CN117574440A - Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies - Google Patents

Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies Download PDF

Info

Publication number
CN117574440A
CN117574440A CN202410067638.0A CN202410067638A CN117574440A CN 117574440 A CN117574440 A CN 117574440A CN 202410067638 A CN202410067638 A CN 202410067638A CN 117574440 A CN117574440 A CN 117574440A
Authority
CN
China
Prior art keywords
medical data
signature
data
circulation
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410067638.0A
Other languages
Chinese (zh)
Other versions
CN117574440B (en
Inventor
田雨
柏菀
赵振淞
陆遥
周天舒
李劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN202410067638.0A priority Critical patent/CN117574440B/en
Publication of CN117574440A publication Critical patent/CN117574440A/en
Application granted granted Critical
Publication of CN117574440B publication Critical patent/CN117574440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a alliance chain medical data right-confirming and tracing method and system based on various signature technologies. The invention introduces the multiple signature technology, the circulation of the medical data needs to obtain multiple signatures of corresponding patients and doctors on the alliance chain, the illegal circulation of the medical data can be reduced, and the legal rights of the patients and the doctors to the medical data can be clarified. The invention introduces a fair blind signature technology, so that medical data circulation is carried out under the supervision of the supervision organization, and under the condition that circulation information needs to be traced, the supervision organization can combine with a semi-trusted third party to trace and trace specific medical data circulation information. The invention separates the medical data circulation signature on the chain from the medical data transmission under the chain, can carry out the right-confirming and source-tracing of the medical data while ensuring the safety of the medical data, and greatly reduces the privacy exposure risk.

