• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

树奇偶校验机引导患者基于特权的电子病历安全共享:COVID-19期间远程医疗的网络安全

Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19.

作者信息

Sarkar Arindam, Sarkar Moumita

机构信息

Department of Computer Science and Electronics, Ramakrishna Mission Vidyamandira, Belur Math, Howrah, 711202 West Bengal India.

Department of Computer Science, The University of Burdwan, Golapbag, Burdwan, 713104 West Bengal India.

出版信息

Multimed Tools Appl. 2021;80(14):21899-21923. doi: 10.1007/s11042-021-10705-6. Epub 2021 Mar 21.

DOI:10.1007/s11042-021-10705-6
PMID:33776546
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7981392/
Abstract

In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health security risks have also risen significantly with the rise in the use of telehealth. This paper addresses one of e-health's key concerns, namely security. Secret sharing is a cryptographic method to ensure reliable and secure access to information. To eliminate the constraint that in the existing secret sharing schemes, this paper presents Tree Parity Machine (TPM) guided patients' privileged based secure sharing. This is a new secret sharing technique that generates the shares using a simple mask based operation. This work considers addressing the challenges presents in the original secret sharing scheme. This proposed technique enhances the security of the existing scheme. This research introduces a concept of privileged share in which among number of shares one share should come from a specific recipient (patient) to whom a special privilege is given to recreate the original information. In the absence of this privileged share, the original information cannot be reconstructed. This technique also offers TPM based exchange of secret shares to prevent Man-In-The-Middle-Attack (MITM). Here, two neural networks receive common inputs and exchange their outputs. In some steps, it leads to full synchronization by setting the discrete weights according to the specific rule of learning. This synchronized weight is used as a common secret session key for transmitting the secret shares. The proposed method has been found to produce attractive results that show that the scheme achieves a great degree of protection, reliability, and efficiency and also comparable to the existing secret sharing scheme.

摘要

在新冠疫情期间,远程医疗在电子医疗保健中发挥着重要作用。随着远程医疗使用的增加,电子医疗安全风险也显著上升。本文探讨了电子医疗的一个关键问题,即安全性。秘密共享是一种确保可靠和安全地访问信息的加密方法。为了消除现有秘密共享方案中的限制,本文提出了基于树奇偶机(TPM)引导的患者特权安全共享。这是一种新的秘密共享技术,它使用基于简单掩码的操作来生成份额。这项工作考虑解决原始秘密共享方案中存在的挑战。所提出的技术增强了现有方案的安全性。本研究引入了特权份额的概念,即在多个份额中,有一个份额应来自被赋予特殊特权以重建原始信息的特定接收者(患者)。如果没有这个特权份额,就无法重建原始信息。该技术还提供基于TPM的秘密份额交换,以防止中间人攻击(MITM)。在这里,两个神经网络接收共同输入并交换它们的输出。在某些步骤中,通过根据特定的学习规则设置离散权重,实现完全同步。这个同步权重被用作传输秘密份额的公共秘密会话密钥。已发现所提出的方法产生了有吸引力的结果,表明该方案实现了高度的保护、可靠性和效率,并且与现有的秘密共享方案相当。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/c6e4fe491508/11042_2021_10705_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/02662fb65506/11042_2021_10705_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/d7fd0fe7b457/11042_2021_10705_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/3b9778e079cc/11042_2021_10705_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/d7e5a9a9680e/11042_2021_10705_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/ef2a00dd065a/11042_2021_10705_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/c6e4fe491508/11042_2021_10705_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/02662fb65506/11042_2021_10705_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/d7fd0fe7b457/11042_2021_10705_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/3b9778e079cc/11042_2021_10705_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/d7e5a9a9680e/11042_2021_10705_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/ef2a00dd065a/11042_2021_10705_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3a95/7981392/c6e4fe491508/11042_2021_10705_Fig6_HTML.jpg

