簡易檢索 / 詳目顯示

研究生: 于燿彰
Yu, Yao-Chang
論文名稱: 視覺化之向前式安全群組憑證電子簽章演算法及其在電子病歷系統的應用
Visualized Forward Secure Group Certificate Digital Signature Scheme and Its Application on Electronic Medical Record System
指導教授: 侯廷偉
Hou, Ting-Wei
學位類別: 博士
Doctor
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 72
中文關鍵詞: 電子簽章演算法向前式安全小波函數電子病歷影像化電子簽章
外文關鍵詞: Digital Signature, RSA Algorithm, Forward Secure, Discrete wavelet transform (DWT), Electronic Medical Record, Visualized Digital Signature
相關次數: 點閱:97下載:7
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 電子病歷的完整性及可信任性一直是推動無紙化過程中的一個重要議題。電子簽章通常用來確保電子病歷的完整性及可信任性的一個重要方法;但是在實際的應用上卻出現二個問題:(1)電子簽章的持續有效性;(2)使用者(醫事人員)對電子簽章的信賴度。通常電子簽章是以儲存在智慧卡中的金鑰,以不對稱加解密演算法對明文進行簽署。在醫療領域中,這張智慧卡通常被稱為醫事人員憑證。在3種情況下,醫事人員憑證中的金鑰對需要被註銷:(1) 憑證遺失;(2) 憑證過期;(3)憑證不再被使用(例如人員退休)。當憑證被註銷後,用這憑證所簽署過的電子病歷都無法被驗證。
    本研究提出二個非RSA演算法為基礎的視覺化之向前式安全群組憑證電子簽章演算法,使得電子簽章具有向前式安全的功能。該功能可以避免電子簽章因為更換憑證而失去可驗證性,並導入群組的概念使本演算法在實際利用上產生階層性,以減少金鑰的數量,及縮短搜尋金鑰的時間。視覺化使得電子簽章在電子病歷上的呈現方式不再只是一串的亂碼,取而代之的是內含電子簽章的傳統印章或簽名的影像,以協助使用者將一般習用印章或簽名的信賴性延伸到電子簽章。
    本研究提出的演算法較現有類似演算法效能為佳,能抵擋各種已知可能的攻擊,並實做雛型系統。結果顯示,所提出之電子簽章演算法確實可以達到向前式安全,且所計算出之電子簽章值也可以順利的驗證,以確保電子簽章的可信賴性。另外在視覺化的處理上,實驗結果顯示峰值信號雜訊比(PSNR)為60~70db。這個值介於可接受範圍60~80dB間。

    Integrity and trustworthiness are important to electronic medical records. Digital signature is a significant method to ensure the integrity and trustworthiness of electronic medical records. The key(s) used to generate/verifying a medical staff’s digital signatures is generally stored in a smart card, which is called a medical personnel certificate. There are three situations that would force a certificate to be revoked: certificate expiration, loss of the certificate, and retirement of the certificate holder. An important issue is that after a certificate is revoked, the digital documents signed by the revoked certificate are longer verifiable.
    This research presents two new visualized forward secure digital signature algorithms, which are not based on RSA algorithm, for electronic medical records. A digital signature generated by applying either of the proposed algorithms, has the capability as forward secure, which means even a medical staff’s certificate is revoked, the medical records signed by the revoked private key still can be verified. The idea of group certificate helps to reduce the number of certificates and the time of searching certificates. Also, in order to extend the trust from a visualized traditional seal or a handwritten signature to a digital signature, an approach is proposed to embed the digital signature into a seal image or a handwritten signature image of the holder instead of a human unrecognizable form.
    Performance comparisons with existing methods, and security analysis are performed and a prototype is implemented to demonstrate the feasibility of the proposed approach. The peak signal to noise ratio (PSNR) of the digital signature visualization process is 60~70db, which is very good in human eyes’ recognition level (60~80dB).

