Skip to main content
Erschienen in: International Journal of Information Security 6/2015

01.11.2015 | Special Issue Paper

Flexible attribute-based encryption applicable to secure e-healthcare records

verfasst von: Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou

Erschienen in: International Journal of Information Security | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In e-healthcare record systems (EHRS), attribute-based encryption (ABE) appears as a natural way to achieve fine-grained access control on health records. Some proposals exploit key-policy ABE (KP-ABE) to protect privacy in such a way that all users are associated with specific access policies and only the ciphertexts matching the users’ access policies can be decrypted. An issue with KP-ABE is that it requires an a priori formulation of access policies during key generation, which is not always practicable in EHRS because the policies to access health records are sometimes determined after key generation. In this paper, we revisit KP-ABE and propose a dynamic ABE paradigm, referred to as access policy redefinable ABE (APR-ABE). To address the above issue, APR-ABE allows users to redefine their access policies and delegate keys for the redefined ones; hence, a priori precise policies are no longer mandatory. We construct an APR-ABE scheme with short ciphertexts and prove its full security in the standard model under several static assumptions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Attrapadung, N., Libert, B., De Panafieu, E.: Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. PKC 2011. LNCS 6571, pp. 90–108. Springer (2011) Attrapadung, N., Libert, B., De Panafieu, E.: Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. PKC 2011. LNCS 6571, pp. 90–108. Springer (2011)
2.
Zurück zum Zitat Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996) Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)
3.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007, pp. 321–334. IEEE Press (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007, pp. 321–334. IEEE Press (2007)
4.
Zurück zum Zitat Boneh, D., Boyen, X., Goh, E.: Hierarchical Identity Based Encryption with Constant Size Ciphertex. EUROCRYPT 2005. LNCS 3493, pp. 440-456. Springer (2005) Boneh, D., Boyen, X., Goh, E.: Hierarchical Identity Based Encryption with Constant Size Ciphertex. EUROCRYPT 2005. LNCS 3493, pp. 440-456. Springer (2005)
5.
Zurück zum Zitat Boneh, D., Goh E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005. LNCS 3378, pp. 325–341. Springer (2005) Boneh, D., Goh E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005. LNCS 3378, pp. 325–341. Springer (2005)
7.
Zurück zum Zitat Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf. Sci. 275, 370–384 (2014)MathSciNetCrossRef Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf. Sci. 275, 370–384 (2014)MathSciNetCrossRef
8.
Zurück zum Zitat Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is Touching my Cloud. ESORICS 2014, LNCS 8712, pp. 362–379. Springer (2014) Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is Touching my Cloud. ESORICS 2014, LNCS 8712, pp. 362–379. Springer (2014)
9.
Zurück zum Zitat Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. ICALP 2008. LNCS 5126, pp. 579–591. Springer (2008) Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. ICALP 2008. LNCS 5126, pp. 579–591. Springer (2008)
10.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. ACM CCS 2006, pp. 89–98. ACM Press (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. ACM CCS 2006, pp. 89–98. ACM Press (2006)
11.
Zurück zum Zitat Hohenberger, S., Waters, B.: Attribute-Based Encryption with Fast Decryption. PKC 2013. LNCS 7778, pp. 162–179. Springer (2013) Hohenberger, S., Waters, B.: Attribute-Based Encryption with Fast Decryption. PKC 2013. LNCS 7778, pp. 162–179. Springer (2013)
12.
Zurück zum Zitat Hur, J.: Fine-grained data access control for distributed sensor networks. Wirel. Netw. 17(5), 1235–1249 (2011)CrossRef Hur, J.: Fine-grained data access control for distributed sensor networks. Wirel. Netw. 17(5), 1235–1249 (2011)CrossRef
13.
