Abstract
Nowadays, with the rapid development of smart health-care based on electronic health records, it remarkably supplies a promising way to alleviate the shortage of medical resources and improve medical efficiency. Meanwhile, data in electronic health records are sensitive and require protection against unauthorized access. However, most previous electronic health records sharing schemes are vulnerable to data leakage and forgery. To address these challenging problems, we propose a new electronic health record sharing scheme. We use the certificateless cryptosystem to encrypt keywords, which solves the certificate management problem and key escrow problem. The proposed scheme also supports multi-user search and the user authorization table can be used to modify access permissions of medical data users. Besides, the root values of the Merkle trees are written into the blockchain to ensure anti-tampering, integrity and traceability of search results. Moreover, a smart contract enables a fair transaction between cloud server provider and medical data users without trusted third parties. We prove that the proposed scheme is secure against the keyword guessing attack in the random oracle model. Furthermore, performance analysis demonstrates that our scheme has greater computational efficiency compared with other related schemes.










Similar content being viewed by others
References
Bahga A, Madisetti VK (2013) A cloud-based approach for interoperable electronic health records. IEEE Journal of Biomedical and Health Informatics 17(5), 894–906
Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems 25(1):222–233
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp 44–55
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security, pp 452–473
Islam S, Obaidat MS, Rajeev V, Amin R (2017) Design of a certificateless designated server based searchable public key encryption scheme. In: International Conference on Mathematics and Computing, pp 3–15
Swetha K, Narasinga MR (2016) Dynamic searchable encryption over ditributed cloud storage. Asian Journal of Information Technology 15(23), 4763–4769
Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD), pp 25–30
Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData congress), pp 557–564
Delmolino K, Arnett M, Kosba A, Miller A, Shi E (2016) Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In: International conference on financial cryptography and data security, pp 79–94
Yang Y, Lin H, Liu X, Guo W, Zheng X, Liu Z (2019) Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7:140818–140832
Guo R, Shi H, Zheng D, Jing C, Zhuang C, Wang Z (2019) Flexible and efficient blockchain-based abe scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7:88012–88025
Chen L, Lee WK, Chang CC, Choo KKR, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Future generation computer systems 95:420–429
Zhang XY, Zhang P (2016) Recent perspectives of electronic medical record systems. Experimental and therapeutic medicine 11(6):2083–2085
Shen M, Ma B, Zhu L (2018) Cloud-based approximate constrainedshortest distance queries over encrypted graphs with privacy protection. IEEE transactions on information forensics & security 13(4):940–953
Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Transactions on Dependable and secure computing 18(1):490–504
Pakniat N, Shiraly D, Eslami Z (2020) Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial iot. J Inform Sec Appl 53:102525. https://doi.org/10.1016/j.jisa.2020.102525
Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp 73–86
Soleimanian A, Khazaei S (2019) Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. Designs, Codes and Cryptography 87(1), 123–147
Sun SF, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 763–780
Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annales des Telecommunications 74(7-8):423–434
Boneh D, Crescenzo DG, Ostrovsky R, Persiano G (2004) Publickey encryption with keyword search. In: in Proc. EUROCRTPR, vol 3027, pp 44–55
Jiang P, Guo F, Mu Y (2019) Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theoretical Computer Science 767:51–72
Li H, Huang Q, Shen J, Yang G, Susilo W (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Information Sciences 481:330–343
Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. annals of telecommunications-annales des télécommunications 69(7):391–402
Beak J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: in Proc. 2008 International Conference on Computational Science and Its Applications, pp 1249–1259
Pakniat N (2019) Designated tester certificateless encryption with keyword search. Journal of Information Security and Applications 49:102394, https://doi.org/10.1016/j.jisa.2019.102394
Uwizeye E, Wang J, Cheng Z, Li F (2019) Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Annals of Telecommunications 74(7), 435–449
Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Ann Telecommun 74(7):423–434
Sun L, Xu C, Li C, Li Y (2020) Server-aided searchable encryption in multi-user setting. Computer Communications 164:25–30
Ma M, Fan S, Feng D (2020) Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. J Inform Sec Appl 55:102652. https://doi.org/10.1016/j.jisa.2020.102652
Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against ikga. Computer Standards & Interfaces 81:103603
Pan X, Li F (2021) Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. Journal of Systems Architecture 115:102075. https://doi.org/10.1016/j.sysarc.2021.102075
Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp 2110–2118
Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp 522–530
Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S, Zhang Y (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal 6(3), 4660–4670
Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp 792–800
Szabo N (1996) Smart contracts: building blocks for digital markets. EXTROPY: The Journal of Transhumanist Thought (16) 18(2):28
Wood G, et al. (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32
Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58:102791
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No. 61662069, No. 61562077) and the Postdoctoral Research Foundation of China(No. 2017M610817).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
All authors in this work declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Yang, X., Tian, T., Wang, J. et al. Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing. Peer-to-Peer Netw. Appl. 15, 2270–2288 (2022). https://doi.org/10.1007/s12083-022-01345-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01345-0