Open Access
ARTICLE
Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
1
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, 610054,
China
2
Basic Course Teaching Department, Jiangxi University of Science and Technology, Nanchang, 330013, China
3
Institute of Electronic and Information Engineering, University of Electronic Science and Technology of China, Dongguan, 523808,
China
4
Network and Data Security Key Laboratory of Sichuan Province, Unversity of Electronic Science and Technology of China, Chengdu,
610054, China
* Corresponding Author: Ting Yao. Email:
(This article belongs to the Special Issue: Internet of Things in Healthcare and Health: Security and Privacy)
Computer Modeling in Engineering & Sciences 2022, 131(3), 1497-1513. https://doi.org/10.32604/cmes.2022.019589
Received 30 September 2021; Accepted 30 November 2021; Issue published 19 April 2022
Abstract
The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data. Considering referral treatment for patients, the original signature needs to be converted into a re-signature that can be verified by the new organization. Proxy re-signature (PRS) can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data. Unfortunately, the existing PRS schemes cannot realize forward and backward security. Therefore, this paper proposes the first PRS scheme that can provide key-insulated property, which can guarantee both the forward and backward security of the key. Although the leakage of the private key occurs at a certain moment, the forward and backward key will not be attacked. Thus, the purpose of key insulation is implemented. What’s more, it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public key. Besides, the unforgeability of our scheme is proved based on the extended Computational Diffie-Hellman assumption in the random oracle model. Finally, the experimental simulation demonstrates that our scheme is feasible and in possession of promising properties.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.