Abstract
In this paper, we propose an attribute-based encryption (ABE) scheme that can be used in cooperative medical care systems with multiple distrusted principles. Unlike prior multi-authority ABEs, this scheme distributes secret key generation to different medical care centers, which enables distributed authorization and access control. By separating the key generation process among medical care centers and data owners (DOs), our scheme is resilient to collusion between malicious their parties and users. This new Cooperative Medical Care System (CMCS) distinguishes between DO principal and medical care centers: DOs own the data but allows medical care centers to arbitrate access by providing attribute labels to users. The data is protected by access policy encryption over these attributes. Unlike prior systems, attributes generated by medical centers are not user-specific, and neither is the system susceptible to collusion between users who try to escalate their access by sharing keys. We prove our CMCS scheme correct under the Decisional Bilinear Diffie-Hellman (DBDH) assumption; we also include a complete end-to-end implementation that demonstrates the practical efficacy of our technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium Security and Privacy. Berkeley, CA, pp. 321–334 (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Wang, S., Zhou, J., Liu, J.K., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265–1277 (2016)
Kwon, H., Kim, D., Hahn, C., et al.: Security authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools Appl. 75, 1–15 (2016). https://doi.org/10.1007/s11042-015-3187-z
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, Salil P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28
Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. Computers, Materials & Continua 55(1), 037–057 (2018)
Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 121–130 (2009)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, Kenneth G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31
Yang, K., Jia, X., Ren, K.: DAC-MACS: effective date access control for multi-authority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)
Yang, K., Jia, X.: Attribute-based access control for multi-authority system in cloud storage. In: Proceedings of International Conference on Distributed Computing Systems (ICDCS), pp. 536–545 (2012)
Yang, K., Jia, X.: Expressive, efficient and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735–1744 (2013)
Taeho, J., Li, X., Wan, Z., et al.: Privacy preserving cloud data access with multi-authorities. In: Proceedings of IEEE INFOCOM, pp. 2625–2633 (2013)
Jung, T., Li, X., Wan, Z., et al.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (2015)
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34
Muller, S., Katzenbeisser, S., Eckert, C.: On multi-authority ciphertext-policy attribute-based encryption. Bull. Korean Math. Soc. 46(4), 803–819 (2009)
Li, J., Huang, Q., Chen, X., Chow, S.S., Wong, D.S., Xie, D.: Multiauthority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of ACM Symposium on Information (ASIACCS), pp. 386–390 (2011)
Acknowledgements
This work is supported by the National Natural Science Foundation of China under grant 61402160 and 61872134. Hunan Provincial Natural Science Foundation under grant 2016JJ3043. Open Funding for Universities in Hunan Province under grant 14K023.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, J., Li, X., Jiang, J. (2020). A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_56
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_56
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)