Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (11): 3465-3472.DOI: 10.11772/j.issn.1001-9081.2021111895
Special Issue: 2021 CCF中国区块链技术大会(CCF CBCC 2021)
• 2021 CCF China Blockchain Conference (CCF CBCC 2021) • Previous Articles Next Articles
Chao LIN1, Debiao HE2(), Xinyi HUANG1
Received:
2021-11-09
Revised:
2021-12-18
Accepted:
2022-01-05
Online:
2022-01-19
Published:
2022-11-10
Contact:
Debiao HE
About author:
LIN Chao, born in 1991, Ph. D., lecturer. His research interests include applied cryptography, blockchain.Supported by:
通讯作者:
何德彪
作者简介:
林超(1991—),男,福建平和人,讲师,博士,CCF会员,主要研究方向:应用密码学、区块链基金资助:
CLC Number:
Chao LIN, Debiao HE, Xinyi HUANG. Blockchain‑based electronic medical record secure sharing[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
林超, 何德彪, 黄欣沂. 基于区块链的电子医疗记录安全共享[J]. 《计算机应用》唯一官方网站, 2022, 42(11): 3465-3472.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021111895
方案 | 计算开销 | 通信代价 | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | ||||||
UDVSP-2[ | ||||||
UDVS-1[ | ||||||
UDVS-2[ | ||||||
本文UDVSP |
Tab. 1 Theoretical performance comparison results
方案 | 计算开销 | 通信代价 | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | ||||||
UDVSP-2[ | ||||||
UDVS-1[ | ||||||
UDVS-2[ | ||||||
本文UDVSP |
符号 | 描述 | 时间/ms | 符号 | 描述 | 时间/ms |
---|---|---|---|---|---|
群 | 35.311 100 | 群 | 820.320 00 | ||
群 | 206.575 000 | 群 | 689.273 00 | ||
群 | 0.165 954 | 群 | 2.058 55 | ||
群 | 206.575 000 | 域 | 0.050 23 | ||
安全哈希函数 | 0.005 760 | 域 | 0.012 31 | ||
全域哈希函数 | 17.146 400 | 域 | 0.002 71 |
Tab. 2 Symbol difinition and time cost
符号 | 描述 | 时间/ms | 符号 | 描述 | 时间/ms |
---|---|---|---|---|---|
群 | 35.311 100 | 群 | 820.320 00 | ||
群 | 206.575 000 | 群 | 689.273 00 | ||
群 | 0.165 954 | 群 | 2.058 55 | ||
群 | 206.575 000 | 域 | 0.050 23 | ||
安全哈希函数 | 0.005 760 | 域 | 0.012 31 | ||
全域哈希函数 | 17.146 400 | 域 | 0.002 71 |
方案 | 计算开销/ms | 通信代价/B | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | 35.311 1 | 52.457 5 | 1 657.786 4 | 35.311 1 | 3 038.406 0 | 2 048 |
UDVSP-2[ | 413.150 0 | 35.379 1 | 2 055.055 7 | 35.311 1 | 4 124.948 0 | 2 048 |
UDVS-1[ | 141.244 4 | 106.277 5 | 2 498.496 0 | 891.452 4 | 3 056.722 0 | 2 080 |
UDVS-2[ | 70.622 2 | 178.454 2 | 2 534.139 0 | 820.320 0 | 3 092.365 0 | 2 080 |
本文UDVSP | 35.311 1 | 35.397 1 | 70.799 3 | 0.013 8 | 496.612 9 | 128 |
Tab. 3 Real performance comparison results
方案 | 计算开销/ms | 通信代价/B | ||||
---|---|---|---|---|---|---|
UKGen | USign | UVerf | UTran | UIVerf | UIVerf | |
UDVSP-1[ | 35.311 1 | 52.457 5 | 1 657.786 4 | 35.311 1 | 3 038.406 0 | 2 048 |
UDVSP-2[ | 413.150 0 | 35.379 1 | 2 055.055 7 | 35.311 1 | 4 124.948 0 | 2 048 |
UDVS-1[ | 141.244 4 | 106.277 5 | 2 498.496 0 | 891.452 4 | 3 056.722 0 | 2 080 |
UDVS-2[ | 70.622 2 | 178.454 2 | 2 534.139 0 | 820.320 0 | 3 092.365 0 | 2 080 |
本文UDVSP | 35.311 1 | 35.397 1 | 70.799 3 | 0.013 8 | 496.612 9 | 128 |
1 | TAMERSOY A, LOUKIDES G, NERGIZ M E, et al. Anonymization of longitudinal electronic medical records[J]. IEEE Transactions on Information Technology in Biomedicine, 2012, 16(3): 413-423. 10.1109/titb.2012.2185850 |
2 | OHNO-MACHADO L. Sharing data from electronic health records within, across, and beyond healthcare institutions: current trends and perspectives[J]. Journal of the American Medical Informatics Association, 2018, 25(9): 1113-1113. 10.1093/jamia/ocy116 |
