[1] |
Sun J, Yao X,Wang S,et al.Blockchain-based secure storage and access scheme for electronic medical records in IPFS[J].IEEE Access,2020,8:59389-59401.
|
[2] |
Liu Z,Weng J,Li J,et al.Cloud-based electronic health record system supporting fuzzy keyword search[J].Soft Computing,2016,20(8):3243-3255.
|
[3] |
Fimiani G.Supporting privacy in a cloud-based health information system by means of fuzzy conditional identity-based proxy reencryption (FCI-PRE)[C]∥Proc of the 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2018: 569-572.
|
[4] |
Jiao Ying. Security model of medical health data based on blockchain with privacy-preserving[D].Lanzhou:Lanzhou University of Technology,2019.(in Chinese)
|
[5] |
Cao S,Zhang G,Liu P,et al.Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain[J].Information Sciences,2019,485:427-440.
|
[6] |
Su Y,Li Y,Zhang K,et al.A privacy-preserving public integrity check scheme for outsourced EHRs[J].Information Sciences,2020,542:112-130.
|
[7] |
Song D X,Wagner D,Perrig A.Practical techniques for searches on encrypted data[C]∥Proc of 2000 IEEE Symposium on Security and Privacy,2000:44-55.
|
[8] |
Boneh D, Crescenzo G D,Ostrovsky R,et al.Public key encryption with keyword search[C]∥Proc of the International Conference on the Theory and Applications of Cryptographic Techniques,2004:506-522.
|
[9] |
Baek J,Safavinaini R,Susilo W,et al.Public key encryption with keyword search revisited[C]∥Proc of the International Conference on Computational Science and Its Applications,2008:1249-1259.
|
[10] |
Shao J,Cao Z,Liang X,et al.Proxy re-encryption with keyword search[J].Information Sciences,2010,180(13):2576-2587.
|
[11] |
Blaze M,Bleumer G,Strauss M,et al.Divertible protocols and atomic proxy cryptography[C]∥Proc of the 23rd Annual International Conference on the Theory and Application of Cryptographic Techniques,1998:127-144.
|
[12] |
Manoj R,Alsadoon A,Prasad P W C,et al.Hybrid secure and scalable electronic health record sharing in hybrid cloud[C]∥Proc of the 2017 5th IEEE International Conference on Mobile Cloud Computing,Services,and Engineering (MobileCloud),2017:185-190.
|
[13] |
Riad K,Hamza R,Yan H,et al.Sensitive and energetic IoT access control for managing cloud electronic health records[J].IEEE Access,2019,7:86384-86393.
|
[14] |
Au M H,Yuen T H,Liu J K,et al.A general framework for secure sharing of personal health records in cloud system[J].Journal of Computer and System Sciences,2017,90(1):46-62.
|
[15] |
Gautam P,Ansari M D,Sharma S K.Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing[J].International Journal of Information Security and Privacy,2019,13(1):59-69.
|
[16] |
Xu C, Wang N, Zhu L, et al. Achieving searchable and privacy-preserving data sharing for cloud-assisted e-Healthcare system[J].IEEE Internet of Things Journal,2019,6(5):8345-8356.
|
[17] |
Nakamoto S.Bitcoin:A peer-to-peer electronic cash system[J].Consulted,2009,75(8):1042-1048.
|
[18] |
Wang Y, Zhang A,Zhang P,et al.Cloud-assisted EHR sha- ring with security and privacy preservation via sonsortium blockchain[J].IEEE Access,2019,7:136704-136719.
|
[19] |
Zhang A Q, Ling X D. Towards secure and privacy- preserving data sharing in e-Health systems via consortium blockchain[J].Journal of Medical Systems,2018,42(8):Article:140.
|
[20] |
Chen L, Lee W K,Chang C C,et al.Blockchain based searchable encryption for electronic health record sharing[J].Future Generation Computer Systems,2019,95:420-429.
|
[21] |
Sahai A, Waters B R. Fuzzy identity based encryption[C]∥Proc of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, 2005:457-473.
|
[22] |
Rao Y S. A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing[J].Future Generation Computer Systems,2017,67:133-151.
|
[23] |
Niu S,Chen L,Wang J,et al.Electronic health record sharing scheme with searchable attribute-based encryption on blockchain[J].IEEE Access,2020,8:7195-7204.
|
[24] |
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption[C]∥Proc of the IEEE Symposium on Security & Privacy,2007:321-334.
|
[25] |
Sun J,Ren L,Wang S,et al.A blockchain-based framework for electronic medical records sharing with fine-grained access control[J].PLOS ONE,2020,15(10):e0239946.
|
[26] |
Boneh D,Boyen X,Shacham H.Short group signatures[C]∥Proc of the 24th Annual International Cryptography Conference,2004:41-55.
|
[27] |
Boneh D,Boyen X.Secure identity based encryption without random oracles[C]∥Proc of the 24th Annual International Cryptography Conference,2004:443-459.
|
[28] |
Zhong H, Zhu W,Xu Y,et al.Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage[J].Soft Computing,2016,22(1):1-9.
|
[29] |
Wu A, Zhang Y, Zheng X, et al. Efficient and privacy- preserving traceable attribute-based encryption in blockchain[J].Annals of Telecommunications,2019,74(7-8):401-411.
|
[30] |
Miao Y, Liu X, Choo K K R, et al. Privacy-preserving attribute-based keyword search in shared multi-owner setting[J].IEEE Transactions on Dependable and Secure Computing,2019,18(3):1080-1094.
|
[31] |
Wang S,Yao L,Zhang Y,et al.Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage[J].PLOS ONE,2018,13(10):e0205675.
|
|
附中文参考文献:
|
[4] |
焦滢.基于区块链和隐私保护的医疗健康数据安全模型研究[D].兰州:兰州理工大学,2019.
|