    中文摘要 1 Abstract 2 致謝 3 Chapter 1. Introduction 8 1.1 Motivation 9 1.2 Approach 12 1.3 Contribution 14 1.4 Overview 15 Chapter 2. Background 16 2.1 Ordinary Digital Signature Schemes 16 2.1.1 RSA Algorithm 16 2.1.2 Digital Signature Standard 18 2.1.3 GQ Digital Signature 19 2.2 Group-Oriented (t, n) Threshold Digital Signature Scheme 21 2.3 Group Certificate Digital Signature Scheme 23 2.4 Forward Secure Digital Signature Scheme 24 2.4.1 The Beginning of Forward Secure Signature Method 25 2.4.2 Basic Idea of Forward Secure Digital Signature Scheme 25 2.4.3 Bellare and Miner’s Forward-Secure Signature Scheme 26 2.4.4 Abdalla and Reyzin’s Forward-Secure Signature Scheme 29 2.4.5 Krawczyk’s Forward-Secure Signature Scheme 30 2.4.6 Malkin et al’s Forward-Secure Signature Scheme 32 2.5 Image Processing Technologies 35 2.5.1 Lossy Compression 35 2.5.2 Lossless Compression 37 Chapter 3. Forward Secure Group Certificate Digital Signature Scheme Based on Krawczyk’s Forward Secure Scheme 38 3.1 Algorithms 38 3.2 The Security, Performance and Shortcoming Analysis 40 3.2.1 Security Analysis 40 3.2.2 Performance Analysis 41 3.2.3 Shortcomings 41 Chapter 4. Forward-Secure Group Certificate Signature Scheme 43 4.1 Advantages 43 4.2 Model Description 44 4.2 Algorithms 45 Chapter 5. Application on Electronic Medical Record System 48 5.1 Scenario Setting 48 5.2 Scenario Description 49 5.3 Scenario Simulation 50 Chapter 6. Discussions 57 6.1 Security Analysis 57 6.2 Performance Analysis 60 6.3 Correctness Evaluation 60 6.3.1 Distortion Checking 61 6.3.2 Visualized Signature Correctness Checking 63 Chapter 7. Conclusions and Future Work 65 Reference 67 自述 72