3 | LIU J, LI X, YE L, et al. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records[C]// Proceedings of the 2018 IEEE Global Communications Conference. Piscataway: IEEE, 2018: 1-6. 10.1109/glocom.2018.8647713 |
4 | LIN C, HE D, HUANG X, et al. BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018, 116: 42-52. 10.1016/j.jnca.2018.05.005 |
5 | 祝烈煌,高峰,沈蒙,等. 区块链隐私保护研究综述[J]. 计算机研究与发展,2017, 54(10): 2170-2186. 10.7544/issn1000-1239.2017.20170471 |
ZHU L H, GAO F, SHEN M, et al. Survey and privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. 10.7544/issn1000-1239.2017.20170471 | |
6 | DUBOVITSKAYA A, XU Z, RYU S, et al. Secure and trustable electronic medical records sharing using blockchain[C]// Proceedings of the 2017 American Medical Informatics Association Annual Symposium. Washington, DC: AMIA Publications, 2017: 650. 10.4414/smi.33.00400 |
7 | USMAN M, QAMAR U. Secure electronic medical records storage and sharing using blockchain technology[J]. Procedia Computer Science, 2020, 174: 321-327. 10.1016/j.procs.2020.06.093 |
8 | AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission management[C]// Proceedings of the 2nd International Conference on Open and Big Data. Washington, DC: IEEE Computer Society, 2016: 25-30. 10.1109/obd.2016.11 |
9 | YUE X, WANG H, JIN D, et al. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control[J]. Journal of Medical Systems, 2016, 40(10): 1-8. 10.1007/s10916-016-0574-6 |
10 | BAEK J, SAFAVI-NAINI R, SUSILO W. Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature)[C]// Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, LNSC 3788. Berlin: Springer, 2005: 644-661. |
11 | CHEN X, CHEN G, ZHANG F, et al. Identity-based universal designated verifier signature proof system[J]. International Journal of Network Security, 2009, 8(1): 52-58. |
12 | ABBASINEZHAD-MOOD D, NIKOOGHADAM M. An anonymous ecc-based self-certified key distribution scheme for the smart grid[J]. IEEE Transactions on Industrial Electronics, 2018, 65(10): 7996-8004. 10.1109/tie.2018.2807383 |
13 | STEINFELD R, BULL L, WANG H, et al. Universal designated-verifier signatures[C]// Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 523-542. |
14 | ZHANG R, FURUKAWA J, IMAI H. Short signature and universal designated verifier signature without random oracles[C]// Proceedings of the 3rd International Conference on Applied Cryptography and Network Security, LNSC 3531. Cham: Springer, 2005: 483-498. |
15 | HUANG X, SUSILO W, MU Y, et al. Secure universal designated verifier signature without random oracles[J]. International Journal of Information Security, 2008, 7(3): 171-183. 10.1007/s10207-007-0021-2 |
16 | LIN H Y. Secure universal designated verifier signature and its variant for privacy protection[J]. Information Technology and Control, 2013, 42(3): 268-276. 10.5755/j01.itc.42.3.3532 |
17 | RASTEGARI P, BERENJKOUB M, DAKHILALIAN M, et al. Universal designated verifier signature scheme with non-delegatability in the standard model[J]. Information Sciences, 2019, 479: 321-334. 10.1016/j.ins.2018.12.020 |
18 | SEO S H, HWANG J Y, CHOI K Y, et al. Identity-based universal designated multi-verifiers signature schemes[J]. Computer Standards & Interfaces, 2008, 30(5): 288-295. 10.1016/j.csi.2007.08.020 |
