Table of Contents Author Guidelines Submit a Manuscript
Computational and Mathematical Methods in Medicine
Volume 2014, Article ID 214841, 9 pages
http://dx.doi.org/10.1155/2014/214841
Research Article

Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2Brain Image Processing, Columbia University, New York, NY 10032, USA

Received 10 April 2014; Accepted 23 June 2014; Published 14 July 2014

Academic Editor: David A. Elizondo

Copyright © 2014 Yi Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Wan, S. Ullah, C. Lai et al., “Cloud-enab led wireless body area networks for pervasive healthcare,” IEEE Network, vol. 27, no. 5, pp. 56–61, 2013. View at Google Scholar
  2. C. Doukas, T. Pliakas, and I. Maglogiannis, “Mobile healthcare information management utilizing Cloud Computing and Android OS,” in Proceedings of the 32nd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC '10), pp. 1037–1040, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Yuan and S. Yu, “Efficient privacy-preserving biometric identification in cloud computing,” in Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM '13), pp. 2652–2660, 2013.
  4. J. Liu, Q. Wang, J. Wan, J. Xiong, and B. Zeng, “Towards key issues of disaster aid based on wireless body area networks,” KSII Transactions on Internet and Information Systems, vol. 7, no. 5, pp. 1014–1035, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Al Ameen, J. Liu, and K. Kwak, “Security and privacy issues in wireless sensor networks for healthcare applications,” Journal of Medical Systems, vol. 36, no. 1, pp. 93–101, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. P. M. Schwartzand and J. R. Reidenberg, Data Privacy Law: A Study of United States Data Protection, LEXIS Law, Dayton, Ohio, USA, 1996.
  7. H. Nissenbaum, Privacy in Context: Technology, Policy, and the Integrity of Social Life, Stanford University, Stanford, Calif, USA, 2010.
  8. C. Gentry, A fully homomorphic encryption scheme [doctoral dissertation], Stanford University.
  9. Z. Brakerski and V. Vaikuntanathan, “Efficient fully homomorphic encryption from (standard) LWE,” in Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS '11), pp. 97–106, Palm Springs, Calif, USA, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. A. López-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption,” in Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC '12), pp. 1219–1234, ACM, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Bringer, H. Chabanne, and A. Patey, “Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends,” IEEE Signal Processing Magazine, vol. 30, no. 2, pp. 42–52, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. A. C. Yao, “Protocols for secure computations,” in Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160–164, Chicago, Ill, USA, 1982.
  13. O. S. Goldreich, S. Mical, and A. Wigderson, “How to play any mental game,” in Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC '87), pp. 218–229, ACM, New York, NY, USA, 1987.
  14. O. S. Goldreich, “Secure multiparty computation,” Manuscript, Preliminary version, 1998.
  15. O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications, Cambridge University Press, Cambridge, UK, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  16. M. M. Prabhakaran and A. Sahai, Eds., Secure Multiparty Computation, IOS Press, 2013.
  17. D. Chaum, C. Crepeau, and I. Damgard, “Multi-party unconditionally secure protocols (extended abstract),” in Proceedings of the STOC, pp. 11–19, ACM, 1988.
  18. I. Damgard, V. Pastro, N. P. Smart, and S. Zakarias, “Multiparty computation from somewhat homomorphic encryption,” in Advances in Cryptology—Crypto 2012, vol. 7417 of Lecture Notes in Computer Science, pp. 643–662, Springer, 2012. View at Google Scholar
  19. Y. Lindell and B. Pinkas, “An efficient protocol for secure two-party computation in the presence of malicious adversaries,” in Advances in Cryptology—EUROCRYPT 2007, vol. 4515 of Lecture Notes in Computer Science, pp. 52–78, Springer, Berlin, Germany, 2007. View at Google Scholar
  20. B. Pinkas, T. Schneider, N. P. Smart, and S. C. Williams, “Secure two-party computation is practical,” in Advances in Cryptology—ASIACRYPT 2009, vol. 5912 of Lecture Notes in Computer Science, pp. 250–267, Springer, Berlin, Germany, 2009. View at Google Scholar
  21. M. O. Rabin, “How to exchange secrets b y oblivious transfer,” Tech. Rep. TR-81, Aiken Computation Laboratory, Harvard University, 1981. View at Google Scholar
  22. S. Even, O. Goldreich, and A. Lempel, “A randomized protocol for signing contracts,” Communications of the ACM, vol. 28, no. 6, pp. 637–647, 1985. View at Publisher · View at Google Scholar · View at Scopus
  23. M. Naor and B. Pinkas, “Oblivious transfer with adaptive queries,” in Advances in Cryptology—CRYPTO’ 99, vol. 1666 of Lecture Notes in Computer Science, pp. 573–590, Springer, 1999. View at Google Scholar