Key Words

電子藥籤 ; 隱私保護 ; 群體簽章 ; 代理簽章 ; 訊息回復



Volume or Term/Year and Month of Publication

14卷4期(2008 / 11 / 01)

Page #

107 - 128

Content Language


Chinese Abstract

由於電腦技術與網際網路的快速發展,使得醫療資訊從紙本紀錄邁向電子化資訊,如個人基本資料、病歷、藥籤等皆已電子化,但是隨著資訊取得更加地便利,如何有效解決醫療資訊電子化後所產生的隱私性等安全問題就顯得日趨重要。2002年Ateniese和Medeiros提出一個可以將病人藥籤及相關資訊儲存在智慧卡(smart card)的電子藥籤(e-prescription)系統。2004年Yang等人根據Ateniese和Medeiros的架構,提出一個以群體簽章(group signature)來保護醫生的身分隱私,並利用代理簽章(proxy signature)來處理病人授權領藥的電子藥籤系統。然而,本論文將列述出Yang 等人的系統仍存在一些安全性弱點,並進一步提出一個具有隱私保護的安全電子藥籤系統。

Topic Category 基礎與應用科學 > 資訊科學
  1. A. Jurisic,A. J. Menezes(1997).Elliptic curves and cryptography.Dr.Dobb`s Journal,22(4),26-35.
  2. A. Shamir(1985).Identity-based cryptosystems and signature schemes.In Proceedings of CRYPTO 84 on Advances in cryptology,47-53.
  3. B. T. Lau(2006).Proxy Signature Schemes.Industrial electronics and applications,1-6.
  4. C. Lambrinoudakis,S. Gritzalis(2000).Managing Medical and Insurance Information Through a Smart-Card-Based Information System.Journal of Medical Systems,24(4),213-234.
  5. C. M. Li,T. Hwang,N. Y. Lee(1994).Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders.In EUROCRYPT,194-204.
  6. C. Popescu(2002).An efficient ID-based group signature scheme.Informatica,47(2),29-36.
  7. C. Y. Lin,T. C. Wu,F Zhang,J. J. Hwang(2005).New identity-based society oriented signature schemes from pairings on elliptic curves.Applied Mathematics and Computation,160(1),245-260.
  8. D. Boneh,M. Franklin(2003).Identity-based encryption from the Weil pairing.SIAMJ. of Computing,32(3),586-615.
  9. D. Chaum,E. V. Heyst(1991).In Advances in Cryptology-Eurocrypt `91.Springer-Verlag.
  10. F. Zhang,W. Susilo,Y. Mu(2005).Financial cryptography and data security.Springer-Verlag.
  11. G.. Ateniese,B. de Medeiros(2002).Anonymous e-prescriptions.In proc. ACM workshop privacy in the electronic society (WPES02),19-31.
  12. H. Park,H. Kim, K. Chun,J. Lee, S. Lim,I. Yie(2007).Untraceability of group signature schemes based on bilinear mapping and their improvement.International conference on information technology (ITNG`07),747-753.
  13. J. Back,Y. Zheng(2004).identity-based threshold signature scheme from the bilinear pairings.In ITCC `04: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC`04)
  14. J. L. Zoreda,J. M. Oton(1994).Smart Cards, Artech House Inc..
  15. K. A. Shim(2006).Information and communications security.Springer-Verlag.
  16. M. Michels,P. Horster(1996).On the risk of disruption in several multiparty signature schemed.In ASIACRYPT ‘96: Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security
  17. Q. Wang,Z. Cao(2005).Computational intelligence and security.Springer-Verlag.
  18. S. Cui,X. Cheng(2006).Practical group signatures from RSA.Proceedings of the 20th international conference on advanced information networking and applications,1,5-9.
  19. T S. Chan(2003).Integrating Smart Card Access to Web-Based Medical Information System,.ACM Symposium on Applied Computing,246-250.
  20. T. G. Youn,Y. H. Park,C. H. Kim,J. Lim(2006).OTM Workshops 2006.Springer-Verlag.
  21. T. Nakanishi,N. Funabiki(2007).Verifier-Local revocation group signature schemes with backward unlinkability from bilinear maps.IEICE transactions on fundamentals of electronics communications and computer sciences,90(1),65-74.
  22. Y. Yang,X. Han,F. Bao,R. H. Deng(2004).A smart-card-enabled privacy preserving e-prescription system.IEEE transactions on information technology in biomedicine,8(1),47-58.