who can self-checking if doctor honest or not, namely
Equation (23)
Va
?
≡ywa·xb
c(mod p1),(23)
we rewrite Equation (22) and (23), get
Va
?
≡ywa·xc
b
?
≡ywa·xb
c(mod p1).(24)
Till now, it means “the system center and doctor verif ed
each other”.
Lemma 3. If doctor and Health Bureau are both interac-
tion honestly, the Equation (16) and (17) holds, the doctor
and health bureau can verify each other.
Proof. As known the health bureau received Uafrom
doctor, the health bureau honestly use his private key xd
to calculate Ap0with Apaby Equation (18) and (19),
and then returned Apato doctor, the doctor recoveries the
message through Equation (19). If doctor want to decode
m′, he should calculate Equation (25)
m′≡Apa·V−1
a·y−xc
d(mod p1).(25)
Since doctor obtained Vaby system center, and get the
Apafrom health bureau. We rewrite the Equation (25)
into
m′?
≡Apa·V−1
a·y−xd
c(mod p1)
≡yWa·xb
c·yxd
c·m′·V−1
a·y−xc
d(mod p1)
≡m′(mod p1).(26)
4.2. Analysis of practical safety levels
Analysis security of practical levels
Doubts about cracking RSA and ElGamal cryptosys-
tems: If the attacker intends to disguise the identity of
the patient, the attacker must have the patient’s key da to
be able to calculate the corresponding pairing public key
ea. In addition to being unable to disguise the patient,
the attacker cannot disguise the system center, unless
the attacker can crack the RSA cryptosystem. Obviously
cracking the RSA cryptosystem is not realistic at the
moment [34].
Key Compromise Impersonation attacks: The patient,
system center, doctor and Health Bureau keep their own
keys. Although their public keys are published, the hackers
can not calculate the corresponding key through known
public parameters. The discrete logarithm problem of the
Def nition 1 is def ned and fully described. This study
does not consider this assumption unless any party who
owns the key divulges the key.
5. Conclusion
This research is mainly about the four-party supervi-
sion and management plan of patients, hospitals, doctors,
and the National Health Bureau. The improved ElGamal
and RSA algorithm are used in the application of the
COVID-19 monitoring system. This information system
is anonymous and the identity of any patient is strictly
controlled. Keep it secret. If the hospital (system) is
invaded, hackers cannot obtain patient health record or
content through the hospital. If the hacker colludes with
any of the regulatory agencies to deceive, he still does not
have to worry about identity exposure. If the patient has
breached the contract, the doctor and the system center can
track the anonymous identity under certain conditions, and
f nally restore the anonymous identity to the real-name
user identity. In this way, the patient’s security can be
protected. The identity is protected from exposure, and
on the other hand, it can deter patient from maliciously
defaulting on transactions. This program has the best of
both sides. This research plan puts forward 3lemmas,
3def nitions and 26 equations to run through the full
text, provide a strong theoretical support for the thesis,
and f nally put this idea into reality. This idea shows a
patient-hospital monitoring system with anonymity, non-
modif cation, security, and double-blind mechanism to
achieve a combination of theory and practice.
Acknowledgments
The authors would like to thank the anonymous re-
viewers for their useful comments.
References
[1] T. ElGAMAL, “A public key cryptosystem and a signature scheme
based on discrete logarithms,” IEEE Transactions on Information
Theory, vol. 31, no. 4, pp. 469–472, 1985.
[2] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining
digital signatures and public-key cryptosystems,” Communications
of the ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
[3] C.-M. F. Chiang, “Medical research and personal-data protection–
take Japanese epidemiology research as the basis,” Technology Law
Review, vol. 10, no. 1, pp. 61–113, 2013.
[4] D. Bouslimi and G. Coatrieux, “A crypto-watermarking system for
ensuring reliability control and traceability of medical images,”
Signal Processing: Image Communication, vol. 47, pp. 160–169,
September 2016.
[5] M. K. Abdmouleh, A. Khalfallah, and M. S. Bouhlel, “A novel se-
lective encryption scheme for medical images transmission based-
on JPEG compression algorithm,” Procedia Computer Science,
vol. 112, pp. 369–376, 2017.
[6] A. Anand and A. K. Singh, “An improved DWT-SVD domain
watermarking for medical information security,” Computer Com-
munications, vol. 152, pp. 72–80, February 2020.
[7] N. Zermi, A. Khaldi, K. Redouane, K. Fares, and E. Salah, “A
DWT-SVD based robust digital watermarking for medical image
security,” Forensic Science International, vol. 320, p. 110691,
2021.
[8] K. Fares, A. Khaldi, K. Redouane, and E. Salah, “DCT and DWT
based watermarking scheme for medical information security,”
Biomedical Signal Processing and Control, vol. 66, p. 102403,
2021.
[9] C.-M. Chen, H.-W. Jyan, S.-C. Chien, H.-H. Jen, C.-Y. Hsu, P.-C.
Lee, C.-F. Lee, Y.-T. Yang, M.-Y. Chen, L.-S. Chen, H.-H. Chen,
and C.-C. Chan, “Containing COVID-19 among 627,386 persons
in contact with the diamond princess cruise ship passengers who
disembarked in Taiwan: Big data analytics,” Journal of Medical
Internet Research, vol. 22, no. 5, p. e19540, May 2020.
[10] S. Park, G. J. Choi, and H. Ko, “Information technology-based
tracing strategy in response to COVID-19 in South Korea-privacy
controversies,” JAMA, vol. 323, no. 21, pp. 2129–2130, June 2020.
[11] C. Liu, J. Fang, S. C.-I. Chen, and D. Gardne, “Study of anonymous
complaint system based on patient-doctor and hospital tripartite
scheme,” Basic and Clinical Pharmacology and Toxicology, vol.
126, no. S5, pp. 11–12, April 2020.
WSEAS TRANSACTIONS on MATHEMATICS
DOI: 10.37394/23206.2022.21.74
Chenglian Liu, Sonia C-I Chen