Abstract
In mobile healthcare, with the gradual development of the validity of electronic information, the use of electronic signatures as electronic prescriptions for medical users has gradually been adopted by various medical institutions. This electronic prescription can simplify the complex medical treatment of patients, while reducing the burden of healthcare providers, so the medical treatment process can be more standardized, rational, humane. Because of the importance of medical signatures, in order to solve the problem that doctors cannot provide a signature also needs to consider the case of proxy signature. For proxy signature, the legality and privacy disclosure of the agents need to be considered. In the existing signature system, proxy negotiation is wildly used to grant attorney, however, this authorization process is complex, which cannot provide fine-grained access control for the identity of the agent. In this paper, based on attribute-based encryption, we propose a traceable proxy signature scheme, only when the user’s attributes satisfy the access policy, the user can decrypt the corresponding ciphertext to obtain the proxy signature right. The program can solve the signature issue in case of the doctors absence, while solving the problem of attorney abuse. Meanwhile, the authorization is completed in central authority, thus, the computational overhead is greatly reduced, a simple, safe and efficient proxy signature scheme can be achieved.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Santos-Pereira, C, Augusto, A.B, Cruz-Correia, R., et al.: A secure RBAC mobile agent access control model for healthcare institutions. In: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 349–354. IEEE (2013)
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). doi:10.1007/11426639_7
Kim, Y.S., Chang, J.H.: Self proxy signature scheme. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(2), 335–338 (2007)
Yu, Y., Xu, C., Huang, X., et al.: An efficient anonymous proxy signature scheme with provable security. Comput. Stan. Interfaces 31(2), 348–353 (2009)
Zhou, J., Cao, Z., Dong, X., et al.: 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf. Sci. 314, 255–276 (2015)
Wang, G., Lu, R., Huang, C.: PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare. In 2015 10th International Conference on Information, Communications and Signal Processing (ICICS), pp. 1–5. IEEE (2015)
Son, J., Kim, J.D., Na, H.S., et al.: Dynamic access control model for privacy preserving personalized healthcare in cloud environment. Technol. Health Care 24(S1), S123–S129 (2015)
Guo, F., Mu, Y., Susilo, W., et al.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)
Bodong, C., et al.: A scheme supporting efficient attribute revocation for cloud storage based on CPABE. In: International Conference on Computer Science and Service System, pp. 736–740 (2014)
Schobel, J., Schickler, M., Pryss, R., Nienhaus, H., Reichert, M: Using vital sensors in mobile healthcare business applications: challenges, examples, lessons learned. In: International Conference on Web Information Systems and Technologies, pp. 509–518 (2013)
Yu, Y.C., Hou, T.W.: An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process. Med. BIol. Eng. Comput. 52(5), 449–457 (2014)
Fadini, G.P., Albiero, M., Millioni, R., et al.: The molecular signature of impaired diabetic wound healing identifies serpinB3 as a healing biomarker. Diabetologia 57(9), 1947–1956 (2014)
Rahman, F., Bhuiyan, M.Z.A., Ahamed, S.I.: A privacy preserving framework for RFID based healthcare systems. Future Gener. Comput. Syst. (2016). doi:10.1016/j.future.2016.06.001
Acknowledgments
This work is supported in part by the National Natural Science Foundation of China under Grant Numbers 61632009, 61472451 and 61272151, and the High Level Talents Program of Higher Education in Guangdong Province under Funding Support Number 2016ZJ01. The Fundamental Research Funds for the Central Universities of Central South University 2016zzts339.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Meng, D., Wang, W., Luo, E., Wang, G. (2016). Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-49148-6_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49147-9
Online ISBN: 978-3-319-49148-6
eBook Packages: Computer ScienceComputer Science (R0)