Skip to main content

A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12240))

Included in the following conference series:

Abstract

In this paper, we propose an attribute-based encryption (ABE) scheme that can be used in cooperative medical care systems with multiple distrusted principles. Unlike prior multi-authority ABEs, this scheme distributes secret key generation to different medical care centers, which enables distributed authorization and access control. By separating the key generation process among medical care centers and data owners (DOs), our scheme is resilient to collusion between malicious their parties and users. This new Cooperative Medical Care System (CMCS) distinguishes between DO principal and medical care centers: DOs own the data but allows medical care centers to arbitrate access by providing attribute labels to users. The data is protected by access policy encryption over these attributes. Unlike prior systems, attributes generated by medical centers are not user-specific, and neither is the system susceptible to collusion between users who try to escalate their access by sharing keys. We prove our CMCS scheme correct under the Decisional Bilinear Diffie-Hellman (DBDH) assumption; we also include a complete end-to-end implementation that demonstrates the practical efficacy of our technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium Security and Privacy. Berkeley, CA, pp. 321–334 (2007)

    Google Scholar 

  3. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  4. Wang, S., Zhou, J., Liu, J.K., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265–1277 (2016)

    Article  Google Scholar 

  5. Kwon, H., Kim, D., Hahn, C., et al.: Security authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools Appl. 75, 1–15 (2016). https://doi.org/10.1007/s11042-015-3187-z

    Article  Google Scholar 

  6. Chase, M.: Multi-authority attribute based encryption. In: Vadhan, Salil P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28

    Chapter  Google Scholar 

  7. Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. Computers, Materials & Continua 55(1), 037–057 (2018)

    Article  Google Scholar 

  8. Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 121–130 (2009)

    Google Scholar 

  9. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  10. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, Kenneth G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31

    Chapter  Google Scholar 

  11. Yang, K., Jia, X., Ren, K.: DAC-MACS: effective date access control for multi-authority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)

    Article  Google Scholar 

  12. Yang, K., Jia, X.: Attribute-based access control for multi-authority system in cloud storage. In: Proceedings of International Conference on Distributed Computing Systems (ICDCS), pp. 536–545 (2012)

    Google Scholar 

  13. Yang, K., Jia, X.: Expressive, efficient and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735–1744 (2013)

    Article  Google Scholar 

  14. Taeho, J., Li, X., Wan, Z., et al.: Privacy preserving cloud data access with multi-authorities. In: Proceedings of IEEE INFOCOM, pp. 2625–2633 (2013)

    Google Scholar 

  15. Jung, T., Li, X., Wan, Z., et al.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (2015)

    Article  Google Scholar 

  16. Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_34

    Chapter  Google Scholar 

  17. Muller, S., Katzenbeisser, S., Eckert, C.: On multi-authority ciphertext-policy attribute-based encryption. Bull. Korean Math. Soc. 46(4), 803–819 (2009)

    Article  MathSciNet  Google Scholar 

  18. Li, J., Huang, Q., Chen, X., Chow, S.S., Wong, D.S., Xie, D.: Multiauthority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of ACM Symposium on Information (ASIACCS), pp. 386–390 (2011)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under grant 61402160 and 61872134. Hunan Provincial Natural Science Foundation under grant 2016JJ3043. Open Funding for Universities in Hunan Province under grant 14K023.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiehua Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, J., Li, X., Jiang, J. (2020). A Decentralized Multi-authority ABE Scheme in Cooperative Medical Care System. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57881-7_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57880-0

  • Online ISBN: 978-3-030-57881-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics