{"title":"生成多项式的不可逆加密方法。","authors":"C Quantin, H Bouzelat, L Dusserre","doi":"10.3109/14639239608995013","DOIUrl":null,"url":null,"abstract":"<p><p>Patient follow up, within the framework of epidemiological studies, poses the problem of linking nominal files. An encryption method of identity is proposed to allow the linkage of medical information on the same patient while respecting the confidentiality of medical data. In contrast with most encryption algorithms, the proposed method is mathematically irreversible in response to the requirement of the French National Commission of Computerized Information Security which demands that the cryptosystem must not be decipherable even by the legitimate recipient. In order to prevent deciphering by frequency analysis, the proposed method introduces polynomial operations so that neither indication concerning the length of the string nor a possible repetition of characters can be obtained by code disclosure. The security of the system is reinforced by the use of two keys, the first one to be defined by the producers of information and the second one by the recipient so that nobody can decrypt the enciphered text.</p>","PeriodicalId":76132,"journal":{"name":"Medical informatics = Medecine et informatique","volume":"21 2","pages":"113-21"},"PeriodicalIF":0.0000,"publicationDate":"1996-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.3109/14639239608995013","citationCount":"17","resultStr":"{\"title\":\"Irreversible encryption method by generation of polynomials.\",\"authors\":\"C Quantin, H Bouzelat, L Dusserre\",\"doi\":\"10.3109/14639239608995013\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>Patient follow up, within the framework of epidemiological studies, poses the problem of linking nominal files. An encryption method of identity is proposed to allow the linkage of medical information on the same patient while respecting the confidentiality of medical data. In contrast with most encryption algorithms, the proposed method is mathematically irreversible in response to the requirement of the French National Commission of Computerized Information Security which demands that the cryptosystem must not be decipherable even by the legitimate recipient. In order to prevent deciphering by frequency analysis, the proposed method introduces polynomial operations so that neither indication concerning the length of the string nor a possible repetition of characters can be obtained by code disclosure. The security of the system is reinforced by the use of two keys, the first one to be defined by the producers of information and the second one by the recipient so that nobody can decrypt the enciphered text.</p>\",\"PeriodicalId\":76132,\"journal\":{\"name\":\"Medical informatics = Medecine et informatique\",\"volume\":\"21 2\",\"pages\":\"113-21\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1996-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.3109/14639239608995013\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Medical informatics = Medecine et informatique\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3109/14639239608995013\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Medical informatics = Medecine et informatique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3109/14639239608995013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Irreversible encryption method by generation of polynomials.
Patient follow up, within the framework of epidemiological studies, poses the problem of linking nominal files. An encryption method of identity is proposed to allow the linkage of medical information on the same patient while respecting the confidentiality of medical data. In contrast with most encryption algorithms, the proposed method is mathematically irreversible in response to the requirement of the French National Commission of Computerized Information Security which demands that the cryptosystem must not be decipherable even by the legitimate recipient. In order to prevent deciphering by frequency analysis, the proposed method introduces polynomial operations so that neither indication concerning the length of the string nor a possible repetition of characters can be obtained by code disclosure. The security of the system is reinforced by the use of two keys, the first one to be defined by the producers of information and the second one by the recipient so that nobody can decrypt the enciphered text.