Identity-based encryption of data items for secure access thereto

S. Katzenbeisser (Inventor), M. Petkovic (Inventor)

Research output: PatentPatent publication

Abstract

The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
Original languageEnglish
Patent numberUS8627103
Priority date23/05/08
Publication statusPublished - 7 Jan 2014

Fingerprint

Data privacy
Patents and inventions
Cryptography
Health

Bibliographical note

Other priority number(s):
WO2009IB52060 20090518 Date: 18-05-2009
Also published as:
RU2505855 (C2)
US2011066863 (A1)
US8627103 (B2)
WO2009141784 (A1)

Cite this

@misc{8505cc1b5e234fa1a5c77654951f381f,
title = "Identity-based encryption of data items for secure access thereto",
abstract = "The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.",
author = "S. Katzenbeisser and M. Petkovic",
note = "Other priority number(s): WO2009IB52060 20090518 Date: 18-05-2009 Also published as: RU2505855 (C2) US2011066863 (A1) US8627103 (B2) WO2009141784 (A1); US8627103",
year = "2014",
month = "1",
day = "7",
language = "English",
type = "Patent",

}

Identity-based encryption of data items for secure access thereto. / Katzenbeisser, S. (Inventor); Petkovic, M. (Inventor).

Patent No.: US8627103.

Research output: PatentPatent publication

TY - PAT

T1 - Identity-based encryption of data items for secure access thereto

AU - Katzenbeisser, S.

AU - Petkovic, M.

N1 - Other priority number(s): WO2009IB52060 20090518 Date: 18-05-2009 Also published as: RU2505855 (C2) US2011066863 (A1) US8627103 (B2) WO2009141784 (A1)

PY - 2014/1/7

Y1 - 2014/1/7

N2 - The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.

AB - The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.

M3 - Patent publication

M1 - US8627103

ER -

Katzenbeisser S, Petkovic M, inventors. Identity-based encryption of data items for secure access thereto. US8627103. 2014 Jan 7.