skip to main content
research-article

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

Published:06 September 2019Publication History
Skip Abstract Section

Abstract

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

References

  1. Lucas Ballard, Matthew Green, Breno de Medeiros, and Fabian Monrose. 2005. Correlation-Resistant Storage via Keyword-Searchable Encryption. Cryptology ePrint Archive, Report 2005/417. Retrieved from http://eprint.iacr.org/2005/417.Google ScholarGoogle Scholar
  2. Elaine Barker. 2016. Recommendation for key management Part 1: General (revision 4). NIST Spec. Publ. 800-57 (Jan. 2016), 1--160.Google ScholarGoogle ScholarCross RefCross Ref
  3. Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Hovav Shacham. 2009. Randomizable proofs and delegatable anonymous credentials. In Advances in Cryptology (CRYPTO’09). Springer, Berlin, 108--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Greg Bell and Michael Ebert. 2015. Health Care and Cyber Security, Increasing Threats Require Increased Capabilities. Retrieved May 30, 2016 from https://assets.kpmg/content/dam/kpmg/pdf/2015/09/cyber-health-care-survey-kpmg-2015.pdf.Google ScholarGoogle Scholar
  5. Dan Boneh. 1998. The decision Diffie-Hellman problem. In Algorithmic Number Theory. Springer, Berlin, 48--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jan Camenisch, Manu Drijvers, and Maria Dubovitskaya. 2017. Practical UC-secure delegatable credentials with attributes and their application to blockchain. In Proceedings of the 2017 ACM Conference on Computer and Communications Security (ACM CCS’17). ACM, New York, NY, 683--699. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jan Camenisch and Anna Lysyanskaya. 2003. A signature scheme with efficient protocols. In Security in Communication Networks (SCN’02). Springer, Berlin, 268--289. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jan Camenisch and Anna Lysyanskaya. 2004. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology (CRYPTO’04). Springer, Berlin, 56--72.Google ScholarGoogle Scholar
  9. Jan Camenisch and Els Van Herreweghen. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security (ACM CCS’02). ACM, New York, NY, 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Melissa Chase and Anna Lysyanskaya. 2006. On signatures of knowledge. In Advances in Cryptology (CRYPTO’06). Springer, Berlin, 78--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Henry Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, and Frederik Vercauteren. 2005. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman 8 Hall/CRC, Boca Raton, FL.Google ScholarGoogle Scholar
  12. Constantin-Cǎtǎlin Drǎgan, Daniel Gardham, and Mark Manulis. 2018. Hierarchical attribute-based signatures. In Cryptology and Network Security. Springer International Publishing, Cham, 213--234.Google ScholarGoogle Scholar
  13. Ali El Kaafarani, Essam Ghadafi, and Dalia Khader. 2014. Decentralized traceable attribute-based signatures. In Topics in Cryptology (CT-RSA’14). Springer International Publishing, Cham, 327--348.Google ScholarGoogle Scholar
  14. Georg Fuchsbauer. 2011. Commuting signatures and verifiable encryption. In Advances in Cryptology (EUROCRYPT’11). Springer, Berlin, 224--245. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Georg Fuchsbauer, Christian Hanser, and Daniel Slamanig. 2014. Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials. Cryptology ePrint Archive, Report 2014/944. Retrieved from http://eprint.iacr.org/2014/944.Google ScholarGoogle Scholar
  16. Essam Ghadafi. 2015. Stronger security notions for decentralized traceable attribute-based signatures and more efficient constructions. In Topics in Cryptology (CT-RSA’15). Springer International Publishing, Cham, 391--409.Google ScholarGoogle Scholar
  17. Arash Ghazvini and Zarina Shukur. 2014. Security challenges and success factors of electronic healthcare system. Proc. Technol. 11 (Jan. 2014), 212--219.Google ScholarGoogle Scholar
