Journal on Communications ›› 2018, Vol. 39 ›› Issue (6): 1-10.doi: 10.11959/j.issn.1000-436x.2018100

• Papers •     Next Articles

Multi-authority attribute-based access control system in mHealth with traceability

Qi LI1,2,3,Hongbo ZHU2,4,Jinbo XIONG5,Ruo MO6   

  1. 1 School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    2 Jiangsu Innovative Coordination Center of Internet of Things,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
    3 Jiangsu Key laboratory of Big Data Security &Intelligent Processing,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    4 College of Telecommunications &Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
    5 College of Mathematics and Informatics,Fujian Normal University,Fuzhou 350117,China
    6 School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Revised:2018-05-08 Online:2018-06-01 Published:2018-07-09
  • Supported by:
    The National Natural Science Foundation of China(61502248);The National Natural Science Foundation of China(61427801);The National Natural Science Foundation of China(61402109);The National Natural Science Foundation of China(61602365);The National Natural Science Foundation of China(61370078);The Postdoctoral Science Foundation Project of China(2018M632350);NUPTSF(NY215008)

Abstract:

Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted data.However,existing attribute-based mHealth systems either lack of efficient traceable approach,or support only single authority.A traceable multi-authority attribute-based access control mHealth scheme was proposed,which was constructed over composite order groups and supports any monotonic access structures described by linear secret sharing scheme (LSSS).The adaptive security was proved under subgroup decisional assumptions.The traceability was proved under k-strong Diffie-Hellman (k-SDH) assumption.The performance analysis indicates that the proposed scheme is efficient and available.

Key words: attribute-based encryption, multi-authority, traceable, adaptively secure, mHealth

CLC Number: 

No Suggested Reading articles found!