Netinfo Security ›› 2023, Vol. 23 ›› Issue (7): 9-21.doi: 10.3969/j.issn.1671-1122.2023.07.002
Previous Articles Next Articles
Received:
2023-04-20
Online:
2023-07-10
Published:
2023-07-14
Contact:
XIE Chenlu
E-mail:372238228@qq.com
CLC Number:
SHI Runhua, XIE Chenlu. Verifiable Outsourcing EMR Scheme with Attribute-Based Encryption in Cloud-Edge Environments[J]. Netinfo Security, 2023, 23(7): 9-21.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2023.07.002
符号 | 含义表示 |
---|---|
乘法循环群 | |
哈希函数 | |
属性集合 | |
生成元 | |
系统公钥 | |
系统私钥 | |
用户公钥、私钥 | |
属性主密钥 | |
用户属性密钥 | |
关键字 | |
关键字索引 | |
DO计算的密文 | |
数字签名 | |
DO公钥加密后得到的密文 | |
FN属性加密后得到的密文 | |
陷门 | |
盲化后的属性密钥 | |
验证数字签名时生成的验证信息 | |
MS计算数字签名得到的验证证明 | |
重加密密钥 | |
重加密密文 |
功能 | 方案名称 | ||
---|---|---|---|
文献[14]方案 | 文献[23]方案 | 本文方案 | |
密钥生成 | |||
DO加密 | |||
FN加密 | — | — | |
数字签名 | — | — | |
DU解密 | 3(Ee+E2) | ||
FN解密 | — |
方案开销 | 文献[14]方案 | 文献[23]方案 | 本文方案 |
---|---|---|---|
密文存储 开销 | |||
密钥存储 开销 |
[1] |
ZAGHLOUL E, LI Tongtong, MUTKA W, et al. dd-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications[J]. IEEE Transactions on Services Computing, 2022, 15(5): 1592-1605.
doi: 10.1109/TSC.2020.3003321 URL |
[2] |
QIN Baodong, DENG R H, LIU Shengli, et al. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(7): 1384-1393.
doi: 10.1109/TIFS.2015.2410137 URL |
[3] | LENG Jiewu, RUAN Guolei, JIANG Pingyu, et al. Blockchain-Empowered Sustainable Manufacturing and Product Lifecycle Management in Industry 4.0: A Survey[EB/OL]. (2020-07-28) [2023-03-22]. https://www.sciencedirect.com/science/article/abs/pii/S1364032120304032. |
[4] | QING Yong, SUN Wei, XIONG Hu, et al. Outsourcing Encryption and Decryption CP-ABE Scheme with Revocation Storage in Cloud Computing[J]. Netinfo Security, 2017, 17(6): 6-13. |
卿勇, 孙伟, 熊虎, 等. 云计算中可撤销存储的外包加解密CP-ABE方案[J]. 信息网络安全, 2017, 17(6)6-13. | |
[5] |
ZHONG Hong, ZHOU Yiyuan, ZHANG Qingyang, et al. An Efficient and Outsourcing-Supported Attribute-Based Access Control Scheme for Edge-Enabled Smart Healthcare[J]. Future Generation Computer Systems, 2021, 115: 486-496.
doi: 10.1016/j.future.2020.09.021 URL |
[6] |
LI Xuejun, ZHANG Dan, LI Hui. Efficient Revocable Attribute-Based Encryption Scheme[J]. Journal on Communications, 2019, 40(6): 32-39.
doi: 10.11959/j.issn.1000-436x.2019150 |
李学俊, 张丹, 李晖. 可高效撤销的属性基加密方案[J]. 通信学报, 2019, 40(6): 32-39.