Description

Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies
Technical Field
The invention belongs to the field of medical data processing, and particularly relates to a alliance chain medical data right-determining and tracing method and system based on various signature technologies.
Background
As is known, huge utilization value is contained in massive medical data, and analysis mining of the massive medical data can be applied to disease prediction, auxiliary medical diagnosis, personalized information recommendation, clinical decision support, medication mode mining and the like. The medical data originates from the patient, and the privacy rights of the patient can be extended to the medical data of the patient. The medical facility legally enjoys control and usage rights to the medical data it processes, analyzes, etc. Meanwhile, the patient has information self-right and participation right on the medical data, and the medical institution can circulate and utilize the medical data only after the relevant patient is informed to agree. However, in a real clinical situation, most of the patient's visit data is stored in a hospital, it is difficult to obtain informed consent of the patient every time the medical data is circulated and used, the patient's information discretion and participation of the medical data are difficult to be protected, the circulation of the medical data is difficult to supervise and trace the source, and it is difficult to perform the confirmation and tracing of the medical data while scientifically utilizing the medical data.
With the continuous development of blockchain technology, many students consider that the technology has great application potential in the medical field. Because the blockchain has irreversible time vectors, smart contracts (protocols that do not require third parties to participate in automated execution), and consensus algorithms, it can be well used for the validation and traceability of medical data. And compared with the prior art, the block chain can better ensure the safety of medical data by means of advanced encryption means.
In recent years, researchers have combined blockchain and other technologies to do the validation and traceability of medical data. The technical scheme closest to the application is as follows:
(1) medical data validation based on blockchain. Wanghu Chen et al propose a blockchain-based medical data sharing model that ensures data ownership of patients to own cases. The model provides reliable storage by an IPFS file system, realizes data sharing by Proxy re-encryption and ensures data ownership, and measures contribution in the sharing process by using Token economic system. The data operation records generated in the whole process are packaged in the blockchain operation environment in the form of blockchain transactions. The electronic medical record stored in the IPFS is encrypted by a public key of a patient, the patient can see the encrypted medical record after authorization, data sharing is realized through Proxy re-encryption, and the semi-trusted agent converts the encrypted medical record of the patient into the encrypted medical record of the receiver by using the re-encryption key granted by the patient. However, this solution is only applicable to single role rights and cannot be used for multi-role rights in medical institutions and patients.
(2) Infectious disease tracing based on blockchain. Peng Zhu et al propose a blockchain-based infectious disease information tracking method, and key components include infectious disease information collection, information chain storage and information query. By collecting disease information in time to form a disease information time series blockchain, the constructed disease information chain is truly transparent and can be queried and maintained at any node in the system. This scheme enables disease tracing through the non-tamper-evident nature of the blockchain itself. However, the wide range of medical data is subject to patient privacy, and existing solutions have significant privacy exposure risks. And lack reasonable supervision, the privacy of patients can not be well protected when data is traced.
Disclosure of Invention
The invention aims at overcoming the defects of the prior art and provides a alliance chain medical data right-of-authority tracing method and system based on various signature technologies.
According to a first aspect of the present specification, there is provided a federation chain medical data right tracing method based on a plurality of signature technologies, the method comprising:
(1) The semi-trusted third party initiates and combines the supervision authorities and hospitals to establish a alliance chain, and generates a global key pair for each participant;
(2) The medical data circulation requester performs data preprocessing on the medical data circulation information, encrypts the sensitive part and reorganizes the encrypted sensitive part into new medical data circulation information;
(3) The medical data circulation requester calculates the hash value of the medical data circulation information after the data preprocessing, and a supervision organization performs signature authorization on the hash value by using a fair blind signature method, so that a semi-trusted third party provides support; the medical data circulation requester links the blind signature of the hash value by the supervision agency;
(4) Running an intelligent contract, and obtaining multiple signatures of related doctors and patients by adopting a key aggregation mechanism; the intelligent contract sends the multiple signatures to a verifier, and after verification, the blind signature and the multiple signature of the hash value by the supervision agency are written into the block;
(5) The medical data is transmitted under the chain, the data sender and the data receiver transmit the medical data through a special channel, and the data receiver compares the information on the chain to ensure that the received medical data is correct; and the supervision mechanism is combined with a semi-trusted third party to trace the medical data circulation information.
Further, the semi-trusted third party has access rights and node joining rights of the alliance chain, and assists the supervision organization in tracing the medical data circulation; the semi-trusted third party, the supervision authorities and the hospitals all have at least 1 node to participate in practical Bayesian family fault tolerance consensus.
Further, in step (1), a global key pair is generated for each party by using an asymmetric encryption algorithm to obtain a public keyAnd private key->The method comprises the steps of carrying out a first treatment on the surface of the The encryption process is the remainder of dividing the ciphertext by N to the power E of the plaintext, and the decryption process is the remainder of dividing the ciphertext by N to the power D of the plaintext.
Further, in step (2), the medical data circulation requester divides the medical data circulation information into insensitive public data and sensitive patient privacy data;
