Research Article

Secure Information Sharing System for Online Patient Networks

Table 2

The whole process of SISS.


1. System Setting
1.1. SysPrm

2. Registration
2.1. KeyGen
2.2. InfGenStr

3. Log-in by Authentication

3.1. QrU1
(1) Compute and Query:

3.2. VrSM1_QrSM2
(1) Find:
(2) Decrypt:
(3) Compute:,
Verify:
(4) Compute & Verify:
(5) Compute:
(6) Compute & Query:

3.3. VrU2_QrU3
(1) Decrypt:
(2) Compute & Verify:
,
Then,
(3) Decrypt:
(4) Render at a page:

3.4. VrSM3
(1) Verify:

4. Action

4.1. EncUp
(1) Encrypt & Upload M:

4.2. DnDec
(1) Download from SISS Server:
(2) Decrypt :