doi: 10.11959/j.issn.1000-436x.2019150 |
|
[7] | MA Min, FU Yu, HUANG Kai. A Principal Component Analysis Scheme for Security Outsourcing in Cloud Environment Based on Secret Sharing[J]. Netinfo Security, 2023, 23(4): 61-71. |
马敏, 付钰, 黄凯. 云环境下基于秘密共享的安全外包主成分分析方案[J]. 信息网络安全, 2023, 23(4): 61-71. | |
[8] |
HOU Yichen, SAHIL G, HUI Lin, et al. A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing[J]. IEEE Access, 2020, 8: 136119-136130.
doi: 10.1109/Access.6287639 URL |
[9] | WANG Shulan, WANG Haiyan, LI Jianqiang, et al. A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network[J]. IEEE Transactions on Industry Applications, 2020, 56(4): 4467-4477. |
[10] |
ZHANG Yinghui, ZHENG Dong, DENG R H. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control[J]. IEEE Internet of Things Journal, 2018, 5(3): 2130-2145.
doi: 10.1109/JIOT.2018.2825289 URL |
[11] |
XUE Yingjie, XUE Kaiping, GAI Na, et al. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(11): 2927-2942.
doi: 10.1109/TIFS.10206 URL |
[12] | ZHOU Zhibing, HUANG Dijiang. Efficient and Secure Data Storage Operations for Mobile Cloud Computing[C]// IEEE. 2012 8th International Conference on Network and Service Management and 2012 Workshop on Systems Virtualiztion Management. New York: IEEE, 2012: 37-45. |
[13] | ASIM M, PETKOVIC M, IGNATENKO T. Attribute-Based Encryption with Encryption and Decryption Outsourcing[EB/OL]. [2023-03-22]. https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1163&context=ism. |
[14] |
LIN Suqing, ZHANG Rui, HUI Ma, et al. Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(10): 2119-2130.
doi: 10.1109/TIFS.2015.2449264 URL |
[15] | ATALLAH M, PANTAZOPOULOS K, RICE J, et al. Secure Outsourcing of Scientific Computations[J]. Trends in Software Engineering, 2002, 54: 215-272. |
[16] | BENJAMIN D, ATALLAH M. Private and Cheating-Free Outsourcing of Algebraic Computations[C]// IEEE. Proceedings of the 6th Annual Conference on Privacy, Security and Trust. New York: IEEE, 2008: 240-245. |
[17] | ZHAO Zhiyuan, WANG Jianhua, XU Kaiyong, et al. Fully Outsourced Attribute-Based Encryption with Verifiability for Cloud Storage[J]. Journal of Computer Research and Development, 2019, 56(2): 442-452. |
赵志远, 王建华, 徐开勇, 等. 面向云存储的支持完全外包属性基加密方案[J]. 计算机研究与发展, 2019, 56(2): 442-452. | |
[18] | LENG Qingsong, LUO Wangping. Attribute-Based Encryption with Outsourced Encryption[J]. Communications Technology, 2021, 54(9): 2242-2246. |
冷青松, 罗王平. 支持加密外包的基于属性加密方案[J]. 通信技术, 2021, 54(9): 2242-2246. | |
[19] | WU Zhiwei. Privacy Protection and Data Sharing Schemes Based on Edge Computing in Smart Grid[D]. Beijing: North China Electric Power University, 2022. |
吴志伟. 智能电网中基于边缘计算的隐私保护与数据共享方案[D]. 北京: 华北电力大学, 2022. | |
[20] |
WANG Shulan, ZHOU Junwei, LIU J K, et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1265-1277.
doi: 10.1109/TIFS.2016.2523941 URL |
[21] |
ZHANG Zhiyong, LI Cheng, GBB, et al. Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes[J]. IEEE Access, 2018, 6: 38273-38284.
doi: 10.1109/ACCESS.2018.2854600 URL |
[22] |
GUO Rui, LI Xiong, ZHENG Dong, et al. An Attribute-Based Encryption Scheme with Multiple Authorities on Hierarchical Personal Health Record in Cloud[J]. The Journal of Supercomputing, 2020, 76(7):4884-4903.
doi: 10.1007/s11227-018-2644-7 |
[23] |
LI Jiguo, CHEN Ningyu, ZHANG Yichen. Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(2): 983-993.