  18. Nan Guo, Yuanting Jin, and Kangbin Yim. 2014. Anonymous credential-based privacy-preserving identity verification for business processes. In Proceedings of 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, Los Alamitos, CA, 554--559. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nesrine Kaaniche and Maryline Laurent. 2016. Attribute-based signatures for supporting anonymous certification. In Computer Security (ESORICS’16). Springer International Publishing, Cham, 279--300.Google ScholarGoogle Scholar
  20. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, and Kui Ren. 2010. Attribute-based signature and its applications. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS’10). ACM, New York, NY, 60--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24, 1 (Jan. 2013), 131--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Weiwei Liu, Yi Mu, and Guomin Yang. 2014. Attribute-based signing right delegation. In Network and System Security. Springer International Publishing, Cham, 323--334.Google ScholarGoogle Scholar
  23. Tatsuaki Okamoto and Katsuyuki Takashima. 2013. Decentralized attribute-based signatures. In Public-Key Cryptography (PKC’13). Springer, Berlin, 125--142.Google ScholarGoogle Scholar
  24. Tatsuaki Okamoto and Katsuyuki Takashima. 2014. Efficient attribute-based signatures for non-monotone predicates in the standard model. IEEE Trans. Cloud Comput. 2, 4 (Aug. 2014), 409--421.Google ScholarGoogle ScholarCross RefCross Ref
  25. Christian Paquin and Greg Zaverucha. 2013. U-Prove Cryptographic Specification V1.1 (Revision 3). Retrieved Mar. 01, 2017 from https://www.microsoft.com/en-us/research/publication/u-prove-cryptographic-specification-v1-1-revision-3/.Google ScholarGoogle Scholar
  26. Seyed A. Pourbakhsh and Raj Katti. 2015. Efficient attributes in secure credentials. In Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing. IEEE, Los Alamitos, CA, 107--112.Google ScholarGoogle Scholar
  27. PRC 2005. Privacy Rights Clearinghouse: Security Breaches 2005—Present. Retrieved Oct. 16, 2015 from http://www.privacyrights.org/data-breach.Google ScholarGoogle Scholar
  28. Harsha S. Gardiyawasam Pussewalage and Vladimir A. Oleshchuk. 2016a. An attribute based access control scheme for secure sharing of electronic health records. In Proceedings of the 18th IEEE International Conference on E-health, Networking, Application and Services (IEEE HealthCom’16). IEEE, Los Alamitos, CA, 526--531.Google ScholarGoogle Scholar
  29. Harsha S. Gardiyawasam Pussewalage and Vladimir A. Oleshchuk. 2016b. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 36, 6, Part B (Sep. 2016), 1161--1173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Harsha S. Gardiyawasam Pussewalage and Vladimir A. Oleshchuk. 2017a. An efficient multi-show unlinkable attribute based credential scheme for a collaborative E-health environment. In Proceedings of the 3rd IEEE Collaboration and Internet Computing (IEEE CIC’17). IEEE, Los Alamitos, CA, 421--428.Google ScholarGoogle Scholar
  31. Harsha S. Gardiyawasam Pussewalage and Vladimir A. Oleshchuk. 2017b. Attribute based access control scheme with controlled access delegation for collaborative E-health environments. J. Inf. Secur. Appl. 37 (Oct. 2017), 50--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sietse Ringers, Eric Verheul, and Jaap-Henk Hoepman. 2017. An Efficient Self-Blindable Attribute-Based Credential Scheme. Cryptology ePrint Archive, Report 2017/115. Retrieved from http://eprint.iacr.org/2017/115.Google ScholarGoogle Scholar
  33. WEDI. 2015. Perspectives on Cybersecurity in Healthcare. Retrieved Nov. 30, 2016 from http://www.wedi.org/docs/test/cyber-security-primer.pdf.Google ScholarGoogle Scholar

Index Terms

  1. An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 19, Issue 3
        Special Section on Advances in Internet-Based Collaborative Technologies
        August 2019
        289 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3329912
        • Editor:
        • Ling Liu
        Issue’s Table of Contents

        Copyright © 2019 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 September 2019
        • Revised: 1 May 2019
        • Accepted: 1 May 2019
        • Received: 1 January 2018
        Published in toit Volume 19, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!