Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption

Wireless Medical Sensor Networks (WMSN) facilitate the traditional healthcare systems, however, due to the public transmission, the healthcare system in WMSN also faces some serious security and privacy challenges. These are major concerns in the Health Insurance Portability and Accountability Act. Especially, integrity and confidentiality of patient physiological data are two key issues in privacy protection, which must be considered and addressed firstly. Therefore, the security and privacy in such systems should be enforced via authentication as well as encryption. This paper presents an authenticated certificateless public key encryption scheme for protecting the integrity and confidentiality of the patient sensitive information in tele-healthcare system simultaneously. The security of this protocol is based on the hardness of the bilinear Diffie-Hellman problem, and we prove that it is secure in the random oracle model. Our analysis and comparisons with related protocols show that this scheme is a viable encryption for tele-healthcare system.

[1]  Ben Lynn,et al.  Authenticated Identity-Based Encryption , 2002, IACR Cryptol. ePrint Arch..

[2]  K.K. Venkatasubramanian,et al.  Plethysmogram-based secure inter-sensor communication in Body Area Networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[3]  Qiaoyan Wen,et al.  An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.

[4]  Jongho Moon,et al.  An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps , 2015, Journal of Medical Systems.

[5]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[6]  A. Miyaji,et al.  New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .

[7]  Manuel Barbosa,et al.  Certificateless signcryption , 2008, ASIACCS '08.

[8]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[9]  L M Nichols,et al.  The Health Insurance Portability and Accountability Act of 1996: summary of provisions and anticipated effects. , 1998, The Journal of medical practice management : MPM.

[10]  Wenfen Liu,et al.  An Improved Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[11]  Sang-Jae Moon,et al.  How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes , 2005, ICISS.

[12]  C. Pandu Rangan,et al.  Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing , 2009, Inscrypt.

[13]  Robert H. Deng,et al.  Cryptanalysis of a certificateless signcryption scheme in the standard model , 2011, Inf. Sci..

[14]  Rui Zhang,et al.  A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[15]  Yupu Hu,et al.  Certificateless signcryption scheme in the standard model , 2010, Inf. Sci..

[16]  Zhian Zhu,et al.  An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[17]  Addepalli V. N. Krishna,et al.  Window Method Based Cubic Spline Curve Public Key Cryptography , 2016 .

[18]  C. Pandu Rangan,et al.  Security Weaknesses in Two Certificateless Signcryption Schemes , 2010, IACR Cryptol. ePrint Arch..

[19]  Emil Jovanov,et al.  Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.

[20]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[21]  Richard Comley,et al.  Efficient Certificateless Public Key Encryption , 2005, IACR Cryptol. ePrint Arch..

[22]  Zhixiong Chen,et al.  A New Efficient Certificateless Signcryption Scheme , 2008, 2008 International Symposium on Information Science and Engineering.

[23]  Yu-Fang Chung,et al.  A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[24]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[25]  Min-Shiang Hwang,et al.  A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms , 2017, Int. J. Netw. Secur..

[26]  Hui-Feng Huang,et al.  Convertible Multi-authenticated Encryption Scheme for Data Communication , 2015, Int. J. Netw. Secur..