Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system

被引:0
作者
Uganya, G. [1 ]
Bommi, R. M. [2 ]
Krishnammal, P. Muthu [3 ]
Vijayaraj, N. [4 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
[2] Chennai Inst Technol, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
[3] VIT AP Univ, Sch Elect Engn, Amaravati, Andhra Pradesh, India
[4] Vel Tech Rangarajan Dr Sagunthal R&D Inst Sci & T, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Internet of Things; blockchain technology; multi-signature; Secure Hash Algorithm; Revised Elliptic Curve; Cryptography; medical image; BATCH VERIFICATION; BLOCKCHAIN;
D O I
10.3233/JIFS-232802
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But it is difficult to transfer the patient's health record as a centralized network. So, "blockchain technology" has excellent consideration due to its unique qualities such as decentralized network, openness, irreversible data, and cryptography functions. Blockchain technology depends on cryptography hash techniques for safe transmission. For increased security, it transforms the variable size inputs into a constant length hash result. Current cryptographic hash algorithms with digital signatures are only able to access keys up to a size of 256 bytes and have concerns with single node accessibility. It just uses the bits that serve as the key to access the data. This paper proposes the "Revised Elliptic Curve Cryptography Multi-Signature Scheme" (RECC-MSS) for multinode availability to find the nearest path for secure communications with the medical image as keys. Here, the input image key can be converted into an array of data that can be extended up to 512 bytes of size. The performance of the proposed algorithm is analyzed with other cryptography hash functions like Secure Hashing Algorithms (SHAs) such as "SHA224", "SHA256", "SHA384", "SHA512", "SHA3-224", "SHA3-256", "SHA3-384", "SHA3-512", and "Message Digest5" (MD5) by "One-way ANOVA" test in terms of "accuracy", "throughput" and "time complexity". The proposed scheme with ECC achieved the throughput of 17.07 kilobytes per 200 nano seconds, 93.25% of accuracy, 1.5 nanoseconds latency of signature generation, 1.48 nanoseconds latency of signature verification, 1.5 nanoseconds of time complexity with 128 bytes of hash signature. The RECC-MSS achieved the significance of 0.001 for accuracy and 0.002 for time complexity which are less than 0.05. From the statistical analysis, the proposed algorithm has significantly high accuracy, high throughput and less time complexity than other cryptography hash algorithms.
引用
收藏
页码:11993 / 12012
页数:20
相关论文
共 25 条
  • [1] Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network
    A. Hassen, Oday
    A. Abdulhussein, Ansam
    M. Darwish, Saad
    Othman, Zulaiha Ali
    Tiun, Sabrina
    A. Lotfy, Yasmin
    [J]. SYMMETRY-BASEL, 2020, 12 (10): : 1 - 18
  • [2] Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach
    Anushiadevi, R.
    Amirtharajan, Rengarajan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (30) : 46269 - 46292
  • [3] Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram
    Anushiadevi, R.
    Amirtharajan, Rengarajan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 72
  • [4] BlockChain: A Distributed Solution to Automotive Security and Privacy
    Dorri, Ali
    Steger, Marco
    Kanhere, Salil S.
    Jurdak, Raja
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) : 119 - 125
  • [5] A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator
    Hoai Luan Pham
    Thi Hong Tran
    Vu Trung Duong Le
    Nakashima, Yasuhiko
    [J]. IEEE ACCESS, 2022, 10 : 11830 - 11845
  • [6] Blockchain technology in the healthcare industry: Trends and opportunities
    Hussien, Hassan Mansur
    Yasin, Sharifah Md
    Udzir, Nur Izura
    Ninggal, Mohd Izuan Hafez
    Salman, Sadeq
    [J]. JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2021, 22 (22)
  • [7] New algorithms for batch verification of standard ECDSA signatures
    Karati, Sabyasachi
    Das, Abhijit
    Roychowdhury, Dipanwita
    Bellur, Bhargav
    Bhattacharya, Debojyoti
    Iyer, Aravind
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (04) : 237 - 258
  • [8] Batch verification of Digital Signatures: Approaches and challenges
    Kittur, Apurva S.
    Pais, Alwyn Roshan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 15 - 27
  • [9] Protection of surveillance recordings via blockchain-assisted multimedia security
    Ma, Zhaowei
    Zhu, Li
    Yu, F. Richard
    James, Jeremy
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2021, 37 (02) : 69 - 80
  • [10] Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments
    Mahalingam, Hemalatha
    Velupillai Meikandan, Padmapriya
    Thenmozhi, Karuppuswamy
    Moria, Kawthar Mostafa
    Lakshmi, Chandrasekaran
    Chidambaram, Nithya
    Amirtharajan, Rengarajan
    [J]. MATHEMATICS, 2023, 11 (08)