Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (11): 3465-3472.DOI: 10.11772/j.issn.1001-9081.2021111895
• 2021 CCF China Blockchain Conference (CCF CBCC 2021) • Previous Articles
Chao LIN1, Debiao HE2(), Xinyi HUANG1
Received:
2021-11-09
Revised:
2021-12-18
Accepted:
2022-01-05
Online:
2022-01-19
Published:
2022-11-10
Contact:
Debiao HE
About author:
LIN Chao, born in 1991, Ph. D., lecturer. His research interests include applied cryptography, blockchain.Supported by:
通讯作者:
何德彪
作者简介:
林超(1991—),男,福建平和人,讲师,博士,CCF会员,主要研究方向:应用密码学、区块链基金资助:
CLC Number:
Chao LIN, Debiao HE, Xinyi HUANG. Blockchain‑based electronic medical record secure sharing[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
林超, 何德彪, 黄欣沂. 基于区块链的电子医疗记录安全共享[J]. 《计算机应用》唯一官方网站, 2022, 42(11): 3465-3472.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021111895
方案 | 计算开销 | 通信代价 | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | ||||||
UDVSP-2[ | ||||||
UDVS-1[ | ||||||
UDVS-2[ | ||||||
本文UDVSP |
Tab. 1 Theoretical performance comparison results
方案 | 计算开销 | 通信代价 | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | ||||||
UDVSP-2[ | ||||||
UDVS-1[ | ||||||
UDVS-2[ | ||||||
本文UDVSP |
符号 | 描述 | 时间/ms | 符号 | 描述 | 时间/ms |
---|---|---|---|---|---|
群 | 35.311 100 | 群 | 820.320 00 | ||
群 | 206.575 000 | 群 | 689.273 00 | ||
群 | 0.165 954 | 群 | 2.058 55 | ||
群 | 206.575 000 | 域 | 0.050 23 | ||
安全哈希函数 | 0.005 760 | 域 | 0.012 31 | ||
全域哈希函数 | 17.146 400 | 域 | 0.002 71 |
Tab. 2 Symbol difinition and time cost
符号 | 描述 | 时间/ms | 符号 | 描述 | 时间/ms |
---|---|---|---|---|---|
群 | 35.311 100 | 群 | 820.320 00 | ||
群 | 206.575 000 | 群 | 689.273 00 | ||
群 | 0.165 954 | 群 | 2.058 55 | ||
群 | 206.575 000 | 域 | 0.050 23 | ||
安全哈希函数 | 0.005 760 | 域 | 0.012 31 | ||
全域哈希函数 | 17.146 400 | 域 | 0.002 71 |
方案 | 计算开销/ms | 通信代价/B | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | 35.311 1 | 52.457 5 | 1 657.786 4 | 35.311 1 | 3 038.406 0 | 2 048 |
UDVSP-2[ | 413.150 0 | 35.379 1 | 2 055.055 7 | 35.311 1 | 4 124.948 0 | 2 048 |
UDVS-1[ | 141.244 4 | 106.277 5 | 2 498.496 0 | 891.452 4 | 3 056.722 0 | 2 080 |
UDVS-2[ | 70.622 2 | 178.454 2 | 2 534.139 0 | 820.320 0 | 3 092.365 0 | 2 080 |
本文UDVSP | 35.311 1 | 35.397 1 | 70.799 3 | 0.013 8 | 496.612 9 | 128 |
Tab. 3 Real performance comparison results
方案 | 计算开销/ms | 通信代价/B | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | 35.311 1 | 52.457 5 | 1 657.786 4 | 35.311 1 | 3 038.406 0 | 2 048 |
UDVSP-2[ | 413.150 0 | 35.379 1 | 2 055.055 7 | 35.311 1 | 4 124.948 0 | 2 048 |
UDVS-1[ | 141.244 4 | 106.277 5 | 2 498.496 0 | 891.452 4 | 3 056.722 0 | 2 080 |
UDVS-2[ | 70.622 2 | 178.454 2 | 2 534.139 0 | 820.320 0 | 3 092.365 0 | 2 080 |
本文UDVSP | 35.311 1 | 35.397 1 | 70.799 3 | 0.013 8 | 496.612 9 | 128 |
1 | TAMERSOY A, LOUKIDES G, NERGIZ M E, et al. Anonymization of longitudinal electronic medical records[J]. IEEE Transactions on Information Technology in Biomedicine, 2012, 16(3): 413-423. 10.1109/titb.2012.2185850 |
2 | OHNO-MACHADO L. Sharing data from electronic health records within, across, and beyond healthcare institutions: current trends and perspectives[J]. Journal of the American Medical Informatics Association, 2018, 25(9): 1113-1113. 10.1093/jamia/ocy116 |
3 | LIU J, LI X, YE L, et al. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records[C]// Proceedings of the 2018 IEEE Global Communications Conference. Piscataway: IEEE, 2018: 1-6. 10.1109/glocom.2018.8647713 |
4 | LIN C, HE D, HUANG X, et al. BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018, 116: 42-52. 10.1016/j.jnca.2018.05.005 |
5 | 祝烈煌,高峰,沈蒙,等. 区块链隐私保护研究综述[J]. 计算机研究与发展,2017, 54(10): 2170-2186. 10.7544/issn1000-1239.2017.20170471 |
ZHU L H, GAO F, SHEN M, et al. Survey and privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. 10.7544/issn1000-1239.2017.20170471 | |
6 | DUBOVITSKAYA A, XU Z, RYU S, et al. Secure and trustable electronic medical records sharing using blockchain[C]// Proceedings of the 2017 American Medical Informatics Association Annual Symposium. Washington, DC: AMIA Publications, 2017: 650. 10.4414/smi.33.00400 |
