SAKEScalable Authenticated Key Exchange in Mobile E-Health Networks

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:fch_ray
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Mobile e-Health Network (MHN) is an emerging network across the entire range of functions involved in e-Health.It is important to establish secure channels between users since the data transmitted in MHNs are private,e.g.,personal medical records.However,secure key management is challenging in MHN due to its highly-dynamic and large-scale nature.In this paper,we first model MHN and formalize a hierarchical network architecture mirroring the administrative hierarchy and dynamic autonomy in MHNs in the real world.We next present a virtual MHN architecture with only three levels yet suitable to realistic MHNs with arbitrary hierarchical levels.By exploiting the virtual architecture,we propose an efficient authenticated key exchange framework to secure MHNs.We realize a scalable authenticated key exchange (SAKE) scheme with a dedicated variant of a recent hierarchical identity-based signature and the well-known Diffie-Hellman key exchange protocol.Theoretical analysis and experimental results show that SAKA is secure and scalable,and hence practical to secure MHNs.
其他文献
大数据(Big data)技术的普遍应用正在改变着传统的信息安全体系,因此需要设计新的信息安全模型和新的信息安全处理方法来面对新型信息安全挑战.本文从"端"、"管"、"云"三个层
随着社交网络、知识图谱等图应用的不断发展,对亿万个顶点级别大规模图的处理能力的需求愈加迫切,这是当前海量数据处理领域的研究和开发热点.但是,目前并没有一个全面的评估
互联网文本数据量的激增使得对其作聚类运算的处理时间显著加长,虽有研究者利用Hadoop架构进行了k-means并行化研究,但由于很难有效满足k-means需要频繁迭代的特点,因此执行
片上网络中路由器的关键部件出现故障将会影响整个网络的性能,文章针对路由器中的虚通道故障,提出一种相邻虚通道循环共享的VOQ (Virtual Output Queue)容错路由器.当某端口
随着集成电路工艺尺寸下降到纳米级,负偏置温度不稳定性(NBTI)成为影响电路可靠性的首要老化效应.精确的老化预测模型是节省防护开销的重要前提.针对传统的反应扩散机制下阈
不精确的广义门电路可靠性映射到门级或高层应用时误差容易因规模效应等而被过度放大导致结果不可靠.本文选择了在门级电路可靠性精确评估中得到有效验证的PTM模型用以精确计
作为软件测试领域的一个基本问题和热点问题,面向路径的测试用例自动生成有着特殊的重要意义.面向路径的测试用例生成本质上是一个约束满足问题,并通过搜索算法求解.着眼于提升搜索算法的效率,本文提出了一种新的智能算法,将分支限界和爬山法进行了有机的整合,分支限界作为全局搜索算法,而爬山法作为局部搜索算法,发挥各自的优势来对测试用例的解空间进行搜索.
  Fully homomorphic encryption is faced with two problems now.One is candidate fully homomorphic encryption scheme is few.Another is that the efficiency of fu
会议
弱密钥泄漏攻击是由Akavia和Goldwasser于2009年在TCC上提出来的,它可以被认为是一种非自适应性的密钥泄漏攻击.由于在现实中大部分的密钥泄漏攻击都可以认为是弱密钥泄漏攻
  chosen ciphertext attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem.The existin