2011
DOI: 10.1007/s10916-011-9700-7
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System

Abstract: In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the require… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 54 publications
(22 citation statements)
references
References 31 publications
0
22
0
Order By: Relevance
“…Further, our scheme, [8] and [10] are secure against possible attacks as compared to other schemes [5], [7], [11], [13]. However, [8] and [10] require very high storage and computational overheads compared to our scheme.…”
Section: Performance Comparison With Other Schemesmentioning
confidence: 79%
See 2 more Smart Citations
“…Further, our scheme, [8] and [10] are secure against possible attacks as compared to other schemes [5], [7], [11], [13]. However, [8] and [10] require very high storage and computational overheads compared to our scheme.…”
Section: Performance Comparison With Other Schemesmentioning
confidence: 79%
“…Moreover, dynamic access control problems in our scheme are solved efficiently as compared to other schemes. Considering security and low storage and computational complexity, our scheme is significantly better than all other schemes [5], [7], [8], [10], [11], [13].…”
Section: Performance Comparison With Other Schemesmentioning
confidence: 93%
See 1 more Smart Citation
“…In order to remedy such security flaw, Lin and Hsu (2011) proposed a key management scheme for dynamic hierarchical access control, which is again based on polynomial interpolation and ECC. Wu and Chen (2012) proposed a key management scheme to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem in e-medicine system. Though their scheme improves computational efficiency over Nikooghadam et al's (2010) scheme, it still suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication operations.…”
Section: Figurementioning
confidence: 99%
“…For this purpose, we first define the following formal definitions of Indistinguishability of encryption and chosen plaintext attack (IND-CPA). (Wu and Chen, 2012)]: Let SE / ME be the single/multiple eavesdropper respectively, and…”
Section: Formal Security Analysis Of the Proposed Schemementioning
confidence: 99%