Skip to main content

2024 | OriginalPaper | Buchkapitel

4. A Sustainable Blockchain and Asymmetric Broadcast Encryption-Based Secure E-Healthcare System

verfasst von : Snehlata Yadav, Vivek Yadav

Erschienen in: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The value of healthcare records has skyrocketed due to the emergence of many new diseases and the ongoing pandemic situations. With these healthcare records spread across numerous healthcare provider entities in various locations, it has become time-consuming to manage them in physical form. Consequently, there is a growing need to transition to electronic healthcare records (EHRs). However, the current approach of managing EHRs at the centralized level creates a single point of failure and exposes users to numerous security risks which include amateur-level attacks and data breaches orchestrated by adversaries. Handling electronic health records from the Internet of Medical Things(IoMT) poses significant challenges due to the sensitive information involved, which makes it a prime target for attackers. Furthermore, managing modern healthcare systems is complex and expensive, demanding highly secure storage space. The recent COVID-19 pandemic has inflicted unprecedented costs and human suffering on a scale never seen before in the modern world. As long as diseases continue to resurface, we must strive to slow down pandemics by leveraging information systems empowered by new IT technologies. Blockchain technology emerges as one potential solution for achieving this goal. By enhancing health record management, blockchain can address these problems. Its rising popularity has sparked extensive research into different transaction schemes that specialize in privacy preservation across various fields. However, the public nature of blockchain, which exposes transaction information, introduces significant privacy risks. Therefore, it is crucial to construct an efficient scheme that is flexible in nature and ensures privacy preservation of transaction contents and reliable auditability, aspects that previous works have failed to adequately address. We propose a framework of broadcast encryption and a specific instance to provide conditional data access control. It relies on a specific dedicated asymmetric-key-based broadcast encryption scheme, which stores user encrypted credentials for the blockchain conditional data access control. Simultaneously, conditional access of the encrypted data that is stored in an off-chain source of the data is applicable to encrypted data. The blockchain environment facilitates interactive communication between users of data and data providers, providing the necessary data access control information. Our proposed solution is based on a blockchain enabled privacy-preserving transaction construction that utilizes an efficient asymmetric-key broadcast encryption method. By implementing this approach, we aim to overcome the limitations of previous works and ensure secure and private handling of healthcare transactions within the blockchain ecosystem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Proceedings of the 8th international conference on theory and practice in public key cryptography. PKC’05. Springer, Berlin, Heidelberg, pp 65–84 Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Proceedings of the 8th international conference on theory and practice in public key cryptography. PKC’05. Springer, Berlin, Heidelberg, pp 65–84
Zurück zum Zitat Acharya K (2020) Secure and efficient public key multi-channel broadcast encryption schemes. J Inform Secur Appl 51:102436 Acharya K (2020) Secure and efficient public key multi-channel broadcast encryption schemes. J Inform Secur Appl 51:102436
Zurück zum Zitat Acharya K, Dutta R (2017) Provable secure constructions for broadcast encryption with personalized messages. In: International conference on provable security. Springer, pp 329–348 Acharya K, Dutta R (2017) Provable secure constructions for broadcast encryption with personalized messages. In: International conference on provable security. Springer, pp 329–348
Zurück zum Zitat Acharya K, Dutta R (2018) Constructions of secure multi-channel broadcast encryption schemes in public key framework. In: Camenisch J, Papadimitratos P (eds) Cryptology and network security. Springer, Cham, pp 495–515 Acharya K, Dutta R (2018) Constructions of secure multi-channel broadcast encryption schemes in public key framework. In: Camenisch J, Papadimitratos P (eds) Cryptology and network security. Springer, Cham, pp 495–515
