+(91) 99007-25045
support@evolettechnologies.com
Conjunctive Keyword Search With
Designated Tester and Timing Enabled
Proxy Re‐Encryption Function for E‐Health
Clouds
  • Conjunctive Keyword Search With
Designated Tester and Timing Enabled
Proxy Re‐Encryption Function for E‐Health
Clouds

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re‐Encryption Function for E‐Health Clouds

  • Description
  • Reviews (0)

Product Description

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

An electronic health (e-health) record system is an important novel application that will bring great convenience in healthcare. The major concerns of the users are the privacy and security of the sensitive personal information, which could hinder further development and widely adoption of the systems.

The searchable encryption (SE) scheme is a technology plays an important role in the e-health record system by incorporating the security protection and favorable operability functions together. In the proposed system, a novel cryptographic primitive named as conjunctive keyword search with designated tester and timing enabled proxy reencryption function (Re-dtPECK), which is a kind of a time-dependent SE scheme is used.

It could enable patients to delegate partial access rights to others to operate search functions over their records in a limited time period. The length of the time period for the delegatee to search and decrypt the delegator’s encrypted documents can be controlled. Moreover, the delegatee could be automatically deprived of the access and search authority after a specified period of effective time.Conjunctive Keyword Search With Designated Tester and Timing Enabled

It can also support the conjunctive keywords search and resist the keyword guessing attacks. By the proposed system, only the designated tester is able to test the existence of certain keywords. By formulating a system model and a security model for the proposed Re-dtPECK scheme shows that it is an efficient scheme proved secure in the standard model. The comparison and extensive simulations demonstrate that it has a low computation and storage overhead.

Reviews

There are no reviews yet. Add a review