| 研究生: |
于燿彰 Yu, Yao-Chang |
|---|---|
| 論文名稱: |
視覺化之向前式安全群組憑證電子簽章演算法及其在電子病歷系統的應用 Visualized Forward Secure Group Certificate Digital Signature Scheme and Its Application on Electronic Medical Record System |
| 指導教授: |
侯廷偉
Hou, Ting-Wei |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2014 |
| 畢業學年度: | 102 |
| 語文別: | 英文 |
| 論文頁數: | 72 |
| 中文關鍵詞: | 電子簽章 、演算法 、向前式安全 、小波函數 、電子病歷 、影像化電子簽章 |
| 外文關鍵詞: | Digital Signature, RSA Algorithm, Forward Secure, Discrete wavelet transform (DWT), Electronic Medical Record, Visualized Digital Signature |
| 相關次數: | 點閱:97 下載:7 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
電子病歷的完整性及可信任性一直是推動無紙化過程中的一個重要議題。電子簽章通常用來確保電子病歷的完整性及可信任性的一個重要方法;但是在實際的應用上卻出現二個問題:(1)電子簽章的持續有效性;(2)使用者(醫事人員)對電子簽章的信賴度。通常電子簽章是以儲存在智慧卡中的金鑰,以不對稱加解密演算法對明文進行簽署。在醫療領域中,這張智慧卡通常被稱為醫事人員憑證。在3種情況下,醫事人員憑證中的金鑰對需要被註銷:(1) 憑證遺失;(2) 憑證過期;(3)憑證不再被使用(例如人員退休)。當憑證被註銷後,用這憑證所簽署過的電子病歷都無法被驗證。
本研究提出二個非RSA演算法為基礎的視覺化之向前式安全群組憑證電子簽章演算法,使得電子簽章具有向前式安全的功能。該功能可以避免電子簽章因為更換憑證而失去可驗證性,並導入群組的概念使本演算法在實際利用上產生階層性,以減少金鑰的數量,及縮短搜尋金鑰的時間。視覺化使得電子簽章在電子病歷上的呈現方式不再只是一串的亂碼,取而代之的是內含電子簽章的傳統印章或簽名的影像,以協助使用者將一般習用印章或簽名的信賴性延伸到電子簽章。
本研究提出的演算法較現有類似演算法效能為佳,能抵擋各種已知可能的攻擊,並實做雛型系統。結果顯示,所提出之電子簽章演算法確實可以達到向前式安全,且所計算出之電子簽章值也可以順利的驗證,以確保電子簽章的可信賴性。另外在視覺化的處理上,實驗結果顯示峰值信號雜訊比(PSNR)為60~70db。這個值介於可接受範圍60~80dB間。
Integrity and trustworthiness are important to electronic medical records. Digital signature is a significant method to ensure the integrity and trustworthiness of electronic medical records. The key(s) used to generate/verifying a medical staff’s digital signatures is generally stored in a smart card, which is called a medical personnel certificate. There are three situations that would force a certificate to be revoked: certificate expiration, loss of the certificate, and retirement of the certificate holder. An important issue is that after a certificate is revoked, the digital documents signed by the revoked certificate are longer verifiable.
This research presents two new visualized forward secure digital signature algorithms, which are not based on RSA algorithm, for electronic medical records. A digital signature generated by applying either of the proposed algorithms, has the capability as forward secure, which means even a medical staff’s certificate is revoked, the medical records signed by the revoked private key still can be verified. The idea of group certificate helps to reduce the number of certificates and the time of searching certificates. Also, in order to extend the trust from a visualized traditional seal or a handwritten signature to a digital signature, an approach is proposed to embed the digital signature into a seal image or a handwritten signature image of the holder instead of a human unrecognizable form.
Performance comparisons with existing methods, and security analysis are performed and a prototype is implemented to demonstrate the feasibility of the proposed approach. The peak signal to noise ratio (PSNR) of the digital signature visualization process is 60~70db, which is very good in human eyes’ recognition level (60~80dB).
