面向医疗数据共享的匿名认证密钥交换方案
Anonymous Authenticated Key Exchange Scheme for Medical Data Sharing
DOI: 10.12677/csa.2025.154097, PDF,   
作者: 车 航, 岳笑含:沈阳工业大学信息科学与工程学院,辽宁 沈阳
关键词: 密钥交换身份认证累加器零知识证明Key Exchange Authentication Accumulator Zero-Knowledge Proof
摘要: 随着信息技术的快速发展,数据安全和用户的隐私越发受到重视。本文提出了一种匿名认证密钥交换(Anonymous Key Exchange, AKE)协议,旨在为医疗场景下的医疗数据共享和患者身份隐私提供安全和隐私的保护。该方案通过使用累加器、零知识证明和关联数据加密等技术,实现用户匿名的认证和安全的会话密钥协商,有效防止敌手对于用户和医用物联网设备的攻击,还能抵御诚实且好奇的医疗机构对患者身份的猜测。相较于现有的方案提供了更强的隐私安全保护,并且很好地平衡了性能和安全性,具有重要的理论价值和意义。
Abstract: With the rapid development of information technology, data security and user privacy have been paid more and more attention. This paper proposes an Anonymous authenticated Key Exchange (AKE) protocol to provide security and privacy protection for medical data sharing and patient identity privacy in medical scenarios. By using accumulator, zero-knowledge proof and associated data encryption technology, the scheme realizes anonymous user authentication and secure session key agreement, which effectively prevents adversaries from attacking users and medical IoT devices, and can resist honest and curious medical institutions from guessing the patient’s identity. Compared with the existing schemes, it provides stronger privacy security protection, and a good balance between performance and security, which has important theoretical value and significance.
文章引用:车航, 岳笑含. 面向医疗数据共享的匿名认证密钥交换方案[J]. 计算机科学与应用, 2025, 15(4): 252-259. https://doi.org/10.12677/csa.2025.154097

参考文献

[1] Chen, J., Zhang, Y. and Su, W. (2015) An Anonymous Authentication Scheme for Plug-In Electric Vehicles Joining to Charging/discharging Station in Vehicle-to-Grid (V2G) Networks. China Communications, 12, 9-19. [Google Scholar] [CrossRef
[2] Abbasinezhad-Mood, D., Ostad-Sharif, A., Mazinani, S.M. and Nikooghadam, M. (2020) Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections with Privacy Protection. IEEE Transactions on Industrial Informatics, 16, 7287-7294. [Google Scholar] [CrossRef
[3] Zhang, Y., Zou, J. and Guo, R. (2020) Efficient Privacy-Preserving Authentication for V2G Networks. Peer-to-Peer Networking and Applications, 14, 1366-1378. [Google Scholar] [CrossRef
[4] Wu, F., Xu, L., Kumari, S. and Li, X. (2015) An Improved and Anonymous Two-Factor Authentication Protocol for Health-Care Applications with Wireless Medical Sensor Networks. Multimedia Systems, 23, 195-205. [Google Scholar] [CrossRef
[5] Das, A.K., Sutrala, A.K., Odelu, V. and Goswami, A. (2016) A Secure Smartcard-Based Anonymous User Authentication Scheme for Healthcare Applications Using Wireless Medical Sensor Networks. Wireless Personal Communications, 94, 1899-1933. [Google Scholar] [CrossRef
[6] Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K. and Kumar, N. (2018) A Robust and Anonymous Patient Monitoring System Using Wireless Medical Sensor Networks. Future Generation Computer Systems, 80, 483-495. [Google Scholar] [CrossRef
[7] Ali, R., Pal, A.K., Kumari, S., Sangaiah, A.K., Li, X. and Wu, F. (2018) An Enhanced Three Factor Based Authentication Protocol Using Wireless Medical Sensor Networks for Healthcare Monitoring. Journal of Ambient Intelligence and Humanized Computing, 15, 1165-1186. [Google Scholar] [CrossRef
[8] Cui, J., Zhu, Y., Zhong, H., Zhang, Q., Gu, C. and He, D. (2024) Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT. IEEE Internet of Things Journal, 11, 16325-16338. [Google Scholar] [CrossRef