for insensitive publicable data, only adopting recursive length prefix coding processing for the data;
for sensitive patient privacy data, firstly performing recursive length prefix coding on the data, then encrypting the data by using an advanced encryption standard symmetric encryption algorithm, and iterating by adopting a password block chaining mode;
and the medical data circulation requester reconstructs the coded public data plaintext and the patient privacy data ciphertext into complete medical data circulation information.
Further, the step (3) specifically comprises:
the medical data circulation requester submits a medical data circulation application to a semi-trusted third party and the medical data circulation information m after data preprocessing has the hash value of the medical data circulation information mTransmitting to a semi-trusted third party;
a semi-trusted third party receives the circulation application, generates a blinding factor k and sendsAnd k is stored in a local database; by regulatory public key and k pairs +.>Performing blinding treatment to obtain->Generate pair->Signature of->Return +.>
Medical data flow requester returns using semi-trusted third party public key pairAuthentication is performed by submitting a signed authorization application to the regulatory agency and by submitting +.>And->Transmitting to a supervision mechanism;
regulatory agency authentication using semi-trusted third party public keyAfter passing authentication, pair ∈>Authorization, generation of regulatory agency pair->Signature of->And communicated to the medical data flow requester; the supervision authorities store +.>And medical data circulation requester identity information;
medical data flow requester uses k pairsBlind removing treatment is carried out, and a supervision organization pair +.>Signature of->Will->Submitted to the federation chain.
Further, the step (4) specifically comprises:
generating key pairs for each signer based on elliptic curvesWherein->Is a public key->Is a private key, there is an equation +.>,/>Is a point on the elliptic curve;
smart contracts use public keys of each signer to calculate intermediate variablesWhereinFor the hash function, the aggregation public key is obtained +.>Where n is the number of signers, broadcast
Smart sum is about each signer to select random numbersObtaining intermediate variable +.>Calculation ofBroadcast->The method comprises the steps of carrying out a first treatment on the surface of the Calculating a hash value for each signer +.>Send->And->Giving the corresponding signer;
each signer receivesAnd->Calculate signature +.>Wherein->Hash value of medical data circulation information m for regulatory authorities +.>Will->Sending to a supervision organization;
the regulatory body receives the transmission of each signerCalculate->S is sent to the intelligent contract;
smart contracts get multiple signaturesAnd send to the verifier;
each node in the federation chain acts as a verifier according to、/>And->Structure ofEquation(s)And verifying if so, proving the multiple signature to be valid, and +.>And->Blocks are written together.
Further, the medical data circulation information tracing specifically includes:
the supervision organization informs semi-trusted third parties to perform data tracing together, and blind signature of the supervision organization is performedThe medical data circulation information m needing to be traced is transmitted to a semi-trusted third party;
the semi-trusted third party receives the data tracing requirement and calculates the hash value of mUse of the public key of the regulatory body to verify whether authorized by the signing of the regulatory body, will +.>Calculating blinding information ++in combination with blinding factor k stored in the local database>And transmitted to a regulatory agency;
regulatory agency use of regulatory agency private key calculation pairsSignature of authorization->By->And querying a local database to obtain the identity information of the signature requester. According to the present specificationIn a second aspect, a federation chain medical data right-of-way tracing system based on multiple signature techniques is provided, the system comprising:
alliance chain framework module: the semi-trusted third party initiates and combines the supervision authorities and hospitals to establish a alliance chain, and generates a global key pair for each participant;
and a data preprocessing module: the medical data circulation requester performs data preprocessing on the medical data circulation information, encrypts the sensitive part and reorganizes the encrypted sensitive part into new medical data circulation information;
fairness blind signature module: the medical data circulation requester calculates the hash value of the medical data circulation information after the data preprocessing, and a supervision organization performs signature authorization on the hash value by using a fair blind signature method, so that a semi-trusted third party provides support; the medical data circulation requester links the blind signature of the hash value by the supervision agency;
multiple signature module: running an intelligent contract, and obtaining multiple signatures of related doctors and patients by adopting a key aggregation mechanism; the intelligent contract sends the multiple signatures to a verifier, and after verification, the blind signature and the multiple signature of the hash value by the supervision agency are written into the block;
and the data right-determining and source-tracing module: the medical data is transmitted under the chain, the data sender and the data receiver transmit the medical data through a special channel, and the data receiver compares the information on the chain to ensure that the received medical data is correct; and the supervision mechanism is combined with a semi-trusted third party to trace the medical data circulation information.
According to a third aspect of the present specification, there is provided a multi-signature technology-based federation chain medical data right tracing device, including a memory and one or more processors, where executable codes are stored in the memory, and when the executable codes are executed by the processors, the multi-signature technology-based federation chain medical data right tracing method is implemented.
According to a fourth aspect of the present specification, there is provided a computer-readable storage medium having stored thereon a program which, when executed by a processor, implements a federated chain medical data rights tracing method based on a plurality of signature techniques as described in the first aspect.
The beneficial effects of the invention are as follows:
1. according to the invention, by introducing the multiple signature technology, the circulation of the medical data needs to obtain multiple signatures of corresponding patients and doctors on the alliance chain, the illegal circulation of the medical data can be reduced, the legal rights enjoyed by the patients and the doctors on the medical data can be clarified, and the circulation use of the medical data is ensured to be supervised and legal. In order to realize the common right of multiple roles, a key aggregation mechanism is utilized, and the signature is obtained while protecting the privacy of a patient, because the specific identity of the original signer cannot be found through an aggregation key in the multiple signatures. Moreover, the invention serves as an intermediate operator through the intelligent contract, so that the signed patients are ensured not to know the identity information of other signers.
2. The invention introduces a fair blind signature technology to enable medical data circulation to be carried out under the supervision of the supervision organization, so that the supervision organization cannot directly check the specific content of medical data circulation information in order to protect the privacy of patients. However, under the condition that the specific medical data circulation information needs to be traced, the supervision mechanism can combine with the semi-trusted third party to trace and trace the specific medical data circulation information on the premise of not invading the privacy of the patient.
3. The invention separates the medical data circulation signature on the chain from the medical data transmission under the chain, can carry out the right-confirming and source-tracing of the medical data while ensuring the safety of the medical data, and greatly reduces the privacy exposure risk.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an exemplary embodiment of a federated chain medical data rights tracing method implementation based on multiple signature techniques;
FIG. 2 is a schematic diagram of a fair blind signature flow diagram shown in an exemplary embodiment;
FIG. 3 is a schematic diagram of a multiple signature flow diagram shown in an exemplary embodiment;
FIG. 4 is a diagram of a federated chain medical data rights traceability system based on a variety of signature techniques, as illustrated in an exemplary embodiment;
fig. 5 is a block diagram of a federated chain medical data rights traceability device based on multiple signature techniques, as shown in an exemplary embodiment.
Detailed Description
For a better understanding of the technical solutions of the present application, embodiments of the present application are described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, of the embodiments of the present application. All other embodiments, based on the embodiments herein, which would be apparent to one of ordinary skill in the art without making any inventive effort, are intended to be within the scope of the present application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The invention provides a alliance chain medical data right-confirming and tracing method based on multiple signature technologies, which comprises the steps of establishing an alliance chain, data preprocessing, fair blind signature, multiple signature, data right-confirming and tracing and the like, as shown in fig. 1, and the specific implementation flow of each part is described in detail below.
1. Establishing a federation chain
Unlike conventional centralized databases, the data on the blockchain is distributed across multiple computer nodes, each of which holds the complete data on the chain. The present invention utilizes blockchain technology, and in particular, a semi-trusted third party initiates and unites regulatory authorities and hospitals to build a coalition chain. The semi-trusted third party has access rights and node joining rights of the alliance chain, and can assist the supervision organization in tracing the medical data circulation. The semi-trusted third party, the supervision authorities and all hospitals all have at least 1 node to participate in the PBFT (Practical Byzantine Fault Tolerance, practical Bayesian and busy-family fault tolerance) consensus, and the PBFT algorithm provides certain fault tolerance for the alliance chain on the premise of ensuring availability and safety. Assuming that the federation chain has f nodes in total, the system can still operate normally when there are fewer (f-1)/3 dead/failed nodes (dead nodes may not respond or respond to wrong information).
After the alliance chain is established, an RSA asymmetric encryption algorithm is used for generating a global key pair for each participant to obtain a public keyAnd private key->
The encryption process is that the ciphertext is the remainder of the E power of the plaintext divided by N, namely:
when decryption is needed, the private key is used for decryption, wherein the decryption process is the remainder of dividing the D secondary side of the plaintext by N, namely:
wherein the public key and the private key of the supervision organization are respectively recorded asAnd->The method comprises the steps of carrying out a first treatment on the surface of the The public and private keys of the semi-trusted third party are respectively marked as +.>And->
2. Data preprocessing
Because medical data contains patient privacy, encryption pre-processing must be performed before the data is uploaded. The medical data circulation requester needs to divide medical data circulation information into two parts according to whether patient privacy is related or not, wherein the first part is insensitive public information, the second part is sensitive patient privacy information, and different preprocessing methods are adopted, specifically:
(1) No additional encryption is required for the insensitive public information. The client only applies RLP (Recursive Length Prefix), recursive length prefix) encoding processing to the data.
(2) For sensitive patient privacy information, further information encryption is required. The client may first RLP encode the data and then encrypt the information using the AES (Advanced Encryption Standard ) symmetric encryption algorithm. The AES algorithm belongs to block ciphers, only one block of data with fixed length can be encrypted, but plaintext to be encrypted has different lengths, iteration is needed, a CBC (Cipher Block Chaining ) mode is adopted here, different ciphertexts after the same plaintext is encrypted are guaranteed, and the possibility of privacy leakage of patients is further reduced. Those means of attacking the DES (Data Encryption Standard ) algorithm have no effect on the AES algorithm itself, and no effective attack on the AES algorithm has occurred so far, so encrypting data with the AES algorithm sufficiently ensures the security of patient privacy information.
The medical data circulation requester reassembles the encoded public data plaintext and the patient privacy data ciphertext into complete medical data circulation information m through the client.
3. Fair blind signature
The medical data circulation requester obtains the medical data circulation information m after the data preprocessing, and then calculates the hash value of m. In this embodiment, the Hash function SHA256 is used, and the SHA256 generates a Hash value of 256 bits for any message or data.
Using a fair blind signature method for a regulatory agency to hash valuesSignature authorization is performed, as shown in fig. 2, specifically:
