Vol.9 (2019) No. 5 ISSN: 2088-5334 Secure e-Health Record System Using Identity-based Encryption with Embedded Key Dian Neipa Purnamasari #1 , Amang Sudarsono #2 , Prima Kristalina #3 # Department of Electrical Engineering, Politeknik Elektronika Negeri Surabaya, Surabaya, Indonesia E-mail: 1 dneipa12@gmail.com, 2 amang@pens.ac.id, 3 prima@pens.ac.id Abstract— The existence of electronic health record in the Internet world can result in the emergence of potentially unauthorized users to access and abuse the data. Therefore, it is necessary to have a high level of security that can maintain the confidentiality of electronic health record data. In cryptography, the longer the key then, the higher the level of security achieved. However, this can lead to slow computing time. Therefore, we propose a security method with an identity-based encryption scheme that is built hybrid using elliptic curve cryptography (ECC) and elliptic curve integrated encryption system (ECIES) algorithms or can be abbreviated as IBE-ECC-ECIES. An additional feature of the proposed method is the creation of key pairs generated by the ECC algorithm and there is an identity that has been embedded in the key pair in order to increase the level of security and uniqueness of the key. This method has been compared based on analysis of performance, computation time and the level of security in the same environment. This method is another IBE hybrid scheme called IBE-ECC-AES. The results of the test showed that the proposed method was superior to 0.3 seconds compared to the comparison method in the key pair generation process. In addition, security in the proposed method can overcome sniffing and chosen-plaintext attacks. Keywords— electronic health record; IBE; ECC; ECIES; embedded key. I. INTRODUCTION Nowadays many health services are connected to the Internet; this can open the gap for information leakage such as the disclosure of the patient's electronic health record data. Health record data is confidential data so it must be protected from users who want to abuse the data. Based on these problems, many researchers have proposed security methods that can protect and overcome the misuse of medical record data. The concept of Identity-based Cryptosystem (IBC) using the signature scheme was first proposed by Shamir in 1984 [1]. The proposed concept allows users to communicate safely, verify signatures without exchanging keys and without using third parties. After that, many researchers proposed identity-based encryption schemes (IBE) that could be classified as pairing-based and non-pairing. IBE schemes based on bilinear pairs on elliptic curves can be pairs of Weil and Tate [2]–[5]. While some non-pairing based IBE schemes are [6]–[9]. Pairing-based cryptography (PBC) is based on a pair function that maps pairs of points on elliptic curves over finite fields. Pairing is useful in cryptography if it is built correctly so it can produce limited fields large enough to create discrete logarithmic problems that are difficult to calculate. The practicality of the IBE scheme is hindered by the calculation of complex discrete logarithms and causes longer computation time so that this scheme is not suitable if implemented on systems that require high data mobility. The researchers began to turn to non-pairing schemes such as RSA, which is considered a practical solution to overcome computational complexity. Himanshu et al. [9] proposed that the IBE scheme could replace traditional SSL to eliminate the need for site certificates. The proposed IBE scheme is integrated with RSA to produce key pairs. The strength of RSA lies in the level of difficulty in factoring numbers into prime factors so that the key generation process will produce a large enough keyspace. This excess all at once into a weakness in the RSA secret key length that is too large will result in computing time on the process of decryption becomes high and the system becomes unreliable. The solution to reducing the computing time at RSA is to use Elliptic Curve Cryptography (ECC). ECC offers the same level of security with shorter key lengths. Comparisons between RSA and ECC key lengths are shown in Table I. At present, there are three applications in elliptic curve cryptography namely the Elliptic Curve Diffie Hellman (ECDH), Elliptic Curve Digital Signature Algorithm (ECDSA), and the Elliptic Curve Integrated Encryption System (ECIES). ECDH is an elliptic curve variant that applies a key exchange scheme based on the Diffie-Helman 1496