[9] Das, M.L., Saxena, A. and Gulati, V.P. (2004) A Dynamic Id-Based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, 50, 629-631. [Google Scholar] [CrossRef
[10] Wang, Y., Liu, J., Xiao, F. and Dan, J. (2009) A More Efficient and Secure Dynamic Id-Based Remote User Authentication Scheme. Computer Communications, 32, 583-585. [Google Scholar] [CrossRef
[11] Chen, H., Lo, J. and Yeh, C. (2012) An Efficient and Secure Dynamic Id-Based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems, 36, 3907-3915. [Google Scholar] [CrossRef] [PubMed]
[12] Wen, F. and Li, X. (2012) An Improved Dynamic Id-Based Remote User Authentication with Key Agreement Scheme. Computers & Electrical Engineering, 38, 381-387. [Google Scholar] [CrossRef
[13] Xie, Q., Wong, D.S., Wang, G., Tan, X., Chen, K. and Fang, L. (2017) Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics and Security, 12, 1382-1392. [Google Scholar] [CrossRef
[14] Kumari, S. and Renuka, K. (2019) Design of a Password Authentication and Key Agreement Scheme to Access E-Healthcare Services. Wireless Personal Communications, 117, 27-45. [Google Scholar] [CrossRef
[15] Gope, P. and Sikdar, B. (2019) An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication. IEEE Transactions on Smart Grid, 10, 6607-6618. [Google Scholar] [CrossRef
[16] Irshad, A., Usman, M., Ashraf Chaudhry, S., Naqvi, H. and Shafiq, M. (2020) A Provably Secure and Efficient Authenticated Key Agreement Scheme for Energy Internet Based Vehicle-to-Grid Technology Framework. IEEE Transactions on Industry Applications, 56, 4425-4435. [Google Scholar] [CrossRef
[17] Yu, S. and Park, K. (2024) PUF-Based Robust and Anonymous Authentication and Key Establishment Scheme for V2G Networks. IEEE Internet of Things Journal, 11, 15450-15464. [Google Scholar] [CrossRef
[18] Turkanović, M., Brumen, B. and Hölbl, M. (2014) A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks, Based on the Internet of Things Notion. Ad Hoc Networks, 20, 96-112. [Google Scholar] [CrossRef
[19] Farash, M.S., Turkanović, M., Kumari, S. and Hölbl, M. (2016) An Efficient User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Network Tailored for the Internet of Things Environment. Ad Hoc Networks, 36, 152-176. [Google Scholar] [CrossRef
[20] Yuanbing, W., Wanrong, L. and Bin, L. (2021) An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network. IEEE Access, 9, 105101-105117. [Google Scholar] [CrossRef
[21] Lian, H., Pan, T., Wang, H. and Zhao, Y. (2021) Identity-Based Identity-Concealed Authenticated Key Exchange. In: Lecture Notes in Computer Science, Springer, 651-675. [Google Scholar] [CrossRef
[22] Libert, B., Paterson, K.G. and Quaglia, E.A. (2012) Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model. In: Lecture Notes in Computer Science, Springer, 206-224. [Google Scholar] [CrossRef
[23] Lin, H. (2017) Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs. In: Lecture Notes in Computer Science, Springer, 599-629. [Google Scholar] [CrossRef
[24] Rani, D. and Tripathi, S. (2023) Design of Blockchain-Based Authentication and Key Agreement Protocol for Health Data Sharing in Cooperative Hospital Network. The Journal of Supercomputing, 80, 2681-2717. [Google Scholar] [CrossRef
[25] Baldimtsi, F., Camenisch, J., Dubovitskaya, M., Lysyanskaya, A., Reyzin, L., Samelin, K., et al. (2017) Accumulators with Applications to Anonymity-Preserving Revocation. 2017 IEEE European Symposium on Security and Privacy (EuroS & P), Paris, 26-28 April 2017, 301-315. [Google Scholar] [CrossRef