A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems

被引:15
作者
Ullah, Insaf [1 ]
Ul Amin, Noor [1 ]
Almogren, Ahmad [2 ]
Khan, Muhammad Asghar [3 ]
Uddin, M. Irfan [4 ]
Hua, Qiaozhi [5 ]
机构
[1] Hazara Univ Mansehra, Dept Informat Technol, Mansehra 21120, Pakistan
[2] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Chair Cyber Secur, Riyadh 11633, Saudi Arabia
[3] Hamdard Univ, HIET, Islamabad Campus, Islamabad 44000, Pakistan
[4] Kohat Univ Sci & Technol, Inst Comp, Kohat 26000, Pakistan
[5] Hubei Univ Arts & Sci, Comp Sch, Xiangyang 441000, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Elliptic curves; Medical services; Medical diagnostic imaging; Public key; Tools; E-prescription; smart pharmacy; certificate based signcryption; AVISPA; hyper elliptic curve; MUTUAL AUTHENTICATION;
D O I
10.1109/ACCESS.2020.3033758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic prescription (E-prescription) is an emerging technology that allows health practitioners (doctors, physicians, pharmacists, or nurses) to electronically transmit prescriptions to pharmacies. E-prescription systems allow doctors to avoid traditional medical practices in which prescriptions are sent manually in handwritten form. Additionally, in cases in which a patient may not be able to collect the medication in person due to physical disabilities, the medications can be delivered to the patient's home directly. Furthermore, payments can also be made online (e.g., using credit cards or bank transfers). However, these distinctive features require a series of guidelines for the successful deployment of the E-prescription system due to stringent legal requirements and privacy regulations. Two major security requirements i.e. confidentiality and authentication need to be addressed. In general, the solution to ensuring confidentiality and authentication lies in the combination of both the encryption and digital signature functions in a single logic step called signcryption. Therefore, in this article, we present a lightweight and provable secured certificate-based proxy signcryption (CB-PS) scheme for e-prescription systems. The formal security verification uses the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis, which authenticates that the proposed CB-PS scheme can potentially be implemented in resource-constrained low-computing electronic devices in E-prescription systems.
引用
收藏
页码:199197 / 199212
页数:16
相关论文
共 44 条
  • [11] A New Efficient Strong Proxy Signcryption Scheme Based on a Combination of Hard Problems
    Elkamchouchi, Hassan
    Nasr, Mohammed
    Ismail, Roayat
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 5123 - +
  • [12] A new proxy signcryption scheme using warrants
    Elkamchouchi, Hassan M.
    Abouelseoud, Yasmine
    Shouaib, Wafaa S.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2011, 1 (3-4) : 309 - 327
  • [13] Elkamshoushy D. H., 2006, P 20 3 NAT RAD SCI C, P1, DOI DOI 10.1109/NRSC.2006.386345
  • [14] Gamage C, 1999, AUSTRALASIAN COMPUTE, P420
  • [15] Robust Spammer Detection Using Collaborative Neural Network in Internet-of-Things Applications
    Guo, Zhiwei
    Shen, Yu
    Bashir, Ali Kashif
    Imran, Muhammad
    Kumar, Neeraj
    Zhang, Di
    Yu, Keping
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) : 9549 - 9558
  • [16] Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices
    Karati, Arijit
    Fan, Chun-I
    Hsu, Ruei-Hau
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) : 10431 - 10440
  • [17] Efficient proxy signcryption scheme with provable CCA and CMA security
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    Yeh, Yi-Shiung
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (07) : 1850 - 1858
  • [18] A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
    Lo, Nai-Wei
    Tsai, Jia-Lun
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [19] Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
  • [20] Proxy signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1431 - 1446