期刊文献+

基于Tate对的无线医疗匿名监护系统

An Anonymous Wireless Healthcare Monitoring System based on the Tate Pairing
在线阅读 下载PDF
导出
摘要 针对目前无线医疗系统对用户隐私以及数据安全保护力度不足的现状,采用椭圆曲线Tate对和AES,设计了新型的安全可信的无线医疗监护系统,实现对病人身份的匿名认证、医疗数据的安全传输等功能。同时,系统提供对跨平台、异构网络的数据传输,并拥有完备的紧急情况处理机制,具有较大的实用价值。系统创新性地将匿名认证引入无线医疗系统,并结合FPGA板卡的强大运算能力,高效而可靠地解决了在无线医疗系统中的信息安全隐患。 Aiming to solve the privacy and data security problem in wireless healthcare system, we propose a novel creditable security wireless healthcare system. By using Tate pairing on an elliptic curve and Advanced Encryption Standard (AES), we realize anonymity authentication and security medical data transmitting. The system supports cross-platform, heterogeneous networks data transmitting and has a perfect mechanism to deal with emergency. Our system creatively introduce anonymity authentication into wireless healthcare system, with the help of FPGA’s high speed calculation, it gives an efficient and reliable way to solve the security issues in wireless healthcare system.
出处 《信息网络安全》 2013年第1期61-64,共4页 Netinfo Security
关键词 匿名认证 隐私保护 无线医疗 FPGA anonymity authentication privacy protection wireless healthcare FPGA
  • 相关文献

参考文献7

  • 1H.Wang,D.Peng,W.Wang,H.Sharif, H.Chen, A.Khoynezhad. Resource-aware secure ECG healthcare monitoring through body sensor networks[J].IEEE Wireless Commtnications,2010,(01):12-19.
  • 2Kumar P,Lee H.-J. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks:A Survey[J].Sensors,2012,(01):55-91.
  • 3朱辉,李晖,苏万力,王育民.基于身份的匿名无线认证方案[J].通信学报,2009,30(4):130-136. 被引量:17
  • 4Boneh D,Franklin M. Identity-based encryption from the Weil pairing[J].SIAM Journal on Computing,2003,(03):586-615.doi:10.1137/S0097539701398521.
  • 5T.Kerins,W.P.Mamane,E.M.Popovici,P.S.L.M.Barreto. Efficient hardware for the Tate pairing calculation in characteristic three[A].Edinburgh:Springer-Verlag,2005.412-426.
  • 6J.Beuchat,N.Brisebarre,J.Detrey,E.Okamoto,M.Shirase, T.Takagi. Algorithms and arithmetic operators for computing the pairing in characteristic three[J].IEEE Transaction on Computer,2008,(11):1454-1468.
  • 7Paulo S.L,M.Barreto,H.Y.Kim,Ben Lynn, Michael Scott. Efficient Algorithms for Pairing-Based Cryptosystems[A].Santa Barbara:Springer-Verlag,2002.354-368.

二级参考文献13

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 4PARK J, GO J, KIM K. Wireless authentication protocol preserving user anonymity[A]. Proceedings of the 2001 Symposium on Cryptography and Information Security[C]. Janpan, 2001
  • 5WONG D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[A]. PerCom 2005 Workshops[C]. Kauai Island, Hawaii, 2005
  • 6KANG M H, RYOU H B, CHOI W. Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments[A].WINE 2005[C]. Hong Kong China, 2005.
  • 7KLM W H, YOON E J, YOO K Y. New authentication protocol providing user anonymity in open network [A]. WINE 2005[C]. Hong Kong, China, 2005.
  • 8BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 9BAEK J, SAFAVI-NAINI R, SUSILO W. Universal designated verifier signature proof[A]. Advances in Cryptology- Asiacrypt'05[C]. Berlin: Springer-Verlag, 2005. 644-661.
  • 10ZHANG F, SAFAVI-NAINI R, SUSILO W. An efficient signature scheme from bilinear pairings and its applications[A]. Practice and Theory in Public KeyCryptography-PKC'04[C]. Berlin: Springer- Verlag, 2004. 277-290.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部