Research Article
Secure Information Sharing System for Online Patient Networks
Table 2
The whole process of SISS.
| | |
| 1. System Setting | | 1.1. SysPrm | |
| 2. Registration | | 2.1. KeyGen | | 2.2. InfGenStr | |
| 3. Log-in by Authentication | |
| 3.1. QrU1 | | (1) Compute and Query: | | | |
| | 3.2. VrSM1_QrSM2 | | (1) Find: | | (2) Decrypt: | | (3) Compute:, | | | | Verify: | | (4) Compute & Verify: | | | | (5) Compute: | | (6) Compute & Query: | | |
| 3.3. VrU2_QrU3 | | (1) Decrypt: | | (2) Compute & Verify: | | , | | Then, | | (3) Decrypt: | | (4) Render at a page: | |
| | 3.4. VrSM3 | | (1) Verify: |
| 4. Action | |
| 4.1. EncUp | | | | (1) Encrypt & Upload M: | |
| 4.2. DnDec | | | | (1) Download from SISS Server: | | (2) Decrypt : | |
|
|