(1) The medical data circulation requester submits a medical data circulation application to a semi-trusted third party and hashes the valueTo a semi-trusted third party.
(2) A semi-trusted third party receives a circulation application of a medical data circulation requester and generates a blinding factorAnd hash value +.>And blinding factor->Stored in a local database. By regulatory agency public keysAnd blinding factor->Hash value +.>Performing blinding treatment to obtain->Then generate pair->Signature of->Return +.>
(3) Medical data flow requester uses semi-trusted third party public keyFor returned signaturesAuthentication is performed, and when the following equation is established, the correctness of the signature information is confirmed:
the medical data flow requester then submits a signed authorization application to the regulatory agency and blinds the applicationSignature of semi-trusted third party->And transmitted to a supervision organization.
(4) The regulatory agency uses a semi-trusted third party public keyAuthenticating a signature of a semi-trusted third partyConfirming that the signature information is correct when the following formula holds:
authentication is passed and then pairAuthorization, generation of signature of regulatory body +.>And will sign->To the medical data flow requester.
The regulatory agency maintains signatures in a local databaseAnd medical data flow requester identity information.
(5) Medical data flow requester use blinding factorsSignature->Blind removing treatment is carried out, and supervision authority signature +.>Back->
(6) Signing regulatory agency by medical data circulation requester through clientBack->Packaging, calling the relevant API (Application Programming Interface ) and submitting it to the federation chain node to wait for verification. Medical data flow information is stored on the block after verification and consensus is achieved.
Through the fair blind signature scheme, the supervision authorities cannot know the specific content of the signature during signature authorization, and cannot check the circulation information of each piece of medical data at will, so that the safety of the circulation information of the medical data is ensured.
4. Multiple signatures
When a medical data circulation requester needs to circulate specific medical data, preprocessing the data and blindly signing the dataUploading to the federation chain node. Then, the intelligent contract acts as an intermediate operator to obtain multiple signatures of related doctors and patients, so that subsequent medical data circulation can be performed.
Intelligent contracts are a special protocol that is used when making contracts within a blockchain, including code functions. The multiple signature method used here is SSMS (Simple Schnorr Multi-Signatures), uses key aggregation to hide the public key of a single signer, and has due security, which has the same key and signature size as the standard Schnorr signature, facilitating the uplink storage. The method can protect the privacy of the patient because the identity information of the signed doctor and patient cannot be found out through the aggregation key in the multiple signatures. In addition, the invention serves as an intermediate operator through the intelligent contract, so that the signed doctor and the patient are not aware of the information of other signers. As shown in fig. 3, specifically:
(1) Generating key pairs for each signer based on elliptic curvesWherein->Is a private key, and the public key corresponding to the private key is +.>There is equation +.>,/>Is a point on the elliptic curve.
(2) Smart contracts use public keys of each signer to calculate intermediate variablesObtaining an aggregation public key->Wherein n is the number of signers, broadcasting an aggregation public key +.>
(3) Intelligent closing selects a random number for each signerObtain the corresponding intermediate variable +.>Calculate->Broadcast->. Then a hash value is calculated for each signer
Send random number +.>And hash value->To the corresponding signer.
(4) Each signer receives random numbers sent by intelligent contractsAnd hash value->At the same time know the aggregation public key +.>And->Then calculate the signature of each signer +.>Will->Send to signature statistics—regulatory authorities.
(5) The regulatory body receives the transmission of each signerThen calculate +.>Sending it to the smart contract, which gets the final multiple signature ++>And sent to the verifier.
(6) Each node in the federation chain acts as a verifier, based on the signed informationMultiple signaturesAnd an aggregation public key->Construct equation->And verifying if so, proving the multiple signature to be valid, and +.>And->Blocks are written together.
5. Data right-determining traceability
To ensure data security, the medical data is stored separately in a local database in each hospital. Multiple signatures are completed at the patient and the physician,and->After being written into the ledger, the transmission of medical data will take place under the chain. That is, after the related patient and doctor confirm the approval of the medical data circulation and sign, the circulation of the medical data is performed, which can better confirm that the patient as the main body of the medical data has the information discretion and participation right, and must obtain the informed consent of the patient when the medical data circulation is performed, and also confirm that the medical institution has the control right and the use right for the medical data processed by the medical institution, thereby realizing multi-role confirmation. The data sender sends the medical data circulation information m and desensitized medical data to the data receiver through a special transmission channel point-to-point sending file, and the data receiver calculates a hash value after obtaining the required medical data>And the corresponding information on the chain->
And (3) comparing, and verifying the correctness of the digital signature, namely, the establishment of the following formula, so as to ensure that correct medical data are received.
When medical data is required to trace the source, the supervision mechanism can combine a semi-trusted third party to trace the source of medical data circulation information, and the specific steps are as follows:
(1) The supervision organization informs semi-trusted third parties to perform data tracing together, and blind signature of the supervision organization is performedAnd the medical data circulation information m needing to be traced is transmitted to a semi-trusted third party.
(2) The semi-trusted third party receives the data tracing requirement and calculates the hash valueUsing regulatory body public keysVerifying whether the information is signed and authorized by the regulatory body, namely whether the following formula holds:
will beCalculating blinding information ++in combination with blinding factor k stored in the local database>
The information is then blindedAnd transmitted to a supervision organization.
