Enhancing E-Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption

被引:0
作者
Farhat, Suryya [1 ]
Kumar, Manoj [2 ]
Srivastava, Anshul [3 ]
Bisht, Shilpi [4 ]
Rishiwal, Vinay [5 ]
Yadav, Mano [6 ]
机构
[1] Dr Akhilesh Das Gupta Inst Profess Studies, Dept Appl Sci & Humanities, Delhi, India
[2] Gurukul Kangri Deemed Univ, Dept Math & Stat, Haridwar, Uttarakhand, India
[3] Amity Univ, Amity Int Business Sch, Noida, Uttar Pradesh, India
[4] Birla Inst Appl Sci, Dept Appl Sci, Bhimtal, Uttarakhand, India
[5] MJP Rohilkhand Univ, Dept CSIT, Bareilly, Uttar Pradesh, India
[6] Bareilly Coll, Dept CS, Bareilly, Uttar Pradesh, India
来源
SECURITY AND PRIVACY | 2025年 / 8卷 / 01期
关键词
cloud computing; decryption; e-healthcare system; ECC; EdDSA; Edge computing; encryption; lightweight cryptography; twisted Edwards curve; CLOUD; SECURITY; SCHEME;
D O I
10.1002/spy2.464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article introduces a scheme designed to ensure the integrity and privacy of e-healthcare data. The proposed scheme combines a dual signature approach with EdDSA (Edwards-curve Digital Signature Algorithm). It is important to note that while dual signatures may appear similar to double signatures, they differ significantly. Dual signatures involve coupling two distinct values of diverse natures to securely anonymise them to various entities. Recent research has demonstrated that elliptic curve cryptography (ECC) is better suited for resource-constrained or lightweight devices than RSA (Rivest-Shamir-Adleman). EdDSA, an enhancement of ECDSA, offers efficient and affordable signature generation. However, EdDSA signature verification is a computationally intensive task that may not be feasible for e-healthcare devices. Nevertheless, edge computing devices lack operational constraints and can easily handle this verification process. These characteristics make our proposal an elegant, robust, and efficient strategy for securing e-healthcare systems and addressing the challenges of integrity and privacy. Results show that the proposed algorithm performs better in terms of key generation, signing time, verification time, encryption/decryption time and overall time as compared to the state-of-the-art.
引用
收藏
页数:11
相关论文
共 38 条
[1]   Digital signatures [J].
Aggarwal, Shubhani ;
Kumar, Neeraj .
BLOCKCHAIN TECHNOLOGY FOR SECURE AND SMART APPLICATIONS ACROSS INDUSTRY VERTICALS, 2021, 121 :95-107
[2]  
Ahmed E., MOBILE EDGE COMPUTIN
[3]  
ALI A., 2022, Journal of Theoretical and Applied Information Technology, V100, P847
[4]   IMPLEMENTATION OF DIGITAL-SIGNATURES [J].
ARAZI, B .
ELECTRONICS LETTERS, 1982, 18 (21) :900-901
[5]  
Bernstein D., EDDSA MORE CURVES 20
[6]  
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
[7]  
Bernstein DJ, 2007, LECT NOTES COMPUT SC, V4833, P29
[8]   High-speed high-security signatures [J].
Bernstein, Daniel J. ;
Duif, Niels ;
Lange, Tanja ;
Schwabe, Peter ;
Yang, Bo-Yin .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) :77-89
[9]   IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges [J].
Cai, Hongming ;
Xu, Boyi ;
Jiang, Lihong ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01) :75-87
[10]   Lattice-Based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA [J].
Cao, Weiqiong ;
Shi, Hongsong ;
Chen, Hua ;
Chen, Jiazhe ;
Fan, Limin ;
Wu, Wenling .
TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 :169-195