doi: 10.1109/TETC.2019.2904637 URL |
[24] |
BONEH D, FRANKLIN M. Identity-Based Encryption from the Weil Paring[J]. SIAM Journal on Computing, 2003, 32(3): 586-615.
doi: 10.1137/S0097539701398521 URL |
[1] | ZHOU Quan, CHEN Minhui, WEI Kaijun, ZHENG Yulong. Blockchain Access Control Scheme with SM9-Based Attribute Encryption [J]. Netinfo Security, 2023, 23(9): 37-46. |
[2] | ZHANG Xiaoxu, SHI Runhua. An Access Control Scheme for Verifying the Correctness of Outsourcing Encrypted Data in EHR System [J]. Netinfo Security, 2023, 23(5): 85-94. |
[3] | LI Li, ZHU Jiangwen, YANG Chunyan. Overview of Research on the Revocable Mechanism of Attribute-Based Encryption [J]. Netinfo Security, 2023, 23(4): 39-50. |
[4] | GUO Rui, WEI Xin, CHEN Li. An Outsourceable and Policy-Hidden Attribute-Based Encryption Scheme in the IIoT System [J]. Netinfo Security, 2023, 23(3): 1-12. |
[5] | LI Jiahui, QIN Sujuan, GAO Fei, SUN Dongxu. Controllable and Supervised Privacy Protection Scheme for Blockchain Organization Transaction Based on Attribute Encryption [J]. Netinfo Security, 2023, 23(12): 103-112. |
[6] | ZHU Yixin, MIAO Zhangwang, GAN Jinghong, MA Cunqing. Design of Ransomware Defense System Based on Fine-Grained Access Control Scheme [J]. Netinfo Security, 2023, 23(10): 31-38. |
[7] | WANG Jian, HUANG Jun. Smart Contract-Based Log Secure Storage and Fair Access Method [J]. Netinfo Security, 2022, 22(7): 27-36. |
[8] | GUO Baoxia, WANG Jiahui, MA Limin, ZHANG Wei. Research on Dynamic Access Control Model of Sensitive Data Based on Zero Trust [J]. Netinfo Security, 2022, 22(6): 86-93. |
[9] | LIU Jiawei, MA Zhaofeng, WANG Shushuang, LUO Shoushan. Research on the Restricted Sharing Technology of Private Credit Data Based on Blockchain [J]. Netinfo Security, 2022, 22(5): 54-63. |
[10] | CUI Haoyu, MA Limin, WANG Jiahui, ZHANG Wei. Research on the Security Model of Multi-Authority for Attribute Encryption Based on Blockchain [J]. Netinfo Security, 2022, 22(5): 84-93. |
[11] | ZHANG Xuewang, YAO Yaning, LI Zhihong, ZHANG Hao. Data Sharing Scheme Based on Consortium Blockchain and Asmuth-Bloom Secret Sharing Algorithm [J]. Netinfo Security, 2022, 22(11): 17-23. |
[12] | LI Tong, REN Shuai, WANG Gang, MENG Qingyu. Cloud-edge-device Collaborative Integrity Verification Scheme Based on Chameleon Authentication Tree for Streaming Data [J]. Netinfo Security, 2022, 22(1): 37-45. |
[13] | JIN Shuting, HE Jingsha, ZHU Nafei, PAN Shijia. Research on Privacy Protection Access Control Mechanism Based on Ontology Reasoning [J]. Netinfo Security, 2021, 21(8): 52-61. |
[14] | SHEN Zhuowei, GAO Peng, XU Xinyu. Design of DDS Secure Communication Middleware Based on Security Negotiation [J]. Netinfo Security, 2021, 21(6): 19-25. |
[15] | LU Xiaofeng, FU Songbing. A Trusted Data Access Control Scheme Combining Attribute-based Encryption and Blockchain [J]. Netinfo Security, 2021, 21(3): 7-8. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||