(3) The regulatory agency uses the regulatory agency private keyAnd blinding information->Calculating signature authorizing blinded information +.>:/>
(4) The supervision organization signs by means of the signatureAnd inquiring the local database to obtain the identity information of the signature requester, namely tracing the original medical data circulation information uploading person, and performing corresponding supervision operation on the medical data circulation information uploading person.
The invention also provides a alliance chain medical data right-confirming and source-tracing system based on various signature technologies, which is shown in fig. 4 and mainly comprises the following five modules: the system comprises a alliance chain framework module, a data preprocessing module, a fair blind signature module, a multiple signature module and a data right-determining and source-tracing module. Specifically:
alliance chain framework module: providing a bottom layer support for the whole system, providing a trusted guarantee for the whole design, and providing a non-tamperable record for the on-chain data; based on the blockchain technology, a semi-trusted third party initiates and combines a supervision organization and each hospital to establish a alliance chain, and generates a global key pair for each participant;
and a data preprocessing module: the medical data circulation requester performs data preprocessing on the medical data circulation information, encrypts the sensitive part and reorganizes the encrypted sensitive part into new medical data circulation information;
fairness blind signature module: the medical data circulation requester calculates the hash value of the medical data circulation information after the data preprocessing, and a supervision organization performs signature authorization on the hash value by using a fair blind signature method, so that a semi-trusted third party provides support; the medical data circulation requester links the blind signature of the hash value by the supervision agency;
multiple signature module: running an intelligent contract, and obtaining multiple signatures of related doctors and patients by adopting a key aggregation mechanism; the intelligent contract sends the multiple signatures to a verifier, and after verification, the blind signature and the multiple signature of the hash value by the supervision agency are written into the block;
and the data right-determining and source-tracing module: the medical data is transmitted under the chain, the data sender and the data receiver transmit the medical data through a special channel, and the data receiver compares the information on the chain to ensure that the received medical data is correct; and the supervision mechanism is combined with a semi-trusted third party to trace the medical data circulation information.
All relevant contents of each step related to the above method embodiment may be cited to the functional descriptions of the corresponding functional modules, which are not described herein.
Corresponding to the embodiment of the alliance chain medical data right-confirming and tracing method based on the multiple signature technologies, the invention also provides an embodiment of alliance chain medical data right-confirming and tracing equipment based on the multiple signature technologies.
Referring to fig. 5, the alliance chain medical data right tracing device based on multiple signature technologies provided by the embodiment of the invention includes a memory and one or more processors, wherein executable codes are stored in the memory, and when the processor executes the executable codes, the processor is used for implementing the alliance chain medical data right tracing method based on multiple signature technologies in the embodiment.
The embodiment of the alliance chain medical data right-confirming and tracing device based on the multiple signature technologies can be applied to any device with data processing capability, and the any device with data processing capability can be a device or a device such as a computer. The device embodiments may be implemented by software, or may be implemented by hardware or a combination of hardware and software. Taking software implementation as an example, the device in a logic sense is formed by reading corresponding computer program instructions in a nonvolatile memory into a memory through a processor of any device with data processing capability. From the hardware level, as shown in fig. 5, a hardware structure diagram of an arbitrary device with data processing capability where a alliance chain medical data authorization tracing device based on multiple signature technologies is provided in the present invention is shown in fig. 5, except for a processor, a memory, a network interface, and a nonvolatile memory shown in fig. 5, the arbitrary device with data processing capability where the device is located in the embodiment generally includes other hardware according to the actual function of the arbitrary device with data processing capability, which is not described herein again.
The implementation process of the functions and roles of each unit in the above-mentioned device is specifically detailed in the implementation process of the corresponding steps in the above-mentioned method, and will not be described herein again.
For the device embodiments, reference is made to the description of the method embodiments for the relevant points, since they essentially correspond to the method embodiments. The above described embodiments of the apparatus are only illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purposes of the present invention. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The embodiment of the invention also provides a computer readable storage medium, and a program is stored on the computer readable storage medium, and when the program is executed by a processor, the alliance chain medical data right-determining and tracing method based on the multiple signature technologies in the embodiment is realized.
The computer readable storage medium may be an internal storage unit, such as a hard disk or a memory, of any of the data processing enabled devices described in any of the previous embodiments. The computer readable storage medium may be any external storage device that has data processing capability, such as a plug-in hard disk, a Smart Media Card (SMC), an SD Card, a Flash memory Card (Flash Card), or the like, which are provided on the device. Further, the computer readable storage medium may include both internal storage units and external storage devices of any data processing device. The computer readable storage medium is used for storing the computer program and other programs and data required by the arbitrary data processing apparatus, and may also be used for temporarily storing data that has been output or is to be output.
The above-described embodiments are intended to illustrate the present invention, not to limit it, and any modifications and variations made thereto are within the spirit of the invention and the scope of the appended claims.

