IEEE Consumer Electronics Magazine - July 2018 - 69
bilinear Pairing algoriThms
Since the blockchain technology is used in various applications that require network security, this study also attempted
to use Weil's bilinear pairing [11] to propose a comprehensive network security plan. Bilinear pairing signature data
volume is about 160 bits in size, which is a cryptography
technique based on elliptic curve cryptography with the following three characteristics: bilinear, nondegeneracy, and
computable. We can use problems to confirm whether the
plan's network security needs are satisfied. Problems, such as
the computational Diffie-Hellman problem [12], the decisional Diffie-Hellman assumption [13], and the bilinear DiffieHellman problem [14], can all be used to ensure that the
bilinear pairing is not maliciously compromised.
The bilinear pairing's ID-based cryptography [15] and IDbased encryption are used in this study to achieve distributed
key management, confidentiality, identity authentication, message integrity, nonrepudiation, and privacy. As shown in Figure 2, when user A engages in medical behavior at node A, we
assume each node and user has its own established public key,
private key, and ID. The operation procedure is as follows:
1) Identity authentication: When user A and node A engage in
identity authentication, the ID-based cryptography can be
used to authenticate the identity of both parties as follows:
- User A uses his or her own private key as well as the
public key of node A to establish a common secret key
SK ID ) ID t,n = et ^PR ID , PU ID h
= ^PU ID # s ) PU ID h .
t,u a
t,u a
a
t,n a
t,u a
t,n a
(8)
- User A uses the common secret key, encrypts the message via a symmetric-key algorithm, and sends it to
node A as
ID t,u || H (M) || SK ID ) ID t,n ^ M h .
a
t,u a
a
When applying ID-based cryptography to identity authentication,
the approach relies on using public
keys and private keys to establish
a common secret key.
ID t, ua || SK IDt,u
a ) ID t,n a
^ID P, u a || SK ID p,ua ) ID t,na h .
- Node A receives the ciphertext, deciphers it, and stores
the anonymous ID of user A and the new common
secret key.
- Node A uses the new common secret key to encrypt the
message and sends it to user A as
ID P, ua || SK ID t,n
a ) ID P, u a
^ID P, u a || SK ID t,na ) ID P,ua h .
- User A receives the ciphertext and deciphers it; if the
message is verified, it establishes with node A an anonymous ID and new common secret key.
3) Health-care data collection: When node A wishes to collect the data of user A, it must first establish a common
secret key with all of the nodes, inquire whether any of
them possess any data pertaining to user A, and transmit
the data via private communication. In the process, user A
is never exposed, ensuring privacy protection. The collection process is performed with the permission of user A.
The procedure is
- User A sends a message, M, which is a consent form for
the personal data collection
ID P, ua || SK ID P,u
t,n a
a
a
t,u a
a
(11)
(9)
- When node A receives the message, it computes the
common secret key SK ID ) ID t,u to decipher the message and determine whether the message is integrated.
- Node A verifies that it is indeed user A and uses
SK ID ) ID t,u to encrypt the message and send it to user
A. User A uses SK ID ) ID t,n to decipher the message
and, if verified, confirms the identity of user A.
When applying ID-based cryptography to identity authentication, the approach relies on using public keys and private
keys to establish a common secret key. Given that public keys
are obtained by computing an ID and private keys from both
sides share the same master key, unless the malicious hacker
has access to the master key, it would be highly difficult to
forge an identity to gain access to a message.
2) Privacy protection: To prevent the identity of user A from
being exposed and traced, user A and node A engage in
negotiation to provide an anonymous ID as well as a common secret key for message confidentiality. The procedure
is as follows:
- User A transmits the anonymous ID and the common
secret key to node A, i.e.,
t,n a
(10)
a ) ID t, n a
^ M h.
(12)
- When node A receives the message, it uses the common
secret key to decipher it. Node A will proceed to establish common secret keys with other nodes and store said
keys to reduce the computation costs. Additionally,
symmetric encryption can also reduce the encryption/
deciphering computational burden. The message transmission between node A and every other node is
ID t, na || SK IDt,n
a ) ID t, 6 n
^ M h.
(13)
- When each node receives the message, it deciphers it
using the common secret key to verify whether consent
was given for the data collection. When all is verified,
each node searches for any information for user A.
- If any node finds information for user A, it utilizes its
common secret key with node A to encrypt the message
and send it to node A.
The data collection process never explicitly exposes any
information pertaining to user A, ensuring privacy protection.
