Abstract
To enhance the security of medical data, the government and healthcare institutions must collect and analyze vast amounts of information, enabling the prompt detection of irregular patterns and timely issuance of accurate warnings. This is crucial for preventing and containing potential threats to medical data security. However, securely sharing and converting these data poses a significant challenge, particularly in open wireless access networks within healthcare settings. Proxy re-signature (PRS) offers not only signature conversion capabilities but also anonymity, safeguarding data reliability and authenticity. Nonetheless, current proxy re-signature techniques overlook the potential for algorithm substitution attacks (ASA). Therefore, we introduce a novel proxy re-signature scheme, leveraging cryptographic reverse firewall (CRF) technology, tailored specifically for the medical domain. Furthermore, we conducted rigorous security analysis and simulation experiments to validate the practical effectiveness of our scheme. This approach addresses the need for secure data sharing among various entities, including medical institutions, management centers, and research facilities, ensuring the integrity and confidentiality of critical medical information.






Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
Shukla S, Patel SJ (2024) A design of provably secure multi-factor ecc-based authentication protocol in multi-server cloud architecture. Clust Comput 27(2):1559–1580
Xiong H, Huang X, Yang M et al (2021) Unbounded and efficient revocable attribute-based encryption with adaptive security for cloud-assisted internet of things. IEEE Internet Things J 9(4):3097–3111
Xiong H, Yao T, Wang H et al (2021) A survey of public-key encryption with search functionality for cloud-assisted iot. IEEE Internet Things J 9(1):401–418
Xiong H, Jin C, Alazab M et al (2021) On the design of blockchain-based ecdsa with fault-tolerant batch verification protocol for blockchain-enabled iomt. IEEE J Biomed Health Inform 26(5):1977–1986
Xiong H, Hou Y, Huang X et al (2021) Heterogeneous signcryption scheme from ibc to pki with equality test for wbans. IEEE Syst J 16(2):2391–2400
Xiong H, Zhao Y, Hou Y et al (2020) Heterogeneous signcryption with equality test for iiot environment. IEEE Internet Things J 8(21):16142–16152
Xiong H, Chen J, Mei Q et al (2020) Conditional privacy-preserving authentication protocol with dynamic membership updating for vanets. IEEE Trans Depend Secure Comput 19(3):2089–2104
Chen Y, Yao T, Ren H et al (2022) Unidirectional identity-based proxy re-signature with key insulation in ehr sharing system. CMES-Comput Model Eng Sci 131(3)
Patel KA, Shukla S, Patel SJ (2024) A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. Concurr Comput Pract Exp 36(2):e7889
Huang Y, Shen W, Qin J, Hou H (2023) Privacy-preserving certificateless public auditingsupporting different auditing frequencies. Computers & Security 128:103181
Shukla S, Patel SJ (2022) A novel ecc-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. Computing 104(5):1173–1202
Shukla S, Patel SJ (2021) Securing fingerprint templates by enhanced minutiae-based encoding scheme in fuzzy commitment. IET Inf Secur 15(3):256–266
Shukla S, Patel SJ (2019) A context-aware approach to enhance service utility for location privacy in internet of things. In: Advances in computing and data sciences: third international conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part II 3, Springer, pp 529–542
Mironov I, Stephens-Davidowitz N (2015) Cryptographic reverse firewalls. In: Advances in cryptology-EUROCRYPT 2015: 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II 34, Springer, pp 657–686
Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. In: International conference on the theory and applications of cryptographic techniques, Springer, pp 127–144
Ateniese G, Hohenberger S (2005) Proxy re-signatures: new definitions, algorithms, and applications. In: Proceedings of the 12th ACM conference on computer and communications security, pp 310–319
Shao J, Wei G, Ling Y, et al (2011) Unidirectional identity-based proxy re-signature. In: 2011 IEEE international conference on communications (ICC), IEEE, pp 1–5
Yang X, Wang C, Zhang L et al (2014) On-line/off-line threshold proxy re-signatures. Chin J Electron 23(2):248–253
Tian M (2015) Identity-based proxy re-signatures from lattices. Inf Process Lett 115(4):462–467
Yang X, Gao G, Li Y et al (2015) On-line/off-line threshold proxy re-signature scheme through the simulation approach. Appl Math Inf Sci 9(6):3251
Chen W, Li J, Huang Z et al (2021) Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J Comput Syst Sci 120:137–148
Bellare M, Paterson KG, Rogaway P (2014) Security of symmetric encryption against mass surveillance. In: Advances in cryptology–CRYPTO 2014: 34th annual cryptology conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I 34, Springer, pp 1–19
Ateniese G, Magri B, Venturi D (2015) Subversion-resilient signature schemes. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 364–375
Dodis Y, Mironov I, Stephens-Davidowitz N (2016) Message transmission with reverse firewalls—secure communication on corrupted machines. In: Annual international cryptology conference, Springer, pp 341–372
Ma H, Zhang R, Yang G, et al (2018) Concessive online/offline attribute based encryption with cryptographic reverse firewalls—secure and efficient fine-grained access control on corrupted machines. In: Computer security: 23rd european symposium on research in computer security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II 23, Springer, pp 507–526
Zhou Y, Guo J, Li F ( 2020 ) Certificateless public key encryption with cryptographic reversefirewalls. J Syst Arch 109:101754
Ouyang M, Wang Z, Li F (2021) Digital signature with cryptographic reverse firewalls. J Systems Architect 116:102029
Zhou Y, Hu Z, Li F (2021) Searchable public-key encryption with cryptographic reverse firewalls for cloud storage. IEEE Trans Cloud Comput
Shao J, Cao Z, Wang L, et al (2007) Proxy re-signature schemes without random oracles. In: International conference on cryptology in India, Springer, pp 197–209
Zhou Y, Zhao L, Jin Y et al (2022) Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf Sci 604:80–96
Waters B (2005) Efficient identity-based encryption without random oracles. In: Advances in Cryptology–EUROCRYPT 2005: 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, Springer, pp 114–127
Wu Y, Xiong H, Jin C (2020) A multi-use unidirectional certificateless proxy re-signature scheme. Telecommun Syst 73:455–467
Chen J, Zhou T, Ji S et al (2024) Efficient public auditing scheme for non-administrator group with secure user revocation. J Inf Secur Appl 80:103676
Funding
This work is supported in part by the Key Research and Development Program of Gansu Province (no. 23YFGA0081), the Industrial Support Plan Project of Gansu Provincial Education Department (no. 2023CYZC-09) and the National Natural Science Foundation of China (no. 62362059).
Author information
Authors and Affiliations
Contributions
Y.X. was responsible for the methodology, funding acquisition, supervision, and project administration. W.L. contributed to the writing of the original draft, conceptualization, data management, methodology, visualization, formal analysis, writing review, and editing. L.S. participated in the writing review and editing. D.X. conducted the investigation, supervision, and validation. W.C. provided resources and contributed to the methodology. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Ethics approval
This paper contains no studies with human participants or animals performed by authors.
Consent to publication
All authors have approved this manuscript for publication.
Conflict of interest
The authors declare no Conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy
Guest Editor: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yang, X., Wei, L., Li, S. et al. Proxy re-signature scheme with cryptographic reverse firewall for medical data security. Peer-to-Peer Netw. Appl. 17, 3459–3475 (2024). https://doi.org/10.1007/s12083-024-01769-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01769-w