Claims (10)

1. A alliance chain medical data right-confirming and tracing method based on a plurality of signature technologies is characterized by comprising the following steps:
(1) The semi-trusted third party initiates and combines the supervision authorities and hospitals to establish a alliance chain, and generates a global key pair for each participant;
(2) The medical data circulation requester performs data preprocessing on the medical data circulation information, encrypts the sensitive part and reorganizes the encrypted sensitive part into new medical data circulation information;
(3) The medical data circulation requester calculates the hash value of the medical data circulation information after the data preprocessing, and a supervision organization performs signature authorization on the hash value by using a fair blind signature method, so that a semi-trusted third party provides support; the medical data circulation requester links the blind signature of the hash value by the supervision agency;
(4) Running an intelligent contract, and obtaining multiple signatures of related doctors and patients by adopting a key aggregation mechanism; the intelligent contract sends the multiple signatures to a verifier, and after verification, the blind signature and the multiple signature of the hash value by the supervision agency are written into the block;
(5) The medical data is transmitted under the chain, the data sender and the data receiver transmit the medical data through a special channel, and the data receiver compares the information on the chain to ensure that the received medical data is correct; and the supervision mechanism is combined with a semi-trusted third party to trace the medical data circulation information.
2. The multi-signature technology-based alliance chain medical data right tracing method according to claim 1, wherein the semi-trusted third party has access rights and node joining rights of an alliance chain and assists a supervision organization in tracing medical data circulation; the semi-trusted third party, the supervision authorities and the hospitals all have at least 1 node to participate in practical Bayesian family fault tolerance consensus.
3. The alliance chain medical data right tracing method based on multiple signature technologies as claimed in claim 1, wherein in step (1), a global key pair is generated for each participant by using an asymmetric encryption algorithm to obtain a public keyAnd private key->The method comprises the steps of carrying out a first treatment on the surface of the The encryption process is the remainder of dividing the ciphertext by N to the power E of the plaintext, and the decryption process is the remainder of dividing the ciphertext by N to the power D of the plaintext.
4. The multi-signature technology-based alliance chain medical data right tracing method according to claim 1, wherein in the step (2), a medical data circulation requester divides medical data circulation information into insensitive public data and sensitive patient privacy data;
for insensitive publicable data, only adopting recursive length prefix coding processing for the data;
for sensitive patient privacy data, firstly performing recursive length prefix coding on the data, then encrypting the data by using an advanced encryption standard symmetric encryption algorithm, and iterating by adopting a password block chaining mode;
and the medical data circulation requester reconstructs the coded public data plaintext and the patient privacy data ciphertext into complete medical data circulation information.
5. The alliance chain medical data right-of-authority tracing method based on multiple signature technologies according to claim 1, wherein the step (3) is specifically:
the medical data circulation requester submits a medical data circulation application to a semi-trusted third party and the medical data circulation information m after data preprocessing has the hash value of the medical data circulation information mTransmitting to a semi-trusted third party;
a semi-trusted third party receives the circulation application, generates a blinding factor k and sendsAnd k is stored in a local database; by regulatory public key and k pairs +.>Performing blinding treatment to obtain->Generate pair->Signature of->Return +.>
Medical data flow requester returns using semi-trusted third party public key pairAuthentication is performed by submitting a signed authorization application to the regulatory agency and by submitting +.>And->Transmitting to a supervision mechanism;
regulatory agency using semi-trusted third party public key validationSyndrome/pattern ofAfter passing authentication, pair ∈>Authorization, generation of regulatory agency pair->Signature of->And communicated to the medical data flow requester; the supervision authorities store +.>And medical data circulation requester identity information;
medical data flow requester uses k pairsBlind removing treatment is carried out, and a supervision organization pair +.>Is signed by (a)Will->Submitted to the federation chain.
6. The alliance chain medical data right tracing method based on multiple signature technologies as claimed in claim 1, wherein the step (4) is specifically:
generating key pairs for each signer based on elliptic curvesWherein->Is a public key->Is a private key, there is an equation,/>Is a point on the elliptic curve;
smart contracts use public keys of each signer to calculate intermediate variablesWherein->For the hash function, the aggregation public key is obtained +.>Wherein n is the number of signers, broadcast +.>
Smart sum is about each signer to select random numbersObtaining intermediate variable +.>Calculate->Broadcast->The method comprises the steps of carrying out a first treatment on the surface of the Calculating a hash value for each signer +.>Send->And->Giving the corresponding signer;
each signer receivesAnd->Calculate signature +.>WhereinHash value of medical data circulation information m for regulatory authorities +.>Will->Sending to a supervision organization;
the regulatory body receives the transmission of each signerCalculate->S is sent to the intelligent contract;
smart contracts get multiple signaturesAnd send to the verifier;
each node in the federation chain acts as a verifier according to、/>And->Constructing equationsAnd verifying if so, proving the multiple signature to be valid, and +.>And->Blocks are written together.
7. The alliance chain medical data right tracing method based on multiple signature technologies according to claim 1, wherein the medical data circulation information tracing is specifically:
the supervision organization informs semi-trusted third parties to perform data tracing together, and blind signature of the supervision organization is performedThe medical data circulation information m needing to be traced is transmitted to a semi-trusted third party;
the semi-trusted third party receives the data tracing requirement and calculates the hash value of mUse of the public key of the regulatory body to verify whether authorized by the signing of the regulatory body, will +.>Calculating blinding information ++in combination with blinding factor k stored in the local database>And transmitted to a regulatory agency;
regulatory agency use of regulatory agency private key calculation pairsSignature of authorization->By->And querying a local database to obtain the identity information of the signature requester.
8. A alliance chain medical data right-confirming and source-tracing system based on a plurality of signature technologies is characterized by comprising:
alliance chain framework module: the semi-trusted third party initiates and combines the supervision authorities and hospitals to establish a alliance chain, and generates a global key pair for each participant;
and a data preprocessing module: the medical data circulation requester performs data preprocessing on the medical data circulation information, encrypts the sensitive part and reorganizes the encrypted sensitive part into new medical data circulation information;
fairness blind signature module: the medical data circulation requester calculates the hash value of the medical data circulation information after the data preprocessing, and a supervision organization performs signature authorization on the hash value by using a fair blind signature method, so that a semi-trusted third party provides support; the medical data circulation requester links the blind signature of the hash value by the supervision agency;
multiple signature module: running an intelligent contract, and obtaining multiple signatures of related doctors and patients by adopting a key aggregation mechanism; the intelligent contract sends the multiple signatures to a verifier, and after verification, the blind signature and the multiple signature of the hash value by the supervision agency are written into the block;
and the data right-determining and source-tracing module: the medical data is transmitted under the chain, the data sender and the data receiver transmit the medical data through a special channel, and the data receiver compares the information on the chain to ensure that the received medical data is correct; and the supervision mechanism is combined with a semi-trusted third party to trace the medical data circulation information.
9. The alliance chain medical data right-tracing equipment based on the multiple signature technologies comprises a memory and one or more processors, wherein executable codes are stored in the memory, and the alliance chain medical data right-tracing method based on the multiple signature technologies as claimed in any one of claims 1-7 is realized when the executable codes are executed by the processors.
10. A computer-readable storage medium having a program stored thereon, wherein the program, when executed by a processor, implements the multi-signature technology-based federation chain medical data authority tracing method of any one of claims 1 to 7.
CN202410067638.0A 2024-01-17 2024-01-17 Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies Active CN117574440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410067638.0A CN117574440B (en) 2024-01-17 2024-01-17 Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410067638.0A CN117574440B (en) 2024-01-17 2024-01-17 Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies

