4.6 Article

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

期刊

COMPUTER STANDARDS & INTERFACES
卷 88, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.csi.2023.103784

关键词

Identity authentication; Fine-grained access control; Attribute revocation; Attribute tracking

向作者/读者索取更多资源

This paper discusses the use of electronic medical systems for remote diagnosis and treatment services, addressing concerns about privacy and proposing an efficient and novel identity authentication protocol with revocation and tracking. The protocol is based on a linear secret sharing scheme and provides security properties such as data integrity, confidentiality, non-repudiation, and data freshness.
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to use the electronic medical system to obtain remote diagnosis and treatment services, which improves the convenience of people's lives. However, people are worried that their private information will be compromised when they use the electronic medical system. To solve the above problems, a large number of identity authentication protocols have been designed to protect user privacy. To further provide fine-grained access control, attribute-based cryptography is employed to design identity authentication protocol, however, most existing protocols do not consider the user revocation problem. In this paper, to meet the actual requirements of user revocation in an electronic medical system, an efficient and novel identity authentication protocol with revocation and tracking is designed based on a linear secret sharing scheme. The unforgeability and anonymity of our proposal are formally proved based on the corresponding complexity assumption. Also, both security analysis and performance analysis show that our protocol has many security properties, such as data integrity, confidentiality, non-repudiation, forward and backward secrecy, data freshness, etc. That is, our protocol is secure, efficient, and highly practical.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据