7 | USMAN M, QAMAR U. Secure electronic medical records storage and sharing using blockchain technology[J]. Procedia Computer Science, 2020, 174: 321-327. 10.1016/j.procs.2020.06.093 |
8 | AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission management[C]// Proceedings of the 2nd International Conference on Open and Big Data. Washington, DC: IEEE Computer Society, 2016: 25-30. 10.1109/obd.2016.11 |
9 | YUE X, WANG H, JIN D, et al. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control[J]. Journal of Medical Systems, 2016, 40(10): 1-8. 10.1007/s10916-016-0574-6 |
10 | BAEK J, SAFAVI-NAINI R, SUSILO W. Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)[C]// Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNSC 3788. Berlin: Springer, 2005: 644-661. |
11 | CHEN X, CHEN G, ZHANG F, et al. Identity-based universal designated verifier signature proof system[J]. International Journal of Network Security, 2009, 8(1): 52-58. |
12 | ABBASINEZHAD-MOOD D, NIKOOGHADAM M. An anonymous ecc-based self-certified key distribution scheme for the smart grid[J]. IEEE Transactions on Industrial Electronics, 2018, 65(10): 7996-8004. 10.1109/tie.2018.2807383 |
13 | STEINFELD R, BULL L, WANG H, et al. Universal designated-verifier signatures[C]// Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 523-542. |
14 | ZHANG R, FURUKAWA J, IMAI H. Short signature and universal designated verifier signature without random oracles[C]// Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, LNSC 3531. Cham: Springer, 2005: 483-498. |
15 | HUANG X, SUSILO W, MU Y, et al. Secure universal designated verifier signature without random oracles[J]. International Journal of Information Security, 2008, 7(3): 171-183. 10.1007/s10207-007-0021-2 |
16 | LIN H Y. Secure universal designated verifier signature and its variant for privacy protection[J]. Information Technology and Control, 2013, 42(3): 268-276. 10.5755/j01.itc.42.3.3532 |
17 | RASTEGARI P, BERENJKOUB M, DAKHILALIAN M, et al. Universal designated verifier signature scheme with non-delegatability in the standard model[J]. Information Sciences, 2019, 479: 321-334. 10.1016/j.ins.2018.12.020 |
18 | SEO S H, HWANG J Y, CHOI K Y, et al. Identity-based universal designated multi-verifiers signature schemes[J]. Computer Standards & Interfaces, 2008, 30(5): 288-295. 10.1016/j.csi.2007.08.020 |
19 | CAO F, CAO Z. An identity based universal designated verifier signature scheme secure in the standard model[J]. Journal of Systems and Software, 2009, 82(4): 643-649. 10.1016/j.jss.2008.09.001 |
20 | CHANG T Y. An ID-based multi-signer universal designated multi-verifier signature scheme[J]. Information and Computation, 2011, 209(7): 1007-1015. 10.1016/j.ic.2011.03.002 |
21 | HOU S, HUANG X, LIU J K, et al. Universal designated verifier transitive signatures for graph-based big data[J]. Information Sciences, 2015, 318: 144-156. 10.1016/j.ins.2015.02.033 |
22 | LIN C, WU W, HUANG X, et al. A new universal designated verifier transitive signature scheme for big graph data[J]. Journal of Computer and System Sciences, 2017, 83(1): 73-83. 10.1016/j.jcss.2016.06.003 |
23 | WANG M, ZHANG Y, Ma J, et al. A universal designated multi verifiers content extraction signature scheme[J]. International Journal of Computational Science and Engineering, 2020, 21(1): 49-59. 10.1504/ijcse.2020.10026865 |
24 | METTLER M. Blockchain technology in healthcare: the revolution starts here[C]// Proceedings of the 18th International Conference on E-health Networking, Applications and Services. Piscataway: IEEE, 2016: 1-3. 10.1109/healthcom.2016.7749510 |
25 | ROEHRS A, COSTA C A DA, ROSA RIGHI R DA. OmniPHR: a distributed architecture model to integrate personal health records[J]. Journal of Biomedical Informatics, 2017, 71: 70-81. 10.1016/j.jbi.2017.05.012 |
