A Proposal of Key Recovery Mechanism for Personal Decryptographic Keys

Author(s):  
Wenzhe Sun ◽  
Michiko Harayama
2021 ◽  
pp. 96-100
Author(s):  
Shibin David ◽  
◽  
◽  
◽  
K. Martin Sagayam ◽  
...  

The main goal of HIPAA (Health Insurance Portability and Accountability Act) is to protect health information of individuals against access without consent or authorization. Security and privacy are the main issues in HIPAA. A compliant key management solution is used to reduce harm and risk while providing cryptographic mechanisms. Using ECC (Elliptic Curve Cryptography) we ensure more security for access of patient’s health records. This provides same level of security for access of patient’s health records. Patient’s health Information is stored in RFID cards. Finally, the proposed method ensures higher level of security than other existing cryptographic techniques. ECC provides more security even with small key sizes. Proposed scheme describes the various counter measures for improving security and a key recovery mechanism for the protection of keys.


2004 ◽  
Vol 12 (5) ◽  
pp. 711-736 ◽  
Author(s):  
Taenam Cho ◽  
Sang-Ho Lee ◽  
Won Kim

2021 ◽  
pp. 42-52
Author(s):  
Ahmed A. Elngar ◽  
◽  
◽  
◽  
K. Martin Sagayam ◽  
...  

Security plays a major role in most of the fields including pharmaceutical field. Authorization and Authentication are the key concepts in supporting notable areas of the cyber-health world. HIPAA's (Health Insurance Portability and Accountability Act) ultimate focus is to preserve the privacy of the health records of an individual without disclosing it and preventing the data from unauthorized access. A complaint key management solution is applied over the patient's health records to reduce the risk factor while engaging with cryptographic mechanisms. Though there are many existing cryptographic algorithms such as Elliptic curve cryptography, Elgammal's key exchange algorithm which provides security to the access of patient's health records, the proposed key management solution will overlay the same variant of security to the Electronic Health Records (EHR). This paper provides the countermeasures for improving security and suggests a key recovery mechanism for the protection of keys used in the security mechanism.


2021 ◽  
Vol 190 ◽  
pp. 104511
Author(s):  
Obert C. Chikwanha ◽  
Sandra Mupfiga ◽  
Bosede R. Olagbegi ◽  
Chenaimoyo L.F. Katiyatiya ◽  
Annelin H. Molotsi ◽  
...  

Materialia ◽  
2021 ◽  
pp. 101058
Author(s):  
Chunyang Wen ◽  
Libin Sun ◽  
Wenhua Zhang ◽  
Wenbo Liu ◽  
Jeffrey Terry ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3474
Author(s):  
Taehoon Kim ◽  
Wonbin Kim ◽  
Daehee Seo ◽  
Imyeong Lee

Recently, as Internet of Things systems have been introduced to facilitate diagnosis and treatment in healthcare and medical environments, there are many issues concerning threats to these systems’ security. For instance, if a key used for encryption is lost or corrupted, then ciphertexts produced with this key cannot be decrypted any more. Hence, this paper presents two schemes for key recovery systems that can recover the lost or the corrupted keys of an Internet of Medical Things. In our proposal, when the key used for the ciphertext is needed, this key is obtained from a Key Recovery Field present in the cyphertext. Thus, the recovered key will allow decrypting the ciphertext. However, there are threats to this proposal, including the case of the Key Recovery Field being forged or altered by a malicious user and the possibility of collusion among participating entities (Medical Institution, Key Recovery Auditor, and Key Recovery Center) which can interpret the Key Recovery Field and abuse their authority to gain access to the data. To prevent these threats, two schemes are proposed. The first one enhances the security of a multi-agent key recovery system by providing the Key Recovery Field with efficient integrity and non-repudiation functions, and the second one provides a proxy re-encryption function resistant to collusion attacks against the key recovery system.


1998 ◽  
Vol 4 (4) ◽  
pp. 291-298 ◽  
Author(s):  
Sayori Nakagawa ◽  
Naohiro Ishii ◽  
Satoshi Fukumoto

Sign in / Sign up

Export Citation Format

Share Document