Skip to main content
Log in

Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the cloud applications of medical data based on blockchain, doctors and managers usually want to obtain image data shared by other healthcare institutions. To ensure the privacy and workability of the image data, it is necessary to encrypt plain image data, retrieve cypher data and verify the authenticity of the data. Public key authenticated searchable encryption (PAEKS) is an effective mechanism to realize the privacy and workability properties of data. However, the existing PAEKS schemes are unable to realize the identity privacy protection of the data owner, and the traditional blockchain system (such as the Bitcoin) cannot achieve these goals directly. To overcome the above drawback, we first present a deniably authenticated searchable encryption scheme for medical image data sharing (DASES) that is based on blockchain and deniably authenticated encryption technology. The DASES takes advantage of blockchain technology to ensure the non-tampered, unforgettable and traceability of the image data, and it also avoids the limitation of the blockchain’s own storage and computing power. The DASES can not only withstand inside keyword guessing attack (IKGA) but also provide effective privacy protection and verify the authenticity of medical image data. Hence, it can better protect the privacy of data senders and provide stronger security. Next, we prove that the DASES satisfies the indistinguishability of the ciphertext and trapdoor. It is regrettable that the DASES is less efficient than related schemes in the literature, but its greatest strength is its ability to provide better identity privacy protection and stronger security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004). Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, 506–522

  2. Byun J W, Rhee H S, Park H A (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management, 75–83

  3. Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthc Inform Res 22(3):156–163

    Article  Google Scholar 

  4. Emmanuel A, Jin CH, Li FG (2018) Certificateless deniably authenticated encryption and its application to e-voting system. Telecommun Syst 70(3):417–434

    Google Scholar 

  5. Emura K, Miyaji A, Rahman MS, Omote K (2015) Generic constructions of secure-channel free searchable encryption with adaptive security. Secur Commun Netw 8(8):1547–1560

    Article  Google Scholar 

  6. He D, Ma M, Zeadally S, Kumar N, Liang K (2018) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE T Ind Infrom 14(8):3618–3627

    Article  Google Scholar 

  7. Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403-404(8):1–14

    Article  MATH  Google Scholar 

  8. Huang DM, Geng X, Wei LF, Cheng S (2016) A secure query scheme on encrypted remote sensing images based on Henon mapping. Journal of Software 41(2):1729–1740

    MathSciNet  Google Scholar 

  9. Huang DM, Wu GJ, Wei LF, Wei QM (2019) A secure outsourcing search scheme for encrypted remote sensing images. Laser & Optoelectronics Progress 56(3):031001

    Article  Google Scholar 

  10. Li F, Zhong D, Takagi T (2016) Efficient deniably authenticated encryption and its application to E-mail. IEEE T Inf Foren Sec 11(11):2477–2486

    Article  Google Scholar 

  11. Li H, Zhang F, He J et al (2017). A searchable symmetric encryption scheme using BlockChain. arXiv preprint

  12. Li H, Huang Q, Shen J, Yang G, Susilo W (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf Sci 481(5):330–343

    Google Scholar 

  13. Lu Y, Li JG, Shen J, Zhang YC (2019) Secure Channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE T Serv Comput 99:1–1

    Google Scholar 

  14. Ma W Y, Zhang H J (1998). Benchmarking of image features for content-based retrieval. In: The 32 Asilomar conference on signals, systems & computers, 253-257

  15. Ma M, He D, Khan MK (2017) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65(6):413–424

    Google Scholar 

  16. Miguel C, Barbara L (1999). Practical byzantine fault tolerance. In: The proceedings of the third symposium on operating systems design and implementation, 173-186

  17. Nakamoto S (2008). Bitcoin: A peer-to-peer electronic cash system. www.bitcoin.org

  18. Peng YG, Cui JT, Peng CG (2014) Certificateless public key encryption with keyword search. China Commun 11(11):100–113

    Article  Google Scholar 

  19. Rhee HS, Park JH, Lee DH (2012) Generic construction of designated tester public-key encryption with keyword search. Inf Sci 205(1):93–109

    Article  MathSciNet  MATH  Google Scholar 

  20. Song X, Wagner D, Perrig (2000). Practical techniques for searches on encrypted data. In: Security and Privacy 2000 S&P 2000. Proceedings. 2000 IEEE Symposium on, 44–55

  21. Sun Y, Zhang R, Wang X et al (2018). A decentralizing attribute-based signature for healthcare Blockchain. In: 2018 27th international conference on computer communication and networks (ICCCN), 1-9

  22. The pairing-based cryptography library (2010) http://crypto.stanford.edu/pbc/

  23. Wu W, Li F (2016) An efficient identity-based deniable authenticated encryption scheme. KSII T Internet Inf 9(5):1904–1919

    Google Scholar 

  24. Wu T Y, Meng F, Chen C M, Liu S (2016). On the security of a certificateless searchable public key encryption scheme. In international conference on genetic and evolutionary computing, 113-119

  25. Wu LB, Zhang YB, Ma M (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted. Ann Telecommun 74:423–434

    Article  Google Scholar 

  26. Zhang J, Xue N, Huang XA (2016) Secure system for pervasive social network-based healthcare. IEEE Access 4(99):9239–9250

    Article  Google Scholar 

  27. Zhang YL, Wen L, Zhang YJ et al (2019) Designated server Certificateless deniably authenticated encryption with keyword search. IEEE Access 7:146542–146551

    Article  Google Scholar 

  28. Zhu XD, Li H, Guo Z (2014) Privacy-preserving query over the encrypted image in cloud computing. Journal of xidian university 41(2):151–158

    Google Scholar 

Download references

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China under Grant No.61662069, Higher Educational Scientific Research Foundation of Gansu Province under Grant No.2017A-003, and 2018A-207.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-lei Zhang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Yl., Wen, L., Zhang, Yj. et al. Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing. Multimed Tools Appl 79, 27075–27090 (2020). https://doi.org/10.1007/s11042-020-09213-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09213-w

Keywords

Navigation