Font Size: a A A

Researches On Post-Quantum Authentication In Electronic Health Records

Posted on:2019-11-18Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhangFull Text:PDF
GTID:2370330566461560Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Residents’ health has become the focus of social and economic development,consuming enormous human and material resources.The traditional hospital-centered health system is inefficient in dealing with chronic diseases and major diseases.An electronic health record(EHR)is a digital version of a patient’s paper chart.EHR are real-time,patient-centered records that make information available instantly and securely to authorized users.With the EHR,service providers could improve care coordination with patients,provide patients with the best care,and be able to better coordinate the care of different service providers.Patients could also improved in managing and treating chronic conditions,sharing health information.Providers and patients who share access to electronic health information can collaborate in informed decision making.Due to the sensitivity of health data,any improper disclosure may infringe the user’s privacy or even cause property loss.The openness of the network increased risk factors to the security of the EHR.And various health data types need different privacy preserving strategies.In addition,misconduct by some malicious attackers on the network could interfere with data or mislead other users.Secure access to health information requires authentication mechanisms for accurately identifying those accessing and modifying patient records and ensuring that they have proper authorization.However,most of the authentication technologies we use on a daily basis are threatened in the presence of large-scale quantum computers.Attractive features of lattice cryptography include apparent resistance to quantum attacks,high asymptotic efficiency and parallelism,security under worst-case intractability assumptions,and solutions to long-standing open problems in cryptography.Lattice-based cryptography schemes are expected to become valuable post-quantum substitutes for current public-key cryptography.In addition,the Digital Signature-based authentication scheme has become a widely used authentication technology in the EHR system due to its simplicity and strong security.Therefore,the paper focuses on lattice-based signature applications ofpost-quantum authentication in EHR.Firstly,we analyzes the anonymous authentication requirements in EHR social network.Combining with the basic BLISS signature and Attribute based Signature schemes,we proposed a lattice-based attribute signature scheme without the deficiency of the existing schemes in terms of computational efficiency and flexibility.The paradigm supports flexible threshold predicates,and higher efficiency through the simulation results we achieved.Then,according to the architecture and potential risks of the EHR social network,we proposed EHR anonymous authentication protocol that constructed based on the proposed signature scheme.It prevents potential sybil-attack and user identity privacy leaks risk,while ensuring the integrity and availability of health data.Secondly,we constructed a lattice-based homomorphic aggregate signature scheme,combining with homomorphic hash function,which take the advantage of aggregate signature to compress arbitrary number of signatures into one signature and verify it at one time,and also the advantage of homomorphic signatures to compute on signature data.The proposed signature scheme could operate on signatures generated by different public and private key pairs,and it’s implemented simulation on Linux platform,which shows its correctness and efficiency advantages.Under the proposed signature scheme,the EHR data authentication protocol was constructed,which solved the problem of credibility and liability in EHR data transmission.The user could calculate the signature of the EHR data and generate a signature of the data operation result.The verifier could only verify the operation algorithm and the result on the signature data.The original signature is confidential and the weak context hiding attribute is implemented.In addition,another contribution of our proposed protocol is to make sure unconsented re-sharings of data will be detected and the corresponding malicious will be kept liable due to this behavior.
Keywords/Search Tags:Electronic Health Record, Lattice-based Cryptography, Attribute Signature, Homomorphic Signature, Aggregate Signature
PDF Full Text Request
Related items