题名 |
以屬性加密為基礎的輕量化雙向認證 |
并列篇名 |
A Lightweight mutual authentication based on Attribute-based Encryption |
作者 |
陳以德(I-Te Chen);陳胤彤(Yin-Tung Chen);蔡哲民(Jer-Min Tsai) |
关键词 |
密碼學 ; 屬性加密機制 ; 輕量化認證 ; 存取控制 ; Cryptography ; Attribute-based Encryption ; Lightweight authentication ; Access control |
期刊名称 |
資訊安全通訊 |
卷期/出版年月 |
27卷2期(2021 / 05 / 01) |
页次 |
41 - 65 |
内容语文 |
繁體中文 |
中文摘要 |
隨著物聯網(IoT)、5G與AI科技的發展,「智慧醫療」一詞其實就是將科技結合醫療,使得醫院開始在慢慢轉型,本研究以「智慧病房」為例,在於病房的布局上,讓所有連網的感測裝置與病患配對後,進行即時偵測,其中包含了量測病患血壓、脈搏、ECG…等相關生理訊號,然而部分數據屬於高度隱私,如果沒有透過好的加密與驗證機制,這些資料將有可能被洩漏出去或是被不正當的利用。本研究以屬性加密(Attribute-based Encryption)為主要架構,使用者可以選擇符合病患的屬性特徵以制定一些存取規則(Access policy),病患數據只能夠被某些符合其存取規則的特定使用者存取,其他無法滿足存取規則的使用者即使竊取到了數據,也因為透過加密而無法取得其明文內容。在完整驗證階段中以屬性加密為基礎,並在輕量化驗證階段,使用病患的生理數據與時間戳記作為seed,帶入PRNG產生隨機數,在這樣的情況下,僅有三方(病患、醫生、醫院Server)知道計算隨機數,使得有心人士就算竊取到了參數,也因為不知道隨機數該如何製作而無法完成驗證。並加入雜湊、XOR運算,使得整體加密與驗證更為完善。 |
英文摘要 |
Recently, With the development of Internet of Things, 5G and AI, the term "smart medical" is actually the combination of technology and medical. Our study takes "smart wards" as an example, which lies in the layout of the wards On the above. After pairing all connected sensor devices with the patient, which includes the measurement of the patient's blood pressure, pulse, ECG... and other related physiological signals. However, some of the data is highly private. If there is no effective encryption and verification mechanism, these data may be leaked out or used improperly. Our study uses Attribute-based Encryption as the main framework. Users can choose to match the patient's attribute characteristics to formulate some access policies. Patient data can only be accessed by certain access rules. Access by a specific user. Even if other users steal the data, they cannot obtain the plaintext content through encryption. In complete verification phase, ABE is used as the basis, and in the lightweight verification phase, the patient's physiological data and timestamp are used as the seed, and the PRNG is used to generate random numbers. In this case, there are only three parties (patients, doctor, hospital server) know to calculate the random number, so that even if the others steal the parameter, they cannot complete the verification because they don't know how to make the random number. In addition, hash function and XOR operations are added to make the overall encryption and verification more complete. |
主题分类 |
基礎與應用科學 >
資訊科學 |
参考文献 |
|