Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare

  • Entao Luo
  • Guojun WangEmail author
  • Kun Tang
  • Quanyou Zhao
  • Chen He
  • Liyong Guo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125)


To solve doctor’s service bottlenecks under the peak condition of mobile medical, the paper proposes utilizing authorized agents to provide service, so as to reduce the burden of doctors and enhance the flexibility of service as well. We use attribute encryption technology to encrypt medical data, the ciphertext can be decrypted correctly when the proxy attribute satisfies the policy set by the authorized user, so as to obtain proxy signature to provide medical service for medical users. The scheme not only can alleviate the burden on the mobile medical service providers in the peak of the bottleneck, but also can solve the authorization problem during the absence of doctors. At the same time, we can achieve proxy traceback to preform the agency accountability and to avoid unauthorized agency audit. This scheme can be used to reduce the computing cost of authorized doctors by using trusted authorization center. The simulation results reveal that the performance can be improved significantly than other scheme.


Mobile health-care Digital signature Anonymous agent Attribute-based encryption Traceable 


  1. 1.
    Lu, Z., Chen, X., Dong, Z.: A prototype of reflection pulse oximeter designed for mobile healthcare. IEEE J. Biomed. Health Inform. 20(5), 1 (2015)Google Scholar
  2. 2.
    Zhang, K., Yang, K., Liang, X.: Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel. Commun. 22(4), 104–112 (2015)CrossRefGoogle Scholar
  3. 3.
    Ren, Y., Chen, Y., Chuah, M.C.: User verification leveraging gait recognition for smartphone enabled mobile healthcare systems. IEEE Trans. Mob. Comput. 14(9), 1961–1974 (2015)CrossRefGoogle Scholar
  4. 4.
    Jiang, S., Zhu, X., Hao, R., et al.: Lightweight and privacy-preserving agent data transmission for mobile healthcare. In: IEEE International Conference on Communications, pp. 7322–7327. IEEE (2015)Google Scholar
  5. 5.
    Santos-Pereira, C., Augusto, A.B., Cruz-Correia, R., et al.: A secure RBAC mobile agent access control model for healthcare institutions. In: Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, pp. 349–354 IEEE (2013)Google Scholar
  6. 6.
    Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005). Scholar
  7. 7.
    Kim, Y.S., Chang, J.H.: Self proxy signature scheme. IJCSNS Int. J. Comput. Sci. Netw. Secur. 7(2), 335–338 (2007)Google Scholar
  8. 8.
    Yu, Y., Xu, C., Huang, X.: An efficient anonymous proxy signature scheme with provable security. Comput. Stand. Interfaces 31(2), 348–353 (2009)CrossRefGoogle Scholar
  9. 9.
    Li, F., Zhong, D., Takagi, T.: Practical identity-based signature for wireless sensor networks. IEEE Wirel. Commun. Lett. 1(6), 637–640 (2012)CrossRefGoogle Scholar
  10. 10.
    Jung, T., Li, X., Wan, Z.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190–199 (2015)CrossRefGoogle Scholar
  11. 11.
    Guo, L., Zhu, X., Zhang, C., et al.: Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers. In: Global Communications Conference on 2013, pp. 629–634. IEEE (2013)Google Scholar
  12. 12.
    Liu, Z., Cao, Z., Wong, D.S.: Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1), 55–68 (2015)CrossRefGoogle Scholar
  13. 13.
    Fugkeaw S, Sato H. An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud. In: Computer Software and Applications Conference IEEE, pp. 73–78. IEEE Computer Society (2015)Google Scholar
  14. 14.
    Zhu, H., Du, S., Li, M., Gao, Z.: Fairness-aware and privacy-preserving friend matching protocol in mobile social networks. IEEE Trans. Emerging Topics in Comput. 1(1), 192–200 (2013)CrossRefGoogle Scholar
  15. 15.
    Chen, Y., Zhang, L., Weng, Y.: A data encryption algorithm based on dual chaotic system. In: International Conference on Computer Application and System Modeling, vol. 4, pp. V431–435. IEEE (2010)Google Scholar
  16. 16.
    Hazay, C., Toft, T.: Computationally secure pattern matching in the presence of malicious adversaries. J. Cryptol. 27, 358–395 (2014)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Lindell, Y., Pinkas, B., Smart, N.P.: Implementing two-party computation efficiently with security against malicious adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2–20. Springer, Heidelberg (2008). Scholar
  18. 18.
    Chang, W., Wu, J.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020–2035 (2015)CrossRefGoogle Scholar
  19. 19.
    Tang, K., Shi, R.H., Dong J.: Throughput Analysis of Cognitive Wireless Acoustic Sensor Networks with Energy Harvesting. Futur. Gener. Comput. Syst. (2017). Scholar
  20. 20.
    Xie, K., Cao, J., Wang, X., Wen, J.: Optimal resource allocation for reliable and energy efficient cooperative communications. IEEE Trans. Wireless Commun. 12(10), 4994–5007 (2013)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.School of Electronics and Information EngineeringHunan University of Science and EngineeringYongzhouChina
  2. 2.School of Computer Science and TechnologyGuangzhou UniversityGuangzhouChina

Personalised recommendations