| The effective sharing of medical data can create high value in the national medical field.However,in the process of medical data sharing,security problems such as data leakage,loss and destruction caused by imperfect security measures are emerging in an endless stream,and new security technologies are urgently needed to protect them.Elliptic Curve Cryptography(ECC)is one of the mainstream public key cryptosystems.ECC has high security performance,fast processing speed and low performance consumption.The most important and time-consuming scalar multiplication operation in the ECC algorithm is optimized,and a medical data sharing scheme based on the optimized ECC is proposed.The main research contents and findings are as follows:1)A non-adjacent form binary algorithm(wNAF)with window width w based on Pell sequence is proposed.In the precomputation stage of the wNAF algorithm,odd and prime numbers are replaced by Pell numbers with strong sparsity.Theoretical analysis and experimental results show that,when the window size is equal to 11,the computational efficiency is increased by 39.4% and 11.7% respectively compared with odd precomputation and prime precomputation.2)The wNAF algorithm based on mixed coordinate system is proposed.According to the number of operations and the mutual conversion order of double point and point addition,the valuable mixed coordinate system strategy is analyzed.The coordinate combination scheme with the lowest comprehensive cost is obtained,and computational complexity under this scheme is given.3)Combining the above two improvements,the wNAF scalar multiplication algorithm based on Pell precomputing and mixed coordinate system is obtained.Theoretical analysis and experimental results show that the computational efficiency is improved by 2.3% compared with algorithm using other mixed coordinate system.4)A medical data sharing scheme based on the optimized wNAF algorithm is proposed.The optimized wNAF algorithm and SM2 algorithm are combined to design a medical data sharing scheme based on it.Combined with the oblivious transmission protocol,idea of anonymous query,and the medical data can be anonymous inquiry.Figure 25;Table 27;Reference 53... |