Privacy-preserving Multi-authority Attribute-based Encryption with Dynamic Policy Updating in PHR

被引:23
作者
Yan, Xixi [1 ]
Ni, Hao [1 ]
Liu, Yuan [1 ]
Han, Dezhi [2 ]
机构
[1] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454003, Henan, Peoples R China
[2] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; privacy preserving; policy dynamic updating; fine-grained access control; personal health record; ACCESS-CONTROL; REVOCATION; SECURITY;
D O I
10.2298/CSIS180830029Y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a new kind of patient-centred health-records model, the personal health record (PHR) system can support the patient in sharing his/her health information online. Attribute-Based Encryption (ABE), as a new public key cryptosystem that guarantees fine-grained access control of outsourced encrypted data, has been used to design the PHR system. Considering that privacy preservation and policy updating are the key problems in PHR, a privacy-preserving multi-authority attribute-based encryption scheme with dynamic policy updating in PHR was proposed. In the scheme, each of the patient's attributes is divided into two parts: attribute name and attribute value. The values of the user's attributes will be hidden to prevent them from being revealed to any third parties. In addition, the Linear Secret-Sharing Scheme (LSSS) access structure and policy-updating algorithms are designed to support all types of policy updating (based on "and", "or", and "not" operations). Finally, the scheme is demonstrated to be secure against chosen-plaintext attack under the standard model. Compared to the existing related schemes, the sizes of the user's secret key and ciphertext are reduced, and the lower computing cost makes it more effective in the PHR system.
引用
收藏
页码:831 / 847
页数:17
相关论文
共 23 条
  • [1] Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
  • [2] Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8
  • [3] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
  • [4] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
  • [5] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [6] Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Zhou, Jianying
    Au, Man Ho Allen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 665 - 678
  • [7] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [8] Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (05) : 533 - 548
  • [9] Lai J, 2012, CRIT STUD ASIA PAC S, P1, DOI 10.1057/9781137265333
  • [10] Decentralizing Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 568 - 588