Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

被引:3
作者
Chen, Yanan [1 ,2 ,3 ,4 ]
Yao, Ting [1 ,4 ]
Ren, Haiping [2 ]
Gan, Zehao [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Jiangxi Univ Sci & Technol, Basic Course Teaching Dept, Nanchang 330013, Jiangxi, Peoples R China
[3] Univ Elect Sci & Technol China, Inst Elect & Informat Engn, Dongguan 523808, Peoples R China
[4] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Peoples R China
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2022年 / 131卷 / 03期
基金
中国国家自然科学基金;
关键词
Proxy re-signature; key insulation; electronic medical record (EHR); random oracle model; CLOUD;
D O I
10.32604/cmes.2022.019589
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data. Considering referral treatment for patients, the original signature needs to be converted into a re-signature that can be verified by the new organization. Proxy re-signature (PRS) can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data. Unfortunately, the existing PRS schemes cannot realize forward and backward security. Therefore, this paper proposes the first PRS scheme that can provide key-insulated property, which can guarantee both the forward and backward security of the key. Although the leakage of the private key occurs at a certain moment, the forward and backward key will not be attacked. Thus, the purpose of key insulation is implemented. What's more, it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public key. Besides, the unforgeability of our scheme is proved based on the extended Computational Diffie-Hellman assumption in the random oracle model. Finally, the experimental simulation demonstrates that our scheme is feasible and in possession of promising properties.
引用
收藏
页码:1497 / 1513
页数:17
相关论文
共 44 条
[1]  
Ateniese G., 2005, P 12 ACM C COMP COMM, P310, DOI DOI 10.1145/1102120.1102161
[2]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[3]   Verifiable dynamic ranked search with forward privacy over encrypted cloud data [J].
Chen, Chien-Ming ;
Tie, Zhuoyu ;
Wang, Eric Ke ;
Khan, Muhammad Khurram ;
Kumar, Sachin ;
Kumari, Saru .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) :2977-2991
[4]   Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key [J].
Chen, Wenbin ;
Li, Jin ;
Huang, Zhengan ;
Gao, Chongzhi ;
Yiu, Siuming ;
Jiang, Zoe L. .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2021, 120 :137-148
[5]  
Dodis Y, 2003, LECT NOTES COMPUT SC, V2567, P130
[6]   A privacy-preserving cryptosystem for IoT E-healthcare [J].
Hamza, Rafik ;
Yan, Zheng ;
Muhammad, Khan ;
Bellavista, Paolo ;
Titouna, Faiza .
INFORMATION SCIENCES, 2020, 527 :493-510
[7]  
He K, 2015, 2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), P159, DOI 10.1109/IWQoS.2015.7404727
[8]   Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles [J].
Huang, Cheng ;
Lu, Rongxing ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (11) :11169-11180
[9]   Blockchain distributed ledger technologies for biomedical and health care applications [J].
Kuo, Tsung-Ting ;
Kim, Hyeon-Eui ;
Ohno-Machado, Lucila .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2017, 24 (06) :1211-1220
[10]  
Libert B, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P511