Skip to main content

A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13620))

  • 875 Accesses

Abstract

The smart medical industry, which relies on advanced Internet of Things technology and cloud platform, has been developing rapidly. Smart healthcare is a way to realize information-based communication between patients and medical staff by creating an online medical information platform. To address the user privacy and data security issues involved, we use attribute-based encryption scheme (CP-ABE). However, the traditional CP-ABE scheme has the following problems: 1. user-sensitive information is embedded directly into the access structures without hidden operations; 2. the number of public parameters is not fixed and varies linearly with the size of the system’s attribute set; 3. it does not effectively fix the user attribute change problem; 4. it is impossible to trace the user. To solve the above issues, this paper proposes a scheme with the following special features: 1. using partial policy hiding; 2. using large attribute universe; 3. performing attribute revocation when user attributes are changed; 4. being able to trace back to the user after the user decryption key is leaked. Finally, we provide design details and do performance evaluation to prove its effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yuehong, Y., Zeng, Y., Chen, X., Fan, Y.: The internet of things in healthcare: an overview. J. Ind. Inf. Integr. 1, 3–13 (2016)

    Google Scholar 

  2. Xiong, H., Yang, M., Yao, T., Chen, J., Kumari, S.: Efficient unbounded fully attribute hiding inner product encryption in cloud-aided WBANs. IEEE Syst. J. PP(99), 1–9 (2021). https://doi.org/10.1109/JSYST.2021.3125455

  3. Xiong, H., Hou, Y., Huang, X., Zhao, Y., Chen, C.-M.: Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs. IEEE Syst. J. 16(2), 2391–2400 (2022)

    Article  Google Scholar 

  4. Wu, T.-Y., et al.: Improved authenticated key agreement scheme for fog-driven IoT healthcare system, Security and Communication Networks (2021)

    Google Scholar 

  5. Xiong, H., et al.: An anonymous authentication protocol with delegation and revocation for content delivery networks. IEEE Syst. J. 16(3), 1–12 (2021)

    Google Scholar 

  6. Chen, C.-M., Tie, Z., Wang, E.K., Khan, M.K., Kumar, S., Kumari, S.: Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14(5), 2977–2991 (2021). https://doi.org/10.1007/s12083-021-01132-3

    Article  Google Scholar 

  7. Xiong, H., Chen, J., Mei, Q., Zhao, Y.: Conditional privacy-preserving authentication protocol with dynamic membership updating for VANETs. IEEE Trans. Dependable Secure Comput. 19(3), 2089–2104 (2022)

    Article  Google Scholar 

  8. Xiong, X., Qiao, S., Li, Y., Xiong, F., He, L., Han, N.: Affective impression: sentiment-awareness poi suggestion via embedding in heterogeneous LBSNs. IEEE Trans. Affect. Comput. 13, 272–284 (2022)

    Article  Google Scholar 

  9. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  10. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  11. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 195–203 (2007)

    Google Scholar 

  12. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  13. Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 456–465 (2007)

    Google Scholar 

  14. Wan, Z., Deng, R.H., et al.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2011)

    Article  Google Scholar 

  15. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP2007), pp. 321–334 (2007)

    Google Scholar 

  16. Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 735–737 (2010)

    Google Scholar 

  17. Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68914-0_7

    Chapter  Google Scholar 

  18. Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53–70 (2011)

    Google Scholar 

  19. Dong, C., Chen, L., Wen, Z.: When private set intersection meets big data: an efficient and scalable protocol. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 789–800 (2013)

    Google Scholar 

  20. Yang, K., et al.: An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J. 4(2), 563–571 (2016)

    Google Scholar 

  21. Lai, J., Deng, R.H., Li, Y.: Fully secure Cipertext-policy hiding CP-ABE. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21031-0_3

    Chapter  Google Scholar 

  22. Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511–516 (2013)

    Google Scholar 

  23. Lai, J., Deng, R.H., Li, Y.: Expressive CP-ABE with partially hidden access structures. In: Proceedings of the 7th ACM symposium on information, computer and communications security, pp. 18–19 (2012)

    Google Scholar 

  24. Han, Q., Zhang, Y., Li, H.: Efficient and robust attribute-based encryption supporting access policy hiding in internet of things. Futur. Gener. Comput. Syst. 83, 269–277 (2018)

    Article  Google Scholar 

  25. Katz, J., Schröder, D.: Tracing insider attacks in the context of predicate encryption schemes. ACITA (2011)

    Google Scholar 

  26. Liu, Z., Cao, Z., Wong, D.S.: Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on eBay. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 475–486 (2013)

    Google Scholar 

  27. Liu, Z., Cao, Z., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76–88 (2012)

    Google Scholar 

  28. Wu, A., et al.: Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals Telecommun. 74(7), 401–411 (2019)

    Google Scholar 

  29. Han, D., Pan, N., Li, K.-C.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans. Dependable Secure Comput. 19(1), 316–327 (2020)

    Article  Google Scholar 

  30. Mei, Q., Xiong, H., Chen, Y.-C., Chen, C.-M.: Blockchain-enabled privacy-preserving authentication mechanism for transportation cps with cloud-edge computing. In: IEEE Transactions on Engineering Management, pp. 1–12 (2022)

    Google Scholar 

  31. Xiong, H., et al.: On the design of blockchain-Based ECDSA with fault-tolerant batch verification protocol for blockchain-enabled IoMT. IEEE J. Biomed. Health Inform. 26(5), 1977–1986 (2021)

    Google Scholar 

  32. Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799–837 (2010)

    Article  Google Scholar 

  33. Wang, W., Zhang, G., Shen, Y.: A CP-ABE scheme supporting attribute revocation and policy hiding in outsourced environment. In: 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp. 96–99 (2018)

    Google Scholar 

  34. Liu, Z., Jiang, Z.L., Wang, X., Yiu, S.-M.: Practical attribute-based encryption: outsourcing decryption, attribute revocation and policy updating. J. Netw. Comput. Appl. 108, 112–123 (2018)

    Article  Google Scholar 

  35. Zhang, Y., Zheng, D., Deng, R.H.: Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J. 5(3), 2130–2145 (2018)

    Article  Google Scholar 

  36. Zeng, P., Zhang, Z., Lu, R., Choo, K.-K.R.: Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things. IEEE Internet Things J. 8(13), 10963–10972 (2021)

    Article  Google Scholar 

  37. Huang, X., Xiong, H., Chen, J., Yang, M.: Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted internet of things. In: IEEE Transactions on Cloud Computing. https://doi.org/10.1109/TCC.2021.3131686

  38. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. Theor. Crypt. Conf. 3378, 325–341 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  39. Beimel, A., et al.: Secure schemes for secret sharing and key distribution (1996)

    Google Scholar 

  40. Goyal, V.: Reducing trust in the PKG in identity based cryptosystems. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 430–447. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74143-5_24

    Chapter  Google Scholar 

  41. Goyal, V., Lu, S., Sahai, A., Waters, B.: Black-box accountable authority identity-based encryption. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 427–436 (2008)

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province under Grant SKLACSS–202102, in part by the Intelligent Terminal Key Laboratory of Sichuan Province under Grant SCITLAB–1019, in part by the Sichuan Science and Technology under Grant 2021JDRC0072 and 2021YFG0164.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saru Kumari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, Y., Liu, Z., An, J., Zhu, G., Kumari, S. (2022). A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios. In: Su, C., Gritzalis, D., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2022. Lecture Notes in Computer Science, vol 13620. Springer, Cham. https://doi.org/10.1007/978-3-031-21280-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21280-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21279-6

  • Online ISBN: 978-3-031-21280-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics