Skip to main content

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

Abstract

In mobile healthcare, with the gradual development of the validity of electronic information, the use of electronic signatures as electronic prescriptions for medical users has gradually been adopted by various medical institutions. This electronic prescription can simplify the complex medical treatment of patients, while reducing the burden of healthcare providers, so the medical treatment process can be more standardized, rational, humane. Because of the importance of medical signatures, in order to solve the problem that doctors cannot provide a signature also needs to consider the case of proxy signature. For proxy signature, the legality and privacy disclosure of the agents need to be considered. In the existing signature system, proxy negotiation is wildly used to grant attorney, however, this authorization process is complex, which cannot provide fine-grained access control for the identity of the agent. In this paper, based on attribute-based encryption, we propose a traceable proxy signature scheme, only when the user’s attributes satisfy the access policy, the user can decrypt the corresponding ciphertext to obtain the proxy signature right. The program can solve the signature issue in case of the doctors absence, while solving the problem of attorney abuse. Meanwhile, the authorization is completed in central authority, thus, the computational overhead is greatly reduced, a simple, safe and efficient proxy signature scheme can be achieved.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Santos-Pereira, C, Augusto, A.B, Cruz-Correia, R., et al.: A secure RBAC mobile agent access control model for healthcare institutions. In: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 349–354. IEEE (2013)

    Google Scholar 

  2. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). doi:10.1007/11426639_7

    Chapter  Google Scholar 

  3. Kim, Y.S., Chang, J.H.: Self proxy signature scheme. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(2), 335–338 (2007)

    Google Scholar 

  4. Yu, Y., Xu, C., Huang, X., et al.: An efficient anonymous proxy signature scheme with provable security. Comput. Stan. Interfaces 31(2), 348–353 (2009)

    Article  Google Scholar 

  5. Zhou, J., Cao, Z., Dong, X., et al.: 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314, 255–276 (2015)

    Article  Google Scholar 

  6. Wang, G., Lu, R., Huang, C.: PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare. In 2015 10th International Conference on Information, Communications and Signal Processing (ICICS), pp. 1–5. IEEE (2015)

    Google Scholar 

  7. Son, J., Kim, J.D., Na, H.S., et al.: Dynamic access control model for privacy preserving personalized healthcare in cloud environment. Technol. Health Care 24(S1), S123–S129 (2015)

    Article  Google Scholar 

  8. Guo, F., Mu, Y., Susilo, W., et al.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)

    Article  Google Scholar 

  9. Bodong, C., et al.: A scheme supporting efficient attribute revocation for cloud storage based on CPABE. In: International Conference on Computer Science and Service System, pp. 736–740 (2014)

    Google Scholar 

  10. Schobel, J., Schickler, M., Pryss, R., Nienhaus, H., Reichert, M: Using vital sensors in mobile healthcare business applications: challenges, examples, lessons learned. In: International Conference on Web Information Systems and Technologies, pp. 509–518 (2013)

    Google Scholar 

  11. Yu, Y.C., Hou, T.W.: An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process. Med. BIol. Eng. Comput. 52(5), 449–457 (2014)

    Article  Google Scholar 

  12. Fadini, G.P., Albiero, M., Millioni, R., et al.: The molecular signature of impaired diabetic wound healing identifies serpinB3 as a healing biomarker. Diabetologia 57(9), 1947–1956 (2014)

    Article  Google Scholar 

  13. Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput. Syst. (2016). doi:10.1016/j.future.2016.06.001

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61272151, and the High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01. The Fundamental Research Funds for the Central Universities of Central South University 2016zzts339.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Meng, D., Wang, W., Luo, E., Wang, G. (2016). Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics