Font Size: a A A

Research On Data Privacy Preserving Of Medica System Based On Attribute Signcryption

Posted on:2019-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:D F ZhengFull Text:PDF
GTID:2428330545979333Subject:Probability theory and mathematical statistics
Abstract/Summary:PDF Full Text Request
Medical system provides a data storage and sharing platform for patients and medical workers,which has become a hot issue in today's social research.The data owners store their medical information in the cloud,and manage,control and share their medical information through the network,which connects patients and doctors effectively,and brings great convenience to people's lives.But they will face the problem of data owner's medical information and identity leakage.Attribute-based cryptosystem can guarantee confidentiality,integrity and au-thenticity of data.Therefore,the use of attribute based encryption technology for medical data can achieve fine-grained access control of the data to the cloud infor-mation.Existing schemes meet the confidentiality requirements,but the length of the ciphertext is too long,conspiracy and the access structures are leaked secret.To solve the above problems,In this paper,a safe and efficient medical sharing scheme is constructed,which is of great significance for improving the privacy protection of data owners and increasing the system security performance.The main contents of this paper are as follows:1.Analyze the advantages and disadvantages of previous attribute based schemes in the aspects of anonymity,ciphertext length,and conspiracy;2.The Attribute-based signcryption scheme is proposed with fully hidden access structure.In the proposed scheme,the ciphertext and key length are indepen-dent of the number of attributes,and reduces the storage cost.The security of the scheme is analyzed and proved,and it is applied to medical system;3.It proposes a attribute-based ring signcryption scheme.In the proposed scheme,the identity of the data owner and the users is hidden at the same time to achieve two-way anonymity,which makes scheme more secure.The security of the scheme is analyzed and proved,and it is applied to the personal health record system.
Keywords/Search Tags:Attribute-based Encryption, Ring Signcryption, Collusion Attack, Lagrange Interpolating, Access Structure
PDF Full Text Request
Related items