相似文献

1
Tree parity machine guided patients' privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19.树奇偶校验机引导患者基于特权的电子病历安全共享:COVID-19期间远程医疗的网络安全
Multimed Tools Appl. 2021;80(14):21899-21923. doi: 10.1007/s11042-021-10705-6. Epub 2021 Mar 21.
2
Neural Synchronization-Guided Concatenation of Header and Secret Shares for Secure Transmission of Patients' Electronic Medical Record: Enhancing Telehealth Security for COVID-19.用于患者电子病历安全传输的头部与秘密份额的神经同步引导拼接:增强 COVID-19 远程医疗安全性
Arab J Sci Eng. 2021;46(4):3301-3317. doi: 10.1007/s13369-020-05136-8. Epub 2021 Jan 2.
3
PQSF: post-quantum secure privacy-preserving federated learning.PQSF:后量子安全的隐私保护联邦学习
Sci Rep. 2024 Oct 9;14(1):23553. doi: 10.1038/s41598-024-74377-6.
4
Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications.用于医疗应用的无线人体传感器网络中安全通信的增强型BB84量子密码协议。
Pers Ubiquitous Comput. 2023;27(3):875-885. doi: 10.1007/s00779-021-01546-z. Epub 2021 Mar 18.
5
A novel secret sharing scheme using multiple share images.一种使用多个共享图像的新型秘密共享方案。
Math Biosci Eng. 2019 Jul 9;16(6):6350-6366. doi: 10.3934/mbe.2019317.
6
Neural perceptron & strict lossless secret sharing oriented cryptographic science: fostering patients' security in the "new normal" COVID-19 E-Health.面向神经感知器与严格无损秘密共享的密码科学:在新冠疫情“新常态”电子健康环境中保障患者安全
Multimed Tools Appl. 2022;81(13):17747-17778. doi: 10.1007/s11042-022-12440-y. Epub 2022 Mar 7.
7
Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.基于共享矩阵和图像加密的无损$(k,n)$秘密图像共享方案
IEEE Trans Image Process. 2017 Dec;26(12):5618-5631. doi: 10.1109/TIP.2017.2738561. Epub 2017 Aug 10.
8
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.基于 Shamir 秘密共享和 HMAC 认证的集中式门限密钥生成协议。
Sensors (Basel). 2022 Jan 3;22(1):331. doi: 10.3390/s22010331.
9
A collaborative secret sharing scheme based on the Chinese Remainder Theorem.一种基于中国剩余定理的协作式秘密共享方案。
Math Biosci Eng. 2019 Feb 19;16(3):1280-1299. doi: 10.3934/mbe.2019062.
10
Nonlinear secret image sharing scheme.非线性秘密图像共享方案。
ScientificWorldJournal. 2014;2014:418090. doi: 10.1155/2014/418090. Epub 2014 Jul 21.

引用本文的文献

1
Time Efficient Image Encryption-Decryption for Visible and COVID-19 X-ray Images Using Modified Chaos-Based Logistic Map.基于改进混沌 Logistic 映射的可见光和 COVID-19 射线图像的高效时频加密解密方法。
Appl Biochem Biotechnol. 2023 Apr;195(4):2395-2413. doi: 10.1007/s12010-022-04161-7. Epub 2022 Sep 24.

本文引用的文献

1
COVID-19 Pandemia and Public and Global Mental Health from the Perspective of Global Health Securit.从全球卫生安全角度看 COVID-19 大流行与公众和全球精神卫生
Psychiatr Danub. 2020 Spring;32(1):6-14. doi: 10.24869/psyd.2020.6.
2
Clinical features of patients infected with 2019 novel coronavirus in Wuhan, China.中国武汉地区 2019 年新型冠状病毒感染患者的临床特征。
Lancet. 2020 Feb 15;395(10223):497-506. doi: 10.1016/S0140-6736(20)30183-5. Epub 2020 Jan 24.
3
Applying the Data Protection Act 2018 and General Data Protection Regulation principles in healthcare settings.
在医疗环境中应用《2018年数据保护法》和通用数据保护条例原则。
Nurs Manag (Harrow). 2019 Jan 28;26(1):34-40. doi: 10.7748/nm.2019.e1806. Epub 2019 Jan 16.
4
The role of telemedicine in postoperative care.远程医疗在术后护理中的作用。
Mhealth. 2018 May 2;4:11. doi: 10.21037/mhealth.2018.04.03. eCollection 2018.
5
A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine.一种用于远程医疗中临床信号的双混沌层加密算法。
J Med Syst. 2017 Apr;41(4):59. doi: 10.1007/s10916-017-0698-3. Epub 2017 Feb 28.
6
The Emerging Zika Pandemic: Enhancing Preparedness.新兴的寨卡疫情:加强防范
JAMA. 2016 Mar 1;315(9):865-6. doi: 10.1001/jama.2016.0904.
7
Compression and Encryption of ECG Signal Using Wavelet and Chaotically Huffman Code in Telemedicine Application.远程医疗应用中基于小波和混沌哈夫曼编码的心电信号压缩与加密
J Med Syst. 2016 Mar;40(3):73. doi: 10.1007/s10916-016-0433-5. Epub 2016 Jan 16.
8
Chaotic Visual Cryptosystem Using Empirical Mode Decomposition Algorithm for Clinical EEG Signals.基于经验模态分解算法的用于临床脑电图信号的混沌视觉密码系统。
J Med Syst. 2016 Mar;40(3):52. doi: 10.1007/s10916-015-0414-0. Epub 2015 Dec 8.
9
Chaos based encryption system for encrypting electroencephalogram signals.用于加密脑电图信号的基于混沌的加密系统。
J Med Syst. 2014 May;38(5):49. doi: 10.1007/s10916-014-0049-6. Epub 2014 Apr 15.
10
Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes.利用可逆水印技术和差错控制编码对带有患者信息的数字眼底图像进行高效存储与传输。
J Med Syst. 2009 Jun;33(3):163-71. doi: 10.1007/s10916-008-9176-2.