Secure EHR Sharing Scheme Based on Limited Sanitizable Signature

被引:0
|
作者
Yang, Yang [1 ,2 ]
Yi, Bixia [2 ]
Zhan, Yonghua [2 ]
Huang, Minming [1 ,2 ]
机构
[1] Fuzhou Univ, Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[2] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Peoples R China
来源
FRONTIERS IN CYBER SECURITY, FCS 2022 | 2022年 / 1726卷
关键词
Sanitizable signature; Privacy preserving; Data sharing; Sensitive information hiding;
D O I
10.1007/978-981-19-8445-7_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many sanitizable signature schemes have been proposed to facilitate and secure the secondary use of medical data. These schemes allow a patient, authorized by the doctor, to modify and re-sign his/her electronic health record (EHR) to hide sensitive information and the new signature can be verified successfully. However, this may lead to fraud because patients may forge medical records for profit. To further standardize sanitization and reduce the sanitizers power, this paper proposes a new limited sanitizable signature scheme, which allows the signer to not only decide which message blocks can be modified but also determine the maximum of modifiable blocks and the expiration time for sanitization. We also propose a secure EHR sharing scheme suitable for medical scenarios based on the above limited sanitizable signature to realize privacy preserving medical data sharing. Finally, the security analysis and experimental results show that the security and efficiency of our scheme can be accepted.
引用
收藏
页码:288 / 303
页数:16
相关论文
共 50 条
  • [31] A provable secure fuzzy identity based signature scheme
    ChangJi Wang
    Science China Information Sciences, 2012, 55 : 2139 - 2148
  • [32] A Secure Proxy Blind Signature Scheme Based on ECDLP
    Hu, Lanlan
    Zheng, Kangfeng
    Hu, Zhengming
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 454 - 457
  • [33] Secure vehicular communications based on group signature and ID-based signature scheme
    Sun, Xiaoting
    Lin, Xiaodong
    Ho, Pin-Han
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1539 - +
  • [34] Secure group signature scheme
    Shi, Ronghua
    Hu, Xiangling
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2000, 22 (02): : 74 - 77
  • [35] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138
  • [36] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [37] BGP path verification mechanism based on sanitizable signature
    Zhao, Chen
    Sun, Bin
    Yang, Yixian
    Yang, Yan
    International Journal of Digital Content Technology and its Applications, 2012, 6 (21) : 274 - 282
  • [38] Limited proxy signature scheme based on elliptic curve
    Wang, Xiaoming
    Fu, Fangwei
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
  • [39] Forward-Secure Customizable Data Sharing in Blockchain-based EHR Systems
    Yi, Yanzi
    Feng, Xiaowen
    Tian, Xin
    Peng, Zan
    Liu, Yilin
    Deng, Hua
    Wang, Yujue
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 474 - 485
  • [40] Secure Medical Image-Sharing Mechanism based on Visual Cryptography in EHR system
    Yang, Dana
    Doh, Inshil
    Chae, Kijoon
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 463 - 467