Mathematical Biosciences and Engineering (Jun 2024)

An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain

  • Jiayuan Zhang,
  • Rongxin Guo,
  • Yifan Shi,
  • Wanting Tang

DOI
https://doi.org/10.3934/mbe.2024271
Journal volume & issue
Vol. 21, no. 6
pp. 6167 – 6189

Abstract

Read online

Many current electronic medical record (EMR) sharing schemes that use proxy re-encryption and blockchain do not fully consider the potential threat of malicious node impersonation attacks. This oversight could lead to data leakage as attackers masquerade as legitimate users or proxy nodes during the sharing process. To deal with this problem, we propose an EMR sharing scheme based on proxy re-encryption and blockchain to protect against impersonation attacks. First, we prevent the potential threat of impersonation attacks by generating a shared temporary key and assigning tasks to multiple proxy nodes. Second, we use a random function to ensure that the selection of encrypted proxy nodes is fair. Third, we use a combination of blockchain and the InterPlanetary File System to solve the problem of insufficient storage capacity of shared processes and ensure the storage security of EMRs. Through the security proof, our scheme guarantees anti-impersonation, anti-collusion, and anti-chosen plaintext attack capability in the sharing process of EMRs. Additionally, experiments on the blockchain platform, namely Chain33, show that our scheme significantly increases efficiency.

Keywords