Netinfo Security ›› 2016, Vol. 16 ›› Issue (12): 46-50.doi: 10.3969/j.issn.1671-1122.2016.12.007
• Orginal Article • Previous Articles Next Articles
Fei CHEN(), Yifan Si, Yiliang HAN
Received:
2016-10-15
Online:
2016-12-20
Published:
2020-05-13
CLC Number:
Fei CHEN, Yifan Si, Yiliang HAN. Hybird Attribute-based Encryption Signature Scheme for PHR System[J]. Netinfo Security, 2016, 16(12): 46-50.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2016.12.007
[1] | 朱鹏飞,张利琴,李伟,等.交互型电子签名的形式化分析[J]. 信息网络安全,2016(9):31-34. |
[2] | KIM M I, JOHNSON K B.Personal Health Records[J]. Journal of the American Medical Informatics Association, 2003, 9(2): 171-180. |
[3] | LOHR H, SADEGHI A R, WINDANDY M.Securing the e-health Cloud[C]// ACM.1st ACM International Health Informatics Symposium, November 11-12, 2010. Arlington, Virginia, USA. New York: ACM, 2010: 220-229. |
[4] | GOYAL V, PANDEY O, SAHAI A, et al.Attribute-based Encryption for Fine Grained Access Control of Encrypted Data[C]// ACM.13th ACM conference on Computer and Communications Security. October 30-November 3, 2006. Alexandria, Virginia, USA. New York: ACM, 2006: 89-98. |
[5] | MAJI H, PRABHAKARAN M, ROSULEK M.Attribute-based Signatures[C]//CT-RSA.The conference on Cryptology CT-RSA 2011. February 14-18, 2011, San Francisco, USA. Berlin: Springer, 2011: 376-392. |
[6] | LIU Jianghua, HUANG Xinyi, LIU Joseph, Secure Sharing of Personal Health Records in Cloud Computing: Cihpertext Policy Attribute Based Signcryption[J]. Future Generation Computer Systems, 2015, 52(11): 67-76. |
[7] | GAGNE M, NARAYAN S, SAFAVI-NAINI R.Threshold Attribute-based Signcryption[C]// Springer.Proceedings of the 7th International Conference on Security and Cryptography for Networks. September 13-15, 2010. Amalfi, Italy. Berlin: Springer, 2010: 154-171. |
[8] | PANDIT T, KUMAR P S, BARUA R.Attribute-based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-predicates Attack[C]//Springer.Proceedings of the 8th International Conference on Provable Security. October 9-10, 2014. Hong Kong, China. Berlin: Springer, 2014: 274-290. |
[9] | RAO S Y, DUTTA R.Efficient Attribute-based Signature and Signcryption Realizing Expressive Access Structures[J]. International Journal of Information Security, 2016,15(1): 1-29. |
[10] | IBRAIMI L, ASIM M, PETKOVIC M.Secure Mangagement of Personal Health Records by Applying Attribute Based Encryption[C]// IEEE.Proceedings of the 6th International Conference on Wearable, Micro, and Nano Techologies for Personalized Health, June 24-26, 2009. Oslo, Norway. New Jersey:IEEE, 2009: 71-74. |
[11] | ZHENG Yao, YU Shucheng, LI Ming, et al.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute based Encryption[J]. IEEE Transactions on parallel and distribute systems. 2013, 24(1): 131-143. |
[12] | WAGNER P J, DIAS J, HOWARS S, et al.Personal Health Rerecord and Hypertension Control: a Randomized Trial[J]. Journal of the American Medical Informatics Association, 2012, 19(4): 626-634. |
[13] | CHEN Cheng, CHEN Jie, LIM Hoonwei, et al.Combined Public-key Schemes:the Case of ABE and ABS[C]//Springer.Proceedings of the Conference on Provable Security 2012. September 26-28, 2012. Chengdu, China. Berlin: Springer, 2012: 53-69. |
[14] | GREEN M, HOHENBERGER S, WATERS B.Outsourcing the Decryption of ABE Ciphertexts[C]//ACM.Proceedings of the 20th USENIX Conference on Security. August 8-12, 2011. San Francisco, USA. New York: ACM, 2011: 34-49. |
[15] | 王皓,郑志华,吴磊,等.自适应安全的外包CP-ABE方案研究[J].计算机研究与发展. 2015,52(10):2270-2280. |
[16] | 张永强,卢伟龙,唐春明.一种高效实用的基于云服务的数字签名方案研究[J]. 信息网络安全,2016(7):1-6. |
[17] | QIN Baodong, DENG Robert H, LIU Shengli, et al.Attribute-based Encryption with Efficient Verifiable Outsourced Decryption[J]. IEEE Transaction on Information Forensics and Security, 2015, 10(7):1384-1393. |
[18] | WATER B.Ciphertext Policy Attribute Based Encryption: an Expressive, Efficient, and Provably Secure Realization[C]// ACM.Proceedings of the 14th International Conference on Practice and Theory of Public Key Cryptography, March 6-9, 2011. Taormina, Italy. New York: ACM, 2011: 53-70. |
[19] | 张言胜,汪学明,仇各各.一种新的动态门限数字签名方案研究[J]. 信息网络安全,2016(6):62-67. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||