19 | CAO F, CAO Z. An identity based universal designated verifier signature scheme secure in the standard model[J]. Journal of Systems and Software, 2009, 82(4): 643-649. 10.1016/j.jss.2008.09.001 |
20 | CHANG T Y. An ID-based multi-signer universal designated multi-verifier signature scheme[J]. Information and Computation, 2011, 209(7): 1007-1015. 10.1016/j.ic.2011.03.002 |
21 | HOU S, HUANG X, LIU J K, et al. Universal designated verifier transitive signatures for graph-based big data[J]. Information Sciences, 2015, 318: 144-156. 10.1016/j.ins.2015.02.033 |
22 | LIN C, WU W, HUANG X, et al. A new universal designated verifier transitive signature scheme for big graph data[J]. Journal of Computer and System Sciences, 2017, 83(1): 73-83. 10.1016/j.jcss.2016.06.003 |
23 | WANG M, ZHANG Y, Ma J, et al. A universal designated multi verifiers content extraction signature scheme[J]. International Journal of Computational Science and Engineering, 2020, 21(1): 49-59. 10.1504/ijcse.2020.10026865 |
24 | METTLER M. Blockchain technology in healthcare: the revolution starts here[C]// Proceedings of the 18th International Conference on E-health Networking, Applications and Services. Piscataway: IEEE, 2016: 1-3. 10.1109/healthcom.2016.7749510 |
25 | ROEHRS A, COSTA C A DA, ROSA RIGHI R DA. OmniPHR: a distributed architecture model to integrate personal health records[J]. Journal of Biomedical Informatics, 2017, 71: 70-81. 10.1016/j.jbi.2017.05.012 |
26 | 薛腾飞,傅群超,王枞,等. 基于区块链的医疗数据共享模型研究[J]. 自动化学报,2017, 43(9): 1555-1562. 10.16383/j.aas.2017.c160661 |
XUE T F, FU Q C, WANG C, et al. A medical data sharing model via blockchain[J]. Acta Automatica Sinica, 2017, 43(9): 1555-1562. 10.16383/j.aas.2017.c160661 | |
27 | WU S, DU J. Electronic medical record security sharing model based on blockchain[C]// Proceedings of the 3rd International Conference on Cryptography, Security and Privacy. New York: ACM, 2019: 13-17. 10.1145/3309074.3309079 |
28 | LI L, YUE Z, WU G. Electronic medical record sharing system based on hyperledger fabric and interplanetary file system[C]// Proceedings of the 5th International Conference on Compute and Data Analysis. New York: ACM, 2021: 149-154. 10.1145/3456529.3456555 |
29 | ZHANG Z, YANG K, ZHANG J, et al. Security of the SM2 signature scheme against generalized key substitution attacks[C]// Proceedings of the 2nd International Conference on Research in Security Standardisation, LNSC 9497. Cham: Springer, 2015: 140-153. |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[4] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[6] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[7] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[8] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[9] | Sunjie YU, Hui ZENG, Shiyu XIONG, Hongzhou SHI. Incentive mechanism for federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(2): 344-352. |
[10] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[11] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[12] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[13] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[14] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
[15] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||