    1. Electronic health systems got stimulus help, but not much else, http://www.politifact.com/truth-o-meter/promises/obameter/promise/59/invest-in-electronic-health-information-systems/.
    2. 60 billions budget for Electronic Medical Record in Taiwan http://www.appledaily.com.tw/appledaily/article/finance/20091013/32010629/.
    3. U.S. Department of Health & Human Services, “Health Insurance Portability and Accountability Act (HIPAA)”, 1996, http://www.hhs.gov/ocr/privacy/.
    4. William Stallings, “Cryptography and Network security Principle and Practice”. Second Edition, 1999, Prentice Hall.
    5. Zhou, X. Q., and Huang, H. K., “Authenticity and integrity of digital mammography image,” IEEE Trans. Med. Imaging, Vol. 20, Issue 8, pp. 784–791, 2001.
    6. Lai, C. C., and Tsai, C. C., “Digital image watermarking using discrete wavlet transform and singular value decomposition,” IEEE Transactions on Instrumentation and Measurement, Vol. 59, Issue 11, pp. 3060–3063, 2010.
    7. Tagliasacchi, M., Valenzise, G., and Tubaro, S., “Hash-based identification of sparse image tampering,” IEEE Transactions on Image Processing, Vol. 18, Issue 11, pp. 2491–2504, 2009.
    8. Wu, C. W., “On the design of content-based multimedia authentication systems,” IEEE Transactions on Multimedia, Vol. 4, Issue 3, pp. 385–393, 2002.
    9. Poulos, M., Bokos, G., and Vaioulis, F., “Toward the semantic extraction of digital signatures for librarian image-identification purposes,” Journal of the American Society for Information Science and Technology, Vol. 59, Issue 5, pp. 708–718, 2008.
    10. Bausys, R., and Kriukovas, A., “A new scheme for image authentication framework,” Information Technology and Control, Vol. 37, No. 4, pp. 294–300, 2008.
    11. German Digital Signature Act, http://www.iecl.ox.ac.uk/gla/statutes/SiG.htm.
    12. Malaysia Digital Signature Law, http://www.wipo.int/wipolex/en/details.jsp?id=8181.
    13. Italy Digital Signature Law, http://www.cnipa.gov.it/site/_files/Codice%20Amministrazione%20Digitale_02.pdf.
    14. Korea Digital Signature Law, http://unpan1.un.org/intradoc/groups/public/documents/UN-DPADM/UNPAN042823.pdf.
    15. Taiwan Digital Signature Law, http://law.moj.gov.tw/LawClass/LawContent.aspx?pcode=J0080037.
    16. Guillou, L.C. and Quisquater,J.J. “A paradoxical identity-based signature scheme resulting from zero-knowledge,” Advances in Cryptology-Crypto’88 Lecture Notes in Computer Science, Vol. 403, pp. 216-231, 1988.
    17. FIPS PUB 186-3, Information Technology Laboratory, National Institute of Standards and Technology, June, 2009.
    18. Yu, Y.C. Huang, T.Y. and Hou, T.W., “Forward Secure Digital Signature for Electronic Medical Records,” Journal of Medical Systems, Vol.36, pp. 399-406, 2012.
    19. Yu, Y.C. and Hou, T.W., “Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems,” Journal of Medical Systems, Vol.36, pp. 3115-3121, 2012.
    20. Shamir, A., "How to share a secret", Communications of the ACM 22, No. 11 pp .612–613, 1979.
    21. Anderson, R., “Two remarks on Public Key Cryptology,” Invited Lecture, ACM-CCS’97, 1997.
    22. Bellare, M., and Miner, S., “A forward-secure digital signature scheme,” Advances in Cryptology-Crypto’99, Lecture Notes in Computer Science, pp. 431–448, 1999.
    23. Abdalla, M., and Reyzin, L., “A New forward-secure digital signature scheme,” Advances in Cryptology-Asiacrypt’00, Lecture Notes in Computer Science, pp. 116–126, 2000.
    24. Itkis, G., and Reyzin, L., “Forward-secure signatures with optimal signing and verifying,” Advances in Cryptology-Crypto’01, Lecture Notes in Computer Science, pp. 441–456, 2001.
    25. Kim, K., Yie, I. and Nyang, D., “On the Security of Two Group Signature Schemes with Forward Security,” Informatica, Vol. 34, pp 237-242, 2010.
    26. Yu, J., Kong, F.Y., Cheng, X.G., Hao, R. and Fan, J.X., “New Forward-Secure Signature Scheme with Untrusted Update,” Journal of Information Science and Engineering, Vol. 27, pp. 1435-1448, 2011.
    27. Chen, T.S., Chang, C.C. and Hwang, M.S., “A virtual image cryptosystem based on vector quantization,” IEEE Transaction on Image Prosessing, Vol. 7, Issue 10, pp. 1485-1488, 1997.
    28. Fang,W.H., Hu,N.C. and Shih, S.K., “Recusive fast computation of the two-dimensioal discrete cosine transform,” IEEE Proceeding on Vision, Image and Signal Processing, Vol. 146, Issue 1, pp. 25-33, 1999.
    29. Zhu, J., “Image compressing using wavelets and JPEG2000: A tutorial. Electron,” Electronics & Communication Engineering Journal. Vol. 14, No. 3, pp. 112–121, 2002.
    30. Mallat, S., “The theory for multiresolution signal decomposition: The wavelet representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 11, No. 7, pp. 654–693, 1989.
    31. Makhoul, J. Roucos, S. and Gish, H., “Vector Quantization in Speech Coding,” Proceeding of the IEEE, Vol. 73, Issue11, pp. 1551-1588, 1985.
    32. Nasrabadi, N.M.,”Image coding using vector quantization: a review,” IEEE Transactions on Communications, Vol .36, Issue 8, pp. 957-971, 1988.
    33. Harn, L., “Group-oriented (t, n) threshold digital signature scheme and digital multisignature”, IEE Proceedings on Computers and Digital Techniques Vol. 141, No. 5, pp. 307-313, 1994.
    34. Chen, K.Y., Chang, T.W., Yu, Y.C. and Laih, C. S., “Efficient authentication scheme based on group certificate and its application on mobile communication systems”, Applied cryptography and network security, pp. 475-484, 2004.
    35. Abdalla, M., Miner, S. and Namprempre, C., “Forward-secure threshold signature schemes,” Progress in Cryptology CT-RSA, Lecture Notes in Computer Science, pp. 143-158, 2001.
    36. Canetti, R., Halevi, S. and Katz, J., “A forward-secure public-key encryption scheme,” Advances in Cryptology-Eurocrypt’03, Lecture Notes in Computer Science, 2003.
    37. Malkin, T., Micciancio, D. and Miner, S., “Efficient generic forward-secure signatures with an unbounded number of time periods,” Advances in Cryptology-Eurocrypt’02, Lecture Notes in Computer Science, 2002.
    38. Ong, H., Schnorr, C. P. and Shamir, A.,” Efficient Signature Schemes Based on Polynomial Equations,” Advances in Cryptology-Crypto’85, Lecture Notes in Computer Science, pp. 37-46, 1985.
    39. Ong, H. and Schnorr, C. P., “Fast Signature Generation with a Fiat Shamir — Like Scheme,” Advances in Cryptology-Crypto’91, Lecture Notes in Computer Science, pp.432-440, 1991.
    40. Malkin, T., Micciancio, D. and Miner, S., "Efficient generic forward-secure signatures with unbounded number of time periods”, Advances in Cryptology-Eurocrypt’02, Lecture Notes in Computer Science, pp. 400-417, 2002.
    41. Huynh-Thu, Q., and Ghanbari, M., “Scope of validity of PSNR in image/video quality assessment,” Electronics Letters, Vol. 44, No. 13, pp. 800–801, 2008.
    42. Brandao, T. and Queluz, M. P., “Blind PSNR estimation of video sequences using quantized DCT coefficient data,” in Proc. Picture Coding Symposium, 2007.
    43. P.Telagarapu, V.J. Naveen, A.L.Prasanthi, G.V. Santhi, “Image Compression Using DCT and Wavelet Transformations”, International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 4, No. 3, pp. 61-74, 2011.

    下載圖示 校內:2016-02-10公開
    校外:2016-02-10公開
    QR CODE