Publications (2)

Publication Number Publication Date
CN117574440A true CN117574440A (en) 2024-02-20
CN117574440B CN117574440B (en) 2024-04-30

Family

ID=89888592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410067638.0A Active CN117574440B (en) 2024-01-17 2024-01-17 Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies

Country Status (1)

Country Link
CN (1) CN117574440B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948367A (en) * 2019-03-27 2019-06-28 南京星链高科技发展有限公司 A kind of medical data authorization method based on block chain technology
CN111698322A (en) * 2020-06-11 2020-09-22 福州数据技术研究院有限公司 Medical data safety sharing method based on block chain and federal learning
CN115765965A (en) * 2022-11-04 2023-03-07 常州云科宸智能技术有限公司 Medical data safety sharing method based on federal learning and double union block chains
CN115883214A (en) * 2022-12-01 2023-03-31 南京理工大学 Electronic medical data sharing system and method based on alliance chain and CP-ABE
CN116226880A (en) * 2023-02-03 2023-06-06 山东润一智能科技有限公司 Block chain ciphertext retrieval security traceability system based on searchable encryption
WO2023115850A1 (en) * 2021-12-23 2023-06-29 中电科大数据研究院有限公司 Consortium blockchain consensus identity authentication method
CN116453644A (en) * 2023-03-30 2023-07-18 暨南大学 Medicine traceability supervision method and system based on blockchain
CN116566660A (en) * 2023-04-21 2023-08-08 石家庄铁道大学 Identity authentication method based on medical block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948367A (en) * 2019-03-27 2019-06-28 南京星链高科技发展有限公司 A kind of medical data authorization method based on block chain technology
CN111698322A (en) * 2020-06-11 2020-09-22 福州数据技术研究院有限公司 Medical data safety sharing method based on block chain and federal learning
WO2023115850A1 (en) * 2021-12-23 2023-06-29 中电科大数据研究院有限公司 Consortium blockchain consensus identity authentication method
CN115765965A (en) * 2022-11-04 2023-03-07 常州云科宸智能技术有限公司 Medical data safety sharing method based on federal learning and double union block chains
CN115883214A (en) * 2022-12-01 2023-03-31 南京理工大学 Electronic medical data sharing system and method based on alliance chain and CP-ABE
CN116226880A (en) * 2023-02-03 2023-06-06 山东润一智能科技有限公司 Block chain ciphertext retrieval security traceability system based on searchable encryption
CN116453644A (en) * 2023-03-30 2023-07-18 暨南大学 Medicine traceability supervision method and system based on blockchain
CN116566660A (en) * 2023-04-21 2023-08-08 石家庄铁道大学 Identity authentication method based on medical block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HAN LIU ET AL: "IdenMultiSig Identity-Based Decentralized Multi-Signature in Internet of Things", 《IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS》, 31 August 2023 (2023-08-31), pages 1 - 11 *
杨雨婷: "基于区块链的医疗数据溯源系统分析与设计", 《中国优秀硕士学位论文全文数据库(电子期刊)》, vol. 2023, no. 01, 15 January 2023 (2023-01-15) *

Also Published As

Publication number Publication date
CN117574440B (en) 2024-04-30

Similar Documents

Publication Publication Date Title
Garg et al. BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment
EP3451578B1 (en) Turn-control rewritable blockchain
Wang et al. Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain
Wu et al. Security and privacy of patient information in medical systems based on blockchain technology
CN111863165B (en) Medical information sharing authentication method based on block chain
Soni et al. Blockchain Implementation for Privacy preserving and securing the Healthcare data
Ogundoyin et al. PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities
Chandrakar et al. Cloud-based authenticated protocol for healthcare monitoring system
John et al. Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation
CN113764060B (en) Medical data management system based on double-block chain and patient authorized medical record sharing method
US20200036529A1 (en) Authentication protocol using a one-time password
Chen et al. Esb-fl: Efficient and secure blockchain-based federated learning with fair payment
Ali et al. Anonymous aggregate fine-grained cloud data verification system for smart health
Srivastava et al. Attack resistant blockchain-based healthcare record system using modified RSA Algorithm
CN117574440B (en) Alliance chain medical data right-determining and source-tracing method and system based on multiple signature technologies
CN116318901A (en) Privacy and verifiable internet of things data aggregation method integrating blockchain
Hussein Cloud-Based Efficient and Secure Scheme for Medical Images Storage and Sharing using ECC and SHA-3
Xu et al. A decentralized pseudonym scheme for cloud-based eHealth systems
Avula Gopalakrishna et al. An efficient lightweight encryption model with re‐encryption scheme to create robust blockchain architecture for COVID‐19 data
Sonya et al. An effective blockchain‐based smart contract system for securing electronic medical data in smart healthcare application
CN114285636A (en) Alliance chain-based shared medical data proxy re-encryption system and method
Ibrahim et al. A secure framework for medical information exchange (MI-X) between healthcare providers
Kumar et al. An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage
Ibrahim New secure solutions for privacy and access control in health information exchange
Sadhu et al. MC-Multi PUF based lightweight authentication framework for internet of medical things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant