Skip to main content

Advertisement

Log in

Proxy re-signature scheme with cryptographic reverse firewall for medical data security

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Shukla S, Patel SJ (2024) A design of provably secure multi-factor ecc-based authentication protocol in multi-server cloud architecture. Clust Comput 27(2):1559–1580

    Article  Google Scholar 

  2. Xiong H, Huang X, Yang M et al (2021) Unbounded and efficient revocable attribute-based encryption with adaptive security for cloud-assisted internet of things. IEEE Internet Things J 9(4):3097–3111

    Article  Google Scholar 

  3. Xiong H, Yao T, Wang H et al (2021) A survey of public-key encryption with search functionality for cloud-assisted iot. IEEE Internet Things J 9(1):401–418

    Article  Google Scholar 

  4. Xiong H, Jin C, Alazab M et al (2021) On the design of blockchain-based ecdsa with fault-tolerant batch verification protocol for blockchain-enabled iomt. IEEE J Biomed Health Inform 26(5):1977–1986

    Article  Google Scholar 

  5. Xiong H, Hou Y, Huang X et al (2021) Heterogeneous signcryption scheme from ibc to pki with equality test for wbans. IEEE Syst J 16(2):2391–2400

    Article  Google Scholar 

  6. Xiong H, Zhao Y, Hou Y et al (2020) Heterogeneous signcryption with equality test for iiot environment. IEEE Internet Things J 8(21):16142–16152

    Article  Google Scholar 

  7. Xiong H, Chen J, Mei Q et al (2020) Conditional privacy-preserving authentication protocol with dynamic membership updating for vanets. IEEE Trans Depend Secure Comput 19(3):2089–2104

    Article  Google Scholar 

  8. Chen Y, Yao T, Ren H et al (2022) Unidirectional identity-based proxy re-signature with key insulation in ehr sharing system. CMES-Comput Model Eng Sci 131(3)

  9. Patel KA, Shukla S, Patel SJ (2024) A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. Concurr Comput Pract Exp 36(2):e7889

    Article  Google Scholar 

  10. Huang Y, Shen W, Qin J, Hou H (2023) Privacy-preserving certificateless public auditingsupporting different auditing frequencies. Computers & Security 128:103181

  11. Shukla S, Patel SJ (2022) A novel ecc-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. Computing 104(5):1173–1202

    Article  MathSciNet  Google Scholar 

  12. Shukla S, Patel SJ (2021) Securing fingerprint templates by enhanced minutiae-based encoding scheme in fuzzy commitment. IET Inf Secur 15(3):256–266

    Article  Google Scholar 

  13. Shukla S, Patel SJ (2019) A context-aware approach to enhance service utility for location privacy in internet of things. In: Advances in computing and data sciences: third international conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part II 3, Springer, pp 529–542

  14. Mironov I, Stephens-Davidowitz N (2015) Cryptographic reverse firewalls. In: Advances in cryptology-EUROCRYPT 2015: 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II 34, Springer, pp 657–686

  15. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 127–144

  16. Ateniese G, Hohenberger S (2005) Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM conference on computer and communications security, pp 310–319

  17. Shao J, Wei G, Ling Y, et al (2011) Unidirectional identity-based proxy re-signature. In: 2011 IEEE international conference on communications (ICC), IEEE, pp 1–5

  18. Yang X, Wang C, Zhang L et al (2014) On-line/off-line threshold proxy re-signatures. Chin J Electron 23(2):248–253

    Google Scholar 

  19. Tian M (2015) Identity-based proxy re-signatures from lattices. Inf Process Lett 115(4):462–467

    Article  MathSciNet  Google Scholar 

  20. Yang X, Gao G, Li Y et al (2015) On-line/off-line threshold proxy re-signature scheme through the simulation approach. Appl Math Inf Sci 9(6):3251

    MathSciNet  Google Scholar 

  21. Chen W, Li J, Huang Z et al (2021) Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J Comput Syst Sci 120:137–148

    Article  MathSciNet  Google Scholar 

  22. Bellare M, Paterson KG, Rogaway P (2014) Security of symmetric encryption against mass surveillance. In: Advances in cryptology–CRYPTO 2014: 34th annual cryptology conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I 34, Springer, pp 1–19

  23. Ateniese G, Magri B, Venturi D (2015) Subversion-resilient signature schemes. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 364–375

  24. Dodis Y, Mironov I, Stephens-Davidowitz N (2016) Message transmission with reverse firewalls—secure communication on corrupted machines. In: Annual international cryptology conference, Springer, pp 341–372

  25. Ma H, Zhang R, Yang G, et al (2018) Concessive online/offline attribute based encryption with cryptographic reverse firewalls—secure and efficient fine-grained access control on corrupted machines. In: Computer security: 23rd european symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II 23, Springer, pp 507–526

  26. Zhou Y, Guo J, Li F ( 2020 ) Certificateless public key encryption with cryptographic reversefirewalls. J Syst Arch 109:101754

  27. Ouyang M, Wang Z, Li F (2021) Digital signature with cryptographic reverse firewalls. J Systems Architect 116:102029

    Article  Google Scholar 

  28. Zhou Y, Hu Z, Li F (2021) Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Trans Cloud Comput

  29. Shao J, Cao Z, Wang L, et al (2007) Proxy re-signature schemes without random oracles. In: International conference on cryptology in India, Springer, pp 197–209

  30. Zhou Y, Zhao L, Jin Y et al (2022) Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf Sci 604:80–96

    Article  Google Scholar 

  31. Waters B (2005) Efficient identity-based encryption without random oracles. In: Advances in Cryptology–EUROCRYPT 2005: 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, Springer, pp 114–127

  32. Wu Y, Xiong H, Jin C (2020) A multi-use unidirectional certificateless proxy re-signature scheme. Telecommun Syst 73:455–467

    Article  Google Scholar 

  33. Chen J, Zhou T, Ji S et al (2024) Efficient public auditing scheme for non-administrator group with secure user revocation. J Inf Secur Appl 80:103676

    Google Scholar 

Download references

Funding

This work is supported in part by the Key Research and Development Program of Gansu Province (no. 23YFGA0081), the Industrial Support Plan Project of Gansu Provincial Education Department (no. 2023CYZC-09) and the National Natural Science Foundation of China (no. 62362059).

Author information

Authors and Affiliations

Authors

Contributions

Y.X. was responsible for the methodology, funding acquisition, supervision, and project administration. W.L. contributed to the writing of the original draft, conceptualization, data management, methodology, visualization, formal analysis, writing review, and editing. L.S. participated in the writing review and editing. D.X. conducted the investigation, supervision, and validation. W.C. provided resources and contributed to the methodology. All authors reviewed the manuscript.

Corresponding author

Correspondence to Lizhen Wei.

Ethics declarations

Ethics approval

This paper contains no studies with human participants or animals performed by authors.

Consent to publication

All authors have approved this manuscript for publication.

Conflict of interest

The authors declare no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy

Guest Editor: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, X., Wei, L., Li, S. et al. Proxy re-signature scheme with cryptographic reverse firewall for medical data security. Peer-to-Peer Netw. Appl. 17, 3459–3475 (2024). https://doi.org/10.1007/s12083-024-01769-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01769-w

Keywords