Affiliation:
1. Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, China
2. State Key Laboratory of Integrated Service Networks (ISN), Xidian University, China
Abstract
Electronic healthcare (eHealth) systems have replaced traditional paper-based medical systems due to attractive features such as universal accessibility, high accuracy, and low cost. As a major constituent part of eHealth systems, mobile healthcare (mHealth) applies Mobile Internet Devices (MIDs) and Embedded Devices (EDs), such as tablets, smartphones, and other devices embedded in the bodies of individuals, to improve the quality of life and provide more convenient healthcare services for patients. Unfortunately, MIDs and EDs have only limited computational capacity, storage space, and power supply. By taking this into account, we present a new design to guarantee the integrity of eHealth records and the anonymity of the data owner in a more efficient and flexible way. The essence of our design is a general method which can convert any secure Attribute-Based Signature (ABS) scheme into a highly efficient and secure Online/Offline Attribute-Based Signature (OOABS) scheme. We prove the security and analyze the efficiency improvement of the new design. Additionally, we illustrate the proposed generic construction by applying it to a specific ABS scheme.
Funder
Program for New Century Excellent Talents in Fujian University
Fujian Normal University Innovative Research Team
National Natural Science Foundation of China
Distinguished Young Scholars Fund of Fujian
Publisher
Association for Computing Machinery (ACM)
Subject
Hardware and Architecture,Software
Reference57 articles.
1. Research 2 Guidance. 2012. Retrieved from http://research2guidance.com/us-1-3-billion-the-market-for-mhealth-applications-in-2012/. Research 2 Guidance. 2012. Retrieved from http://research2guidance.com/us-1-3-billion-the-market-for-mhealth-applications-in-2012/.
2. mHealth-an ultimate platform to serve the unserved;Akter Shahriar;Yearb. Med. Inform.,2010
3. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
4. Patient controlled encryption
5. Ciphertext-Policy Attribute-Based Encryption
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献