1. Electronic health systems got stimulus help, but not much else, http://www.politifact.com/truth-o-meter/promises/obameter/promise/59/invest-in-electronic-health-information-systems/.
2. 60 billions budget for Electronic Medical Record in Taiwan http://www.appledaily.com.tw/appledaily/article/finance/20091013/32010629/.
3. U.S. Department of Health & Human Services, “Health Insurance Portability and Accountability Act (HIPAA)”, 1996, http://www.hhs.gov/ocr/privacy/.
4. William Stallings, “Cryptography and Network security Principle and Practice”. Second Edition, 1999, Prentice Hall.
5. Zhou, X. Q., and Huang, H. K., “Authenticity and integrity of digital mammography image,” IEEE Trans. Med. Imaging, Vol. 20, Issue 8, pp. 784–791, 2001.
6. Lai, C. C., and Tsai, C. C., “Digital image watermarking using discrete wavlet transform and singular value decomposition,” IEEE Transactions on Instrumentation and Measurement, Vol. 59, Issue 11, pp. 3060–3063, 2010.
7. Tagliasacchi, M., Valenzise, G., and Tubaro, S., “Hash-based identification of sparse image tampering,” IEEE Transactions on Image Processing, Vol. 18, Issue 11, pp. 2491–2504, 2009.
8. Wu, C. W., “On the design of content-based multimedia authentication systems,” IEEE Transactions on Multimedia, Vol. 4, Issue 3, pp. 385–393, 2002.
9. Poulos, M., Bokos, G., and Vaioulis, F., “Toward the semantic extraction of digital signatures for librarian image-identification purposes,” Journal of the American Society for Information Science and Technology, Vol. 59, Issue 5, pp. 708–718, 2008.
10. Bausys, R., and Kriukovas, A., “A new scheme for image authentication framework,” Information Technology and Control, Vol. 37, No. 4, pp. 294–300, 2008.
11. German Digital Signature Act, http://www.iecl.ox.ac.uk/gla/statutes/SiG.htm.
12. Malaysia Digital Signature Law, http://www.wipo.int/wipolex/en/details.jsp?id=8181.
13. Italy Digital Signature Law, http://www.cnipa.gov.it/site/_files/Codice%20Amministrazione%20Digitale_02.pdf.
14. Korea Digital Signature Law, http://unpan1.un.org/intradoc/groups/public/documents/UN-DPADM/UNPAN042823.pdf.
15. Taiwan Digital Signature Law, http://law.moj.gov.tw/LawClass/LawContent.aspx?pcode=J0080037.
16. Guillou, L.C. and Quisquater,J.J. “A paradoxical identity-based signature scheme resulting from zero-knowledge,” Advances in Cryptology-Crypto’88 Lecture Notes in Computer Science, Vol. 403, pp. 216-231, 1988.
17. FIPS PUB 186-3, Information Technology Laboratory, National Institute of Standards and Technology, June, 2009.
18. Yu, Y.C. Huang, T.Y. and Hou, T.W., “Forward Secure Digital Signature for Electronic Medical Records,” Journal of Medical Systems, Vol.36, pp. 399-406, 2012.
19. Yu, Y.C. and Hou, T.W., “Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems,” Journal of Medical Systems, Vol.36, pp. 3115-3121, 2012.
20. Shamir, A., "How to share a secret", Communications of the ACM 22, No. 11 pp .612–613, 1979.
21. Anderson, R., “Two remarks on Public Key Cryptology,” Invited Lecture, ACM-CCS’97, 1997.
22. Bellare, M., and Miner, S., “A forward-secure digital signature scheme,” Advances in Cryptology-Crypto’99, Lecture Notes in Computer Science, pp. 431–448, 1999.
23. Abdalla, M., and Reyzin, L., “A New forward-secure digital signature scheme,” Advances in Cryptology-Asiacrypt’00, Lecture Notes in Computer Science, pp. 116–126, 2000.
24. Itkis, G., and Reyzin, L., “Forward-secure signatures with optimal signing and verifying,” Advances in Cryptology-Crypto’01, Lecture Notes in Computer Science, pp. 441–456, 2001.
