Xiang, Yang [3 ,4 ]
Zhou, Wanlei [5 ]
Huang, Xinyi [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350000, Fujian, Peoples R China
[3] Swinburne Univ Technol, Sch Software & Elect Engn, Hawthorn, Vic 3122, Australia
[4] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Shaanxi, Peoples R China
[5] Univ Technol Sydney, Sch Software, 15 Broadway, Ultimo, NSW 2007, Australia
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Medical services; Privacy; Medical diagnostic imaging; Authentication; Data privacy; Companies; Medical document release; privacy preservation; data authentication; release control;
D O I
10.1109/TDSC.2019.2892446
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of Information Societies, a tremendous amount of information is daily exchanged or released. Among various information-release cases, medical document release has gained significant attention for its potential in improving healthcare service quality and efficacy. However, integrity and origin authentication of released medical documents is the priority in subsequent applications. Moreover, sensitive nature of much of this information also gives rise to a serious privacy threat when medical documents are uncontrollably made available to untrusted third parties. Redactable signatures allow any party to delete pieces of an authenticated document while guaranteeing the origin and integrity authentication of the resulting (released) subdocument. Nevertheless, most of existing redactable signature schemes (RSSs) are vulnerable to dishonest redactors or illegal redaction detection. To address the above issues, we propose two distinct RSSs with flexible release control (RSSs-FRC). We also analyse the performance of our constructions in terms of security, efficiency and functionality. The analysis results show that the performance of our construction has significant advantages over others, from the aspects of security and efficiency.
引用
收藏
页码:448 / 459
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 1996, THESIS ISR I TECHN T
[2]  
[Anonymous], 2012, International Conference on Financial Cryptography and Data Security
[3]  
Baric N., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P480
[4]  
Becker G., 2008, MERKLE SIGNATURE SCH, V9085
[5]  
Benaloh Josh, 1993, Proceedings (Lecture Notes in Computer Science, P274, DOI DOI 10.1007/3-540-48285-7_24
[6]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]  
Brown J. L., 2012, THESIS GEORG I TECHN
[8]  
Brzuska C, 2010, LECT NOTES COMPUT SC, V6123, P87, DOI 10.1007/978-3-642-13708-2_6
[9]  
Bull L., 2004, INT J DIGIT LIBRARIE, V4, P208, DOI DOI 10.1007/S00799-004-0082-Z
[10]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195