On the HIDE based Group Signature for Secure Personal Healthcare Record Service |
Cho, Young-bok
(Department of Computer Science, Chungbuk National University)
Woo, Sung-hee (Department of Medical Information&Engineering, Korea National University of TransportationDepartment of Computer Science, Chungbuk National University) Lee, Sang-ho (Department of Computer Science, Chungbuk National University) Park, Jong-bae (Department of Radiology, Chungbuk Health&Science University) |
1 | Y. B. Cho, and S. H Lee, “An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol. 37B, no.3, pp. 149-157, 2013. |
2 | J. E. Song, S. H. Kim, M. A. Jung and K. I. Jung, “Medical information securiey of u-Healthcare service” Journal of The Korean Institute of Communications and Information Sciences, vol. 17, no. 1, pp. 47~56, 2007. |
3 | K. J. Kim and S. P. Hong, “Privacy Information Protection Model in e-Healthcare Environment” Journal of The Korean Society for Internet Informatin, vol. 10, no. 2, 2008. |
4 | Wong, K. Chung, G. Mohamed, and S. L. Simon,Lam. "Secure group communications using key graphs." in Proceeding of the IEEE/ACM Transactions, vol. 8. no. 1, pp.16-30, 2000. |
5 | Y. B. Cho, S. H. Woo and S. H Lee, “ IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol 38B, no. 10, pp. 801-807, 2013. DOI |
6 | Y. D. Joo and Y. H. An, “Improvements of a Dynamic ID-Based Remote User Authentication Scheme” Journal of The Institute of Webcasting, Internet and Telecommunication, vol. 11, no. 6, pp. 303-310, 2011. |
7 | Q. D Vu, B. N. Thai, and Een-Kee Hong. "A New Scheme for Multi-user Cooperation System Based on Iterative Decoder"in Proceeding of the KICIS Transactions. pp. 39-40. 2011. |
8 | J. H. Lee, J. S. Yu, H. J. Yoon and H.J Jang, “ System for Protecting Medical Informatio” Journal of The Korean Society for Internet Informatin, pp. 429-434, 2010. |
9 | Q. Jiang, J. Ma, Z. Ma and G. Li, “A privacy enhanced authentication scheme for telecare medical information systems” Journal of Medical Systems, vol. 36, no. 3, pp 1529-1535, 2012. DOI |
10 | P. Kumar, S. G. Lee and H. J. Lee, "E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks" in Proceeding of the Sensors2012 Transactions, pp. 1625-1647, 2012. |
11 | Y. D. Joo, “Security Improvements on Smart-Card Based Mutual Authentication Scheme” Webcasting, Journal of The Internet and Telecommunication, vol. 12, no. 6, pp. 91-98, 2012. DOI |
12 | K. Y. Choi, J. Y.Hwang and D. H.Lee, "ID-based Authenticated Group Key Agreement Secure against insider Attacks" in Proceeding of the IEICE Transactions. Fundamentals, vol. E91-A, no. 7, pp. 1828-1830, 2008. |
13 | Y. Yu,. "Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage" in Proceeding of the Network and System Security Transactions, Springer International Publishing, pp. 28-40, 2014. |
14 | A. Shamir, "How to share a secret." , in Proceeding of the Communications of the ACM Transactions, pp. 612-613, Nov, 1979. |
15 | B. Libert and J. Quisquater, “New Identity Based Signcryption Schemes from Pairings” IEEE Information Theory Workshop, http://eprint.iacr.org/2003/023, 2003. |
16 | H. L. Chae, and P. J. Lee. "Remarks on convertible group signatures of Asiacrypt'96." Electronics Letters vol.33, no.5, pp383-384, 1997. DOI |