25. Kim, K., Yie, I. and Nyang, D., “On the Security of Two Group Signature Schemes with Forward Security,” Informatica, Vol. 34, pp 237-242, 2010.
26. Yu, J., Kong, F.Y., Cheng, X.G., Hao, R. and Fan, J.X., “New Forward-Secure Signature Scheme with Untrusted Update,” Journal of Information Science and Engineering, Vol. 27, pp. 1435-1448, 2011.
27. Chen, T.S., Chang, C.C. and Hwang, M.S., “A virtual image cryptosystem based on vector quantization,” IEEE Transaction on Image Prosessing, Vol. 7, Issue 10, pp. 1485-1488, 1997.
28. Fang,W.H., Hu,N.C. and Shih, S.K., “Recusive fast computation of the two-dimensioal discrete cosine transform,” IEEE Proceeding on Vision, Image and Signal Processing, Vol. 146, Issue 1, pp. 25-33, 1999.
29. Zhu, J., “Image compressing using wavelets and JPEG2000: A tutorial. Electron,” Electronics & Communication Engineering Journal. Vol. 14, No. 3, pp. 112–121, 2002.
30. Mallat, S., “The theory for multiresolution signal decomposition: The wavelet representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 11, No. 7, pp. 654–693, 1989.
31. Makhoul, J. Roucos, S. and Gish, H., “Vector Quantization in Speech Coding,” Proceeding of the IEEE, Vol. 73, Issue11, pp. 1551-1588, 1985.
32. Nasrabadi, N.M.,”Image coding using vector quantization: a review,” IEEE Transactions on Communications, Vol .36, Issue 8, pp. 957-971, 1988.
33. Harn, L., “Group-oriented (t, n) threshold digital signature scheme and digital multisignature”, IEE Proceedings on Computers and Digital Techniques Vol. 141, No. 5, pp. 307-313, 1994.
34. Chen, K.Y., Chang, T.W., Yu, Y.C. and Laih, C. S., “Efficient authentication scheme based on group certificate and its application on mobile communication systems”, Applied cryptography and network security, pp. 475-484, 2004.
35. Abdalla, M., Miner, S. and Namprempre, C., “Forward-secure threshold signature schemes,” Progress in Cryptology CT-RSA, Lecture Notes in Computer Science, pp. 143-158, 2001.
36. Canetti, R., Halevi, S. and Katz, J., “A forward-secure public-key encryption scheme,” Advances in Cryptology-Eurocrypt’03, Lecture Notes in Computer Science, 2003.
37. Malkin, T., Micciancio, D. and Miner, S., “Efficient generic forward-secure signatures with an unbounded number of time periods,” Advances in Cryptology-Eurocrypt’02, Lecture Notes in Computer Science, 2002.
38. Ong, H., Schnorr, C. P. and Shamir, A.,” Efficient Signature Schemes Based on Polynomial Equations,” Advances in Cryptology-Crypto’85, Lecture Notes in Computer Science, pp. 37-46, 1985.
39. Ong, H. and Schnorr, C. P., “Fast Signature Generation with a Fiat Shamir — Like Scheme,” Advances in Cryptology-Crypto’91, Lecture Notes in Computer Science, pp.432-440, 1991.
40. Malkin, T., Micciancio, D. and Miner, S., "Efficient generic forward-secure signatures with unbounded number of time periods”, Advances in Cryptology-Eurocrypt’02, Lecture Notes in Computer Science, pp. 400-417, 2002.
41. Huynh-Thu, Q., and Ghanbari, M., “Scope of validity of PSNR in image/video quality assessment,” Electronics Letters, Vol. 44, No. 13, pp. 800–801, 2008.
42. Brandao, T. and Queluz, M. P., “Blind PSNR estimation of video sequences using quantized DCT coefficient data,” in Proc. Picture Coding Symposium, 2007.
43. P.Telagarapu, V.J. Naveen, A.L.Prasanthi, G.V. Santhi, “Image Compression Using DCT and Wavelet Transformations”, International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 4, No. 3, pp. 61-74, 2011.