After Alice gets the medical equipments and goes back to
home, the BAN constructed by these instruments can collect
her health data m. Before the information are sent to the EHR
through Internet, it is necessary to take corresponding
encryption and put signature to ensure that during the
information transmission process it can resist the malicious
attacks like decryption, tamper and forging, etc. At the same
time, the scheme uses time stamp technology to against replay
attack. The input is the collected Alice’s health information m,
and the output is a cipher text C=IBCQEHR{T||IDA||m||IDB||
IBSSA(IDA||m||IDB)}, which is ready to be sent.