| Literature DB >> 27563515 |
Hanshu Hong1, Di Chen2, Zhixin Sun1.
Abstract
BACKGROUND: Attribute based encryption has been widely applied for secure data protection in PHR systems. However, since different users may share the same attributes in the system, a user may leaks his private key for illegal data sharing without being detected. This will add more threat to the private data stored in PHR system. FINDING: To help users achieve higher efficiency and more secure data sharing in mobile PHR system, based on previous works, we study the traitor tracing mechanism in attribute based cryptosystem and propose a high efficient attribute based encryption with user accountability in mobile PHR system. If a malicious PHR user exposes his private key for illegal data sharing, his identity can be accurately pinpointed by the system manager. During the whole process of data sharing, no bilinear pairing operations are needed, hence this will the mobile terminal devices from heavy computation burden.Entities:
Keywords: CP-ABE; Mobile PHR system; User accountability
Year: 2016 PMID: 27563515 PMCID: PMC4980854 DOI: 10.1186/s40064-016-3002-y
Source DB: PubMed Journal: Springerplus ISSN: 2193-1801
Fig. 1An CP-ABE access control structure for PHR data
Fig. 2The implementation of our UA-CPABE-WP
Notations and their corresponding meanings
| Notation | Meaning | Notation | Meaning |
|---|---|---|---|
| AA | Attribute authority |
| Public parameters |
|
| System master key |
| A single attribute |
|
| User’s private key |
| User’s identity |
|
| Ciphertext |
| Plaintext |
List of each private key with its corresponding user’s identity
| User’s identity | Corresponding private key |
|---|---|
|
|
|
|
|
|
| … | … |
|
|
|
Efficiency comparison
| Scheme | Encrypt cost | Decrypt cost | User accountability |
|---|---|---|---|
| Li et al. ( | 4n + 2 Exp | 4n Pair | Yes |
| Tian et al. ( | (n + 3) Exp + 1 Pair | 2n Pair + n Exp | No |
| Ours | (2n + 2) Mul | (n + 2) Mul + (n + 1)Add | Yes |