Additionally, it successfully manages and stores the data. The
july 2018
^
IEEE Consumer Electronics Magazine
69
Table of Contents for the Digital Edition of IEEE Consumer Electronics Magazine - July 2018
Contents
IEEE Consumer Electronics Magazine - July 2018 - Cover1
IEEE Consumer Electronics Magazine - July 2018 - Cover2
IEEE Consumer Electronics Magazine - July 2018 - Contents
IEEE Consumer Electronics Magazine - July 2018 - 2
IEEE Consumer Electronics Magazine - July 2018 - 3
IEEE Consumer Electronics Magazine - July 2018 - 4
IEEE Consumer Electronics Magazine - July 2018 - 5
IEEE Consumer Electronics Magazine - July 2018 - 6
IEEE Consumer Electronics Magazine - July 2018 - 7
IEEE Consumer Electronics Magazine - July 2018 - 8
IEEE Consumer Electronics Magazine - July 2018 - 9
IEEE Consumer Electronics Magazine - July 2018 - 10
IEEE Consumer Electronics Magazine - July 2018 - 11
IEEE Consumer Electronics Magazine - July 2018 - 12
IEEE Consumer Electronics Magazine - July 2018 - 13
IEEE Consumer Electronics Magazine - July 2018 - 14
IEEE Consumer Electronics Magazine - July 2018 - 15
IEEE Consumer Electronics Magazine - July 2018 - 16
IEEE Consumer Electronics Magazine - July 2018 - 17
IEEE Consumer Electronics Magazine - July 2018 - 18
IEEE Consumer Electronics Magazine - July 2018 - 19
IEEE Consumer Electronics Magazine - July 2018 - 20
IEEE Consumer Electronics Magazine - July 2018 - 21
IEEE Consumer Electronics Magazine - July 2018 - 22
IEEE Consumer Electronics Magazine - July 2018 - 23
IEEE Consumer Electronics Magazine - July 2018 - 24
IEEE Consumer Electronics Magazine - July 2018 - 25
IEEE Consumer Electronics Magazine - July 2018 - 26
IEEE Consumer Electronics Magazine - July 2018 - 27
IEEE Consumer Electronics Magazine - July 2018 - 28
IEEE Consumer Electronics Magazine - July 2018 - 29
IEEE Consumer Electronics Magazine - July 2018 - 30
IEEE Consumer Electronics Magazine - July 2018 - 31
IEEE Consumer Electronics Magazine - July 2018 - 32
IEEE Consumer Electronics Magazine - July 2018 - 33
IEEE Consumer Electronics Magazine - July 2018 - 34
IEEE Consumer Electronics Magazine - July 2018 - 35
IEEE Consumer Electronics Magazine - July 2018 - 36
IEEE Consumer Electronics Magazine - July 2018 - 37
IEEE Consumer Electronics Magazine - July 2018 - 38
IEEE Consumer Electronics Magazine - July 2018 - 39
IEEE Consumer Electronics Magazine - July 2018 - 40
IEEE Consumer Electronics Magazine - July 2018 - 41
IEEE Consumer Electronics Magazine - July 2018 - 42
IEEE Consumer Electronics Magazine - July 2018 - 43
IEEE Consumer Electronics Magazine - July 2018 - 44
IEEE Consumer Electronics Magazine - July 2018 - 45
IEEE Consumer Electronics Magazine - July 2018 - 46
IEEE Consumer Electronics Magazine - July 2018 - 47
IEEE Consumer Electronics Magazine - July 2018 - 48
IEEE Consumer Electronics Magazine - July 2018 - 49
IEEE Consumer Electronics Magazine - July 2018 - 50
IEEE Consumer Electronics Magazine - July 2018 - 51
IEEE Consumer Electronics Magazine - July 2018 - 52
IEEE Consumer Electronics Magazine - July 2018 - 53
IEEE Consumer Electronics Magazine - July 2018 - 54
IEEE Consumer Electronics Magazine - July 2018 - 55
IEEE Consumer Electronics Magazine - July 2018 - 56
IEEE Consumer Electronics Magazine - July 2018 - 57
IEEE Consumer Electronics Magazine - July 2018 - 58
IEEE Consumer Electronics Magazine - July 2018 - 59
IEEE Consumer Electronics Magazine - July 2018 - 60
IEEE Consumer Electronics Magazine - July 2018 - 61
IEEE Consumer Electronics Magazine - July 2018 - 62
IEEE Consumer Electronics Magazine - July 2018 - 63
IEEE Consumer Electronics Magazine - July 2018 - 64
IEEE Consumer Electronics Magazine - July 2018 - 65
IEEE Consumer Electronics Magazine - July 2018 - 66
IEEE Consumer Electronics Magazine - July 2018 - 67
IEEE Consumer Electronics Magazine - July 2018 - 68
IEEE Consumer Electronics Magazine - July 2018 - 69
IEEE Consumer Electronics Magazine - July 2018 - 70
IEEE Consumer Electronics Magazine - July 2018 - 71
IEEE Consumer Electronics Magazine - July 2018 - 72
IEEE Consumer Electronics Magazine - July 2018 - 73
IEEE Consumer Electronics Magazine - July 2018 - 74
IEEE Consumer Electronics Magazine - July 2018 - 75
IEEE Consumer Electronics Magazine - July 2018 - 76
IEEE Consumer Electronics Magazine - July 2018 - 77
IEEE Consumer Electronics Magazine - July 2018 - 78
IEEE Consumer Electronics Magazine - July 2018 - 79
IEEE Consumer Electronics Magazine - July 2018 - 80
IEEE Consumer Electronics Magazine - July 2018 - 81
IEEE Consumer Electronics Magazine - July 2018 - 82
IEEE Consumer Electronics Magazine - July 2018 - 83
IEEE Consumer Electronics Magazine - July 2018 - 84
IEEE Consumer Electronics Magazine - July 2018 - 85
IEEE Consumer Electronics Magazine - July 2018 - 86
IEEE Consumer Electronics Magazine - July 2018 - 87
IEEE Consumer Electronics Magazine - July 2018 - 88
IEEE Consumer Electronics Magazine - July 2018 - 89
IEEE Consumer Electronics Magazine - July 2018 - 90
IEEE Consumer Electronics Magazine - July 2018 - 91
IEEE Consumer Electronics Magazine - July 2018 - 92
IEEE Consumer Electronics Magazine - July 2018 - 93
IEEE Consumer Electronics Magazine - July 2018 - 94
IEEE Consumer Electronics Magazine - July 2018 - 95
IEEE Consumer Electronics Magazine - July 2018 - 96
IEEE Consumer Electronics Magazine - July 2018 - Cover3
IEEE Consumer Electronics Magazine - July 2018 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20240102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20231112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20221112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20211112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202010
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202009
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202007
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202004
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202003
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202001
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201909
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201907
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201905
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201903
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201901
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201811
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201809
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201807
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201805
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201803
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2015
https://www.nxtbookmedia.com