Zurück zum Zitat Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. EUROCRYPT 2010. LNCS 6110, pp. 62–91. Springer (2010) Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. EUROCRYPT 2010. LNCS 6110, pp. 62–91. Springer (2010)
14.
Zurück zum Zitat Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. TCC 2010. LNCS 5978, pp. 455–479. Springer (2010) Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. TCC 2010. LNCS 5978, pp. 455–479. Springer (2010)
15.
Zurück zum Zitat Lewko, A., Waters, B.: Unbounded HIBE and Attribute-Based Encryption. EUROCRYPT 2011. LNCS 6632, pp. 547–567. Springer (2011) Lewko, A., Waters, B.: Unbounded HIBE and Attribute-Based Encryption. EUROCRYPT 2011. LNCS 6632, pp. 547–567. Springer (2011)
16.
Zurück zum Zitat Li, J., Wang, Q., Wang, C., Ren, K.: Enhancing Attribute-Based Encryption with Attribute Hierarchy. ChinaCom 2009, pp. 1–5. IEEE Press (2009) Li, J., Wang, Q., Wang, C., Ren, K.: Enhancing Attribute-Based Encryption with Attribute Hierarchy. ChinaCom 2009, pp. 1–5. IEEE Press (2009)
17.
Zurück zum Zitat Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2013)CrossRef
18.
Zurück zum Zitat Liang, X., Barua, M., Lu, R., Lin, X., Shen, X.S.: HealthShare: achieving secure and privacy-preserving health information sharing through health social networks. Comput. Commun. 35(15), 1910–1920 (2012)CrossRef Liang, X., Barua, M., Lu, R., Lin, X., Shen, X.S.: HealthShare: achieving secure and privacy-preserving health information sharing through health social networks. Comput. Commun. 35(15), 1910–1920 (2012)CrossRef
19.
Zurück zum Zitat Liu, W., Liu, J., Wu, Q., Qin, B., Zhou, Y.: Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS 2014, LNCS 8713, pp. 91–108. Springer (2014) Liu, W., Liu, J., Wu, Q., Qin, B., Zhou, Y.: Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS 2014, LNCS 8713, pp. 91–108. Springer (2014)
20.
Zurück zum Zitat Rouselakis, Y., Waters, B.: Practical Constructions and New Proof Methods for Large Universe Attribute-based Encryption. ACM CCS 2013, pp. 463–474. ACM Press (2013) Rouselakis, Y., Waters, B.: Practical Constructions and New Proof Methods for Large Universe Attribute-based Encryption. ACM CCS 2013, pp. 463–474. ACM Press (2013)
21.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. EUROCRYPT 2005. LNCS 3494, pp. 457–473. Springer (2005) Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. EUROCRYPT 2005. LNCS 3494, pp. 457–473. Springer (2005)
22.
Zurück zum Zitat Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.M., Liu, Z., Tan., X.: Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS 2014, LNCS 8712, pp. 326–343. Springer (2014) Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.M., Liu, Z., Tan., X.: Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS 2014, LNCS 8712, pp. 326–343. Springer (2014)
23.
Zurück zum Zitat Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE Under Simple Assumptions. CRYPTO 2009. LNCS 5677, pp. 619–636. Springer (2009) Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE Under Simple Assumptions. CRYPTO 2009. LNCS 5677, pp. 619–636. Springer (2009)
24.
Zurück zum Zitat Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. PKC 2011. LNCS 6571, pp. 53–70. Springer (2011) Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. PKC 2011. LNCS 6571, pp. 53–70. Springer (2011)
25.
Zurück zum Zitat Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)CrossRef Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)CrossRef
26.
Zurück zum Zitat Yu, S., Ren, K., Lou, W.: FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(4), 673–686 (2011)CrossRef Yu, S., Ren, K., Lou, W.: FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(4), 673–686 (2011)CrossRef
Metadaten
Titel
Flexible attribute-based encryption applicable to secure e-healthcare records
verfasst von
Bo Qin
Hua Deng
Qianhong Wu
Josep Domingo-Ferrer
David Naccache
Yunya Zhou
Publikationsdatum
01.11.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 6/2015
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-014-0272-7

Weitere Artikel der Ausgabe 6/2015

International Journal of Information Security 6/2015 Zur Ausgabe