26 | 薛腾飞,傅群超,王枞,等. 基于区块链的医疗数据共享模型研究[J]. 自动化学报,2017, 43(9): 1555-1562. 10.16383/j.aas.2017.c160661 |
XUE T F, FU Q C, WANG C, et al. A medical data sharing model via blockchain[J]. Acta Automatica Sinica, 2017, 43(9): 1555-1562. 10.16383/j.aas.2017.c160661 | |
27 | WU S, DU J. Electronic medical record security sharing model based on blockchain[C]// Proceedings of the 3rd International Conference on Cryptography, Security and Privacy. New York: ACM, 2019: 13-17. 10.1145/3309074.3309079 |
28 | LI L, YUE Z, WU G. Electronic medical record sharing system based on hyperledger fabric and interplanetary file system[C]// Proceedings of the 5th International Conference on Compute and Data Analysis. New York: ACM, 2021: 149-154. 10.1145/3456529.3456555 |
29 | ZHANG Z, YANG K, ZHANG J, et al. Security of the SM2 signature scheme against generalized key substitution attacks[C]// Proceedings of the 2nd International Conference on Research in Security Standardisation, LNSC 9497. Cham: Springer, 2015: 140-153. |
[1] | Wei LIU, Cong ZHANG, Wei SHE, Xuan SONG, Zhao TIAN. Data trusted traceability method based on Merkle mountain range [J]. Journal of Computer Applications, 2022, 42(9): 2765-2771. |
[2] | Yangnan GUO, Wenbao JIANG, Shuai YE. Supervisable blockchain anonymous transaction system model [J]. Journal of Computer Applications, 2022, 42(9): 2757-2764. |
[3] | Hongliang TIAN, Jiayue WANG, Chenxi LI. Data storage scheme based on hybrid algorithm blockchain and node identity authentication [J]. Journal of Computer Applications, 2022, 42(8): 2481-2486. |
[4] | Xu WANG, Yumin SHEN, Xiaoyun XIONG, Peng LI, Jinlong WANG. Data management method for building internet of things based on Hashgraph [J]. Journal of Computer Applications, 2022, 42(8): 2471-2480. |
[5] | Jie ZHANG, Shanshan XU, Lingyun YUAN. Internet of things access control model based on blockchain and edge computing [J]. Journal of Computer Applications, 2022, 42(7): 2104-2111. |
[6] | Chunming TANG, Yuqing CHEN, Zidi ZHANG. Improved consensus algorithm based on binomial swap forest and HotStuff [J]. Journal of Computer Applications, 2022, 42(7): 2112-2117. |
[7] | Yuntao XU, Junwu ZHU, Binwen SUN, Maosheng SUN, Sihai CHEN. Election-based supply chain: a supply chain autonomy framework based on blockchain [J]. Journal of Computer Applications, 2022, 42(6): 1770-1775. |
[8] | Zheng DI, Yifan CAO, Chao QIU, Tao LUO, Xiaofei WANG. New computing power network architecture and application case analysis [J]. Journal of Computer Applications, 2022, 42(6): 1656-1661. |
[9] | Yang LI, Long XU, Yanqiang LI, Shaopeng LI. Smart contract-based access control architecture and verification for internet of things [J]. Journal of Computer Applications, 2022, 42(6): 1922-1931. |
[10] | Xiuli REN, Lei ZHANG. Improved multi-primary-node consensus mechanism based on practical Byzantine fault tolerance [J]. Journal of Computer Applications, 2022, 42(5): 1500-1507. |
[11] | Jiagui XIE, Zhiping LI, Jian JIN. Cross-chain mechanism based on Spark blockchain [J]. Journal of Computer Applications, 2022, 42(2): 519-527. |
[12] | Shengjia GONG, Linlin ZHANG, Kai ZHAO, Juntao LIU, Han YANG. Fake news detection method based on blockchain technology [J]. Journal of Computer Applications, 2022, 42(11): 3458-3464. |
[13] | Shanshan LI, Yanze WANG, Yinglong ZOU, Huanlei CHEN, He ZHANG, Ou WU. Consensus transaction trajectory visualization tracking method for Fabric based on custom logs [J]. Journal of Computer Applications, 2022, 42(11): 3421-3428. |
[14] | Yazhou HUA, Linlin DING, Ze CHEN, Junlu WANG, Zhu ZHU. Blockchain construction and query method for spatio‑temporal data [J]. Journal of Computer Applications, 2022, 42(11): 3429-3437. |
[15] | Rui SUN, Chao LI, Wei WANG, Endong TONG, Jian WANG, Jiqiang LIU. Research progress of blockchain‑based federated learning [J]. Journal of Computer Applications, 2022, 42(11): 3413-3420. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||