Mobile health medical sensor data privacy protection method based on certificateless dual authentication protection aggregate signature

A two-factor authentication and mobile health technology, applied in the field of information security, can solve problems such as re-signatures, and achieve the effects of improving efficiency, safe use, and improving computing efficiency

Active Publication Date: 2018-11-23
SHAANXI NORMAL UNIV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, although the existing CLS-based health and medical data privacy protection methods can effectively improve the computational efficiency of message signature verification, these existing health and medical data privacy protection methods based on batch verification have the problem of re-signature, so they cannot be very Well applied in the privacy protection of health and medical data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile health medical sensor data privacy protection method based on certificateless dual authentication protection aggregate signature
  • Mobile health medical sensor data privacy protection method based on certificateless dual authentication protection aggregate signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0036] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner", "outer", etc. are based on the orientation or positional relationships shown in the drawings, and are only for the convenience of describing the present invention Creation and simplification of description, rather than indicating or implying that the device or element referred to must have a specific orientation, be constructed and operate in a specific orientation, and therefore should not be construed as limiting the invention.

[0037] In addition, the terms "first", "second", "third", etc. are used for descriptive ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile health medical sensor data privacy protection method based on a certificateless dual authentication protection aggregate signature. The method comprises an initialization phase, a registration phase, a message signature phase, a verification phase, an aggregate phase, a batch verification phase and a re-signature extraction signature key phase. Based on the excellent performance of the certificateless dual authentication protection aggregate signature, the method provided by the invention avoids the problems of certificate management, key collocation and re-signature, also improves the computing efficiency of the mobile health medical data during verification of the aggregate signature, achieves privacy protection on the mobile health medical data, and canbe securely used in the open mobile health medical treatment.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a mobile health medical sensor data privacy protection method based on non-certificate double authentication protection aggregation signature. Background technique [0002] In order to solve the key escrow problem in the identity-based public key cryptosystem, in 2005, Xinyi Huang et al. publicly proposed a certificateless signature scheme (CLS). Compared with identity-based signatures, CLS does not require certificate management and requires less load, so it is more suitable for mobile security application environments with low bandwidth requirements and low energy consumption. Therefore, IBS can solve the binding problem of public key and entity, and can simplify the management of certificates. Therefore, since the birth of the certificateless digital signature scheme, it has been a very active research hotspot in cryptography. [0003] In 2014, Poett...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08
CPCH04L9/0869H04L9/3236H04L9/3247H04L9/3297H04L63/0414H04L63/08H04L63/10H04L67/10
Inventor 刘金会禹勇
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products