Advanced Search
Volume 45 Issue 3
Mar.  2023
Turn off MathJax
Article Contents
NIU Shufen, ZHOU Siwei, LÜ Ruixi, YAN Sen, ZHANG Meiling, WANG Caifen. Attribute-Base Signcryption Scheme Based on Cloud Computing in Mobile Medical Social Network[J]. Journal of Electronics & Information Technology, 2023, 45(3): 884-893. doi: 10.11999/JEIT220070
Citation: NIU Shufen, ZHOU Siwei, LÜ Ruixi, YAN Sen, ZHANG Meiling, WANG Caifen. Attribute-Base Signcryption Scheme Based on Cloud Computing in Mobile Medical Social Network[J]. Journal of Electronics & Information Technology, 2023, 45(3): 884-893. doi: 10.11999/JEIT220070

Attribute-Base Signcryption Scheme Based on Cloud Computing in Mobile Medical Social Network

doi: 10.11999/JEIT220070
Funds:  The National Natural Science Foundation of China (62241207, 61862058, 61662069)
  • Received Date: 2022-01-14
  • Accepted Date: 2022-07-14
  • Rev Recd Date: 2022-06-13
  • Available Online: 2022-07-19
  • Publish Date: 2023-03-10
  • The emergence of mobile medical social networks has greatly facilitated the communication of patients' conditions to each other, promoting efficient and high-quality communication and exchange between patients. However, it also causes problems of confidentiality and privacy of patient data. To solve this problem, an attribute-based signcryption scheme based on cloud-assisted verification is proposed, which can effectively protect the privacy of patient data. Patients signcrypt their health information and upload it to the cloud server. When the data user wants to access the patient's information, the cloud server helps the data user partially decrypt and verify the integrity of the data, which reduces the amount of calculation of the data user to a certain extent. At the same time, under the random oracle model, it is proved that the scheme satisfies the unforgeability under the adaptive selection message, the indistinguishability under the adaptive selection ciphertext attack, and the attribute privacy security. Theoretical analysis and numerical simulation experimental results show that the scheme is more efficient than the existing schemes in the signcryption and unsigncryption phases.
  • loading
  • [1]
    DENG Fuhu, WANG Yali, PENG Li, et al. Revocable cloud-assisted attribute-based signcryption in personal health system[J]. IEEE Access, 2019, 7: 120950–120960. doi: 10.1109/ACCESS.2019.2933636
    [2]
    ARFAOUI A, BOUDIA O R M, KRIBECHE A, et al. Context-aware access control and anonymous authentication in WBAN[J]. Computers & Security, 2020, 88: 101496. doi: 10.1016/j.cose.2019.03.017
    [3]
    XU Chang, WANG Jiachen, ZHU Liehuang, et al. Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems[J]. Peer-to-Peer Networking and Applications, 2021, 14(4): 1841–1853. doi: 10.1007/s12083-021-01075-9
    [4]
    牛淑芬, 刘文科, 陈俐霞, 等. 基于代理重加密的电子病历数据共享方案[J]. 计算机工程, 2021, 47(6): 164–171.

    NIU Shufen, LIU Wenke, CHEN Lixia, et al. Data sharing scheme of electronic medical record based on proxy Re-encryption[J] Computer Engineering, 2021, 47(6): 164–171.
    [5]
    聂旭云, 鲍阳阳, 孙剑飞, 等. 一个多授权中心的属性基签密方案[J]. 信息安全学报, 2018, 3(5): 15–24. doi: 10.19363/J.cnki.cn10-1380/tn.2018.09.02

    NIE Xuyun, BAO Yangyang, SUN Jianfei, et al. A multi-authority attribute-based signcryption scheme[J]. Journal of Cyber Security, 2018, 3(5): 15–24. doi: 10.19363/J.cnki.cn10-1380/tn.2018.09.02
    [6]
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. The 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473.
    [7]
    GE Chunpeng, SUSILO W, BAEK J, et al. Revocable attribute-based encryption with data integrity in clouds[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(5): 2864–2872.
    [8]
    牛淑芬, 宋蜜, 方丽芝, 等. 智慧医疗中基于属性加密的云存储数据共享[J]. 电子与信息学报, 2022, 44(1): 107–117. doi: 10.11999/JEIT210858

    NIU Shufen, SONG Mi, FANG Lizhi, et al. Cloud storage data sharing based on attribute encryption in smart healthcare[J]. Journal of Electronics &Information Technology, 2022, 44(1): 107–117. doi: 10.11999/JEIT210858
    [9]
    TU Shanshan, WAQAS M, HUANG Fengming, et al. A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing[J]. Computer Networks, 2021, 195: 108196. doi: 10.1016/J.COMNET.2021.108196
    [10]
    CHALLAGIDAD P S and BIRJE M N. Efficient multi-authority access control using attribute-based encryption in cloud storage[J]. Procedia Computer Science, 2020, 167: 840–849. doi: 10.1016/j.procs.2020.03.423
    [11]
    ZHENG Yuliang. Digital signcryption or how to achieve cost(signature & encryption) << cost(signature) + cost(encryption)[C]. The 17th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, USA, 1997: 165–179.
    [12]
    DENG Ningzhi, DENG Shaojiang, HU Chunqiang, et al. An efficient revocable attribute-based signcryption scheme with outsourced unsigncryption in cloud computing[J]. IEEE Access, 2020, 8: 42805–42815. doi: 10.1109/ACCESS.2019.2963233
    [13]
    LIU Suhui, CHEN Liquan, WANG Huaqun, et al. O3HSC: Outsourced online/offline hybrid signcryption for wireless body area networks[J]. IEEE Transactions on Network and Service Management, 2022, 19(3): 2421–2433.
    [14]
    MING Yang and ZHANG Tingting. Efficient privacy-preserving access control scheme in electronic health records system[J]. Sensors, 2018, 18(10): 3520. doi: 10.3390/s18103520
    [15]
    HAN Yiliang and LU Wanyi. Attribute based generalized signcryption for online social network[C]. 2015 34th Chinese Control Conference (CCC), Hangzhou, China, 2015: 6434–6439.
    [16]
    LU Yanfei, WANG Xu, HU Chunqiang, et al. A traceable threshold attribute-based signcryption for mHealthcare social network[J]. International Journal of Sensor Networks, 2018, 26(1): 43–53. doi: 10.1504/IJSNET.2018.088384
    [17]
    BOUCHAALA M, GHAZEL C, and SAIDANE L A. TRAK-CPABE: A novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing[J]. Journal of Information Security and Applications, 2021, 61: 102914. doi: 10.1016/j.jisa.2021.102914
    [18]
    BELGUITH S, KAANICHE N, HAMMOUDEH M, et al. PROUD: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted IOT applications[J]. Future Generation Computer Systems, 2020, 111: 899–918. doi: 10.1016/j.future.2019.11.012
    [19]
    OBIRI I A, XIA Qi, XIA Hu, et al. Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable[J]. Journal of Computer Security, 2022, 30(2): 291–324. doi: 10.3233/JCS-210045
    [20]
    YU Jiguo, LIU Suhui, WANG Shengling, et al. LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT[J]. IEEE Internet of Things Journal, 2020, 7(9): 7949–7966. doi: 10.1109/JIOT.2020.2992288
    [21]
    PBC Library. The pairing-based cryptography library[EB/OL]. http://crypto.stanford.edu/pbc/, 2015.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)  / Tables(3)

    Article Metrics

    Article views (765) PDF downloads(106) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return