期刊文献+

灵活访问且模糊可搜索的EHR云服务系统 被引量:1

Flexibly Accessed and Vaguely Searchable EHR Cloud Service System
下载PDF
导出
摘要 在电子健康记录系统(E-Healthcare Record Systems,EHRS)中,一些方案利用密钥策略ABE(KP-ABE)来保护隐私。由用户指定一个访问策略,密文只有与访问策略相匹配时才能被解密。现有的KP-ABE要求在生成密钥期间必须先确定访问策略,这在EHRS中是不可行的,因为有时访问策略在密钥生成后才被决定。基于KP-ABE,提出一种灵活访问且模糊可搜索的EHR云服务系统。该系统不仅实现了基于关键字容错的云端密文搜索,而且允许用户重新定义访问策略并为之生成密钥,因此一个精确的访问策略将不再是必需的。最后,证明了该方案的安全性。 In e-healthcare record systems(EHRS),some schemes exploit key-policy ABE(KP-ABE)to protect privacy.An access policy is specified by the user,and the ciphertexts can be decrypted only when they match users’access plicy.The existing KP-ABE requires that the access policies should be confirmed first during key generation,which is not always practicable in EHRS,because the policies are sometimes confirmed after key generation.Based on KP-ABE,this paper proposed a flexibly accessed and vaguely searchable EHR cloud service system.This system not only fulfills the cloud ciphertext search based on keyword fault-tolerant technique,but also allows users to redefine their access policies and generates keys for the redefined ones,hence,a precise policy is no longer necessary.Finally,the scheme was proved to be secure.
作者 闫铭 张应辉 郑东 吕柳迪 苏昊楠 YAN Ming;ZHANG Ying-hui;ZHENG Dong;LV Liu-di;SU Hao-nan(National Engineering Laboratory for Wireless Security,Xi’an University of Posts and Telecommunications,Xi’an 710121,China;Westone Cryptologic Research Center,Beijing 100070,China;State Key Laboratory of Cryptology,Beijing 100878,China)
出处 《计算机科学》 CSCD 北大核心 2018年第10期172-177,共6页 Computer Science
基金 国家自然科学基金项目(61472472 61402366) 陕西省自然科学基础研究计划项目(2015JQ6236 2013JZ020)资助
关键词 电子健康记录 属性加密 访问控制 模糊搜索 关键字容错 E-healthcare record Attribute-based encryption Access control Vaguely searchable Keyword fault tolerant
  • 相关文献

参考文献2

二级参考文献10

  • 1Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword searcb//Proceedings of the EUROCRYPT'04. Interlaken, Switzerland, 2004: 506-522.
  • 2Boneh D, Franklin M. Identity-based encryption from the weil pairing. Advances in Cryptology-Crypto, 2001, 2139 213-229.
  • 3Waters B R, Balfanz D, Durfee G, et al. Building an encrypted and searchable audit log//Proceedings of the Network and Distributed System Security Symposium 2004. San Diego, USA, 2004: 16-24.
  • 4Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search//Proceedings of the 5th International Workshop on Information Security Applications. Jeju Island, Korea, 2004: 73-86.
  • 5Abdalla M, Bellare M, Catalano D, et al. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Journal of Cryptology, 2008, 21 (3) : 350-391.
  • 6Boyen X, Waters B. Anonymous hierarchical identity-based encryption (without random oracles)//Proceedings of the CRYPTO 2006. Santa Barbara, USA, 2006:290-307.
  • 7Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing//Proceedings of the 29th IEEE International Conference on Computer Communications. San Diego, USA, 2010: 1-5.
  • 8Cao N, Wang C, Li M, et al. Privacy-preserving multi- keyword ranked search over encrypted cloud data//Proceedings of the 30th IEEE International Conference on Computer Communications. Shanghai, China, 2011:829-837.
  • 9Goyal V, Pandey O, Sahai A, et al. Attribute-based encryp- tion for fine-grained access control of encrypted data//Proceedings of the 13th ACM Conference on Computer and Communications Security. New York, USA, 2006:89 98.
  • 10Beimei A. Secure schemes for secret sharing and key distri- bution [Ph.D. dissertation]. Technion, Haifa, Israel: Israel Institute of Technology, 1996.

共引文献47

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部