2 research outputs found
Using Blockchain to Achieve Decentralized Privacy In IoT Healthcare
With the advent of the Internet of Things (IoT), e-health has become one of
the main topics of research. Due to the sensitivity of patient information,
patient privacy seems challenging. Nowadays, patient data is usually stored in
the cloud in healthcare programs, making it difficult for users to have enough
control over their data. The recent increment in announced cases of security
and surveillance breaches compromising patients' privacy call into question the
conventional model, in which third-parties gather and control immense amounts
of patients' Healthcare data. In this work, we try to resolve the issues
mentioned above by using blockchain technology. We propose a blockchain-based
protocol suitable for e-health applications that does not require trust in a
third party and provides an efficient privacy-preserving access control
mechanism. Transactions in our proposed system, unlike Bitcoin, are not
entirely financial, and we do not use conventional methods for consensus
operations in blockchain like Proof of Work (PoW). It is not suitable for IoT
applications because IoT devices have resources-constraints. Usage of
appropriate consensus method helps us to increase network security and
efficiency, as well as reducing network cost, i.e., bandwidth and processor
usage. Finally, we provide security and privacy analysis of our proposed
protocol.Comment: 6 page
Designated Verifier Threshold Proxy Signature Scheme without Random Oracles
In a designated verifier threshold proxy signature \, scheme, an original signer can delegate his/her signing power to proxy signers such that any or more out of proxy signers can sign messages on behalf of the original signer but or less of the proxy signers cannot generate a valid proxy signature. Of course, the signature is issued for a designated receiver and therefore only the designated receiver can validate the proxy signature. In this paper, we propose a new designated verifier threshold proxy signature scheme and also show that the proposed scheme has provable security in the standard model. The security of proposed scheme is based on the assumption and the proposed scheme satisfies all the security requirements of threshold proxy signature schemes