Zurück zum Zitat Ak M (2012) Optimization techniques and new methods for broadcast encryption and traitor tracing Ak M (2012) Optimization techniques and new methods for broadcast encryption and traitor tracing
Zurück zum Zitat Al-Qerem A, Alauthman M, Almomani A, Gupta BB (2020) IOT transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput 24(8):5695–5711CrossRef Al-Qerem A, Alauthman M, Almomani A, Gupta BB (2020) IOT transaction processing through cooperative concurrency control on fog-cloud computing environment. Soft Comput 24(8):5695–5711CrossRef
Zurück zum Zitat Azees M, Vijayakumar P, Deboarh LJ (2017) Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transa Intell Transp Syst 18(9):2467–2476CrossRef Azees M, Vijayakumar P, Deboarh LJ (2017) Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Transa Intell Transp Syst 18(9):2467–2476CrossRef
Zurück zum Zitat Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of the 24th annual international conference on theory and applications of cryptographic techniques. EUROCRYPT’05. Springer, Berlin, Heidelberg, pp 440–456 (2005). https://doi.org/10.1007/11426639_26 Boneh D, Boyen X, Goh E-J (2005) Hierarchical identity based encryption with constant size ciphertext. In: Proceedings of the 24th annual international conference on theory and applications of cryptographic techniques. EUROCRYPT’05. Springer, Berlin, Heidelberg, pp 440–456 (2005). https://​doi.​org/​10.​1007/​11426639_​26
Zurück zum Zitat Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V (ed) Advances in cryptology—CRYPTO 2005. Springer, Berlin, Heidelberg, pp 258–275 Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V (ed) Advances in cryptology—CRYPTO 2005. Springer, Berlin, Heidelberg, pp 258–275
Zurück zum Zitat Boneh D, Waters B, Zhandry M (2014) Low overhead broadcast encryption from multilinear maps. In: Annual cryptology conference. Springer, pp 206–223 Boneh D, Waters B, Zhandry M (2014) Low overhead broadcast encryption from multilinear maps. In: Annual cryptology conference. Springer, pp 206–223
Zurück zum Zitat Chen L, Li J, Zhang Y (2019) Adaptively secure anonymous identity-based broadcast encryption for data access control in cloud storage service. KSII Transa Internet Inform Syst (TIIS) 13(3):1523–1545 Chen L, Li J, Zhang Y (2019) Adaptively secure anonymous identity-based broadcast encryption for data access control in cloud storage service. KSII Transa Internet Inform Syst (TIIS) 13(3):1523–1545
Zurück zum Zitat Chen L, Li J, Zhang Y (2020) Anonymous certificate-based broadcast encryption with personalized messages. IEEE Trans Broadcast 66(4):867–881CrossRef Chen L, Li J, Zhang Y (2020) Anonymous certificate-based broadcast encryption with personalized messages. IEEE Trans Broadcast 66(4):867–881CrossRef
Zurück zum Zitat Chen T, Zhang L, Choo K-KR, Zhang R, Meng X (2021) Blockchain-based key management scheme in fog-enabled IoT systems. IEEE Internet of Things J 8(13):10766–10778CrossRef Chen T, Zhang L, Choo K-KR, Zhang R, Meng X (2021) Blockchain-based key management scheme in fog-enabled IoT systems. IEEE Internet of Things J 8(13):10766–10778CrossRef
Zurück zum Zitat Chugh N, Kumar A, Aggarwal A (2016) Security aspects of a RFID-sensor integrated low-powered devices for internet-of-things. In: 2016 fourth international conference on parallel, distributed and grid computing (PDGC). IEEE, pp 759–763 Chugh N, Kumar A, Aggarwal A (2016) Security aspects of a RFID-sensor integrated low-powered devices for internet-of-things. In: 2016 fourth international conference on parallel, distributed and grid computing (PDGC). IEEE, pp 759–763
Zurück zum Zitat Chugh N, Sharma DK, Singhal R, Jain S, Srikanth P, Kumar A, Aggarwal A (2020) Blockchain-based decentralized application (DApp) design, implementation, and analysis with healthcare 4.0 trends. In: Basic & clinical pharmacology & toxicology, vol 126, pp 139–140. WILEY 111 RIVER ST, HOBOKEN 07030-5774, NJ USA Chugh N, Sharma DK, Singhal R, Jain S, Srikanth P, Kumar A, Aggarwal A (2020) Blockchain-based decentralized application (DApp) design, implementation, and analysis with healthcare 4.0 trends. In: Basic & clinical pharmacology & toxicology, vol 126, pp 139–140. WILEY 111 RIVER ST, HOBOKEN 07030-5774, NJ USA
Zurück zum Zitat Delerablée C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Proceedings of the advances in crypotology 13th international conference on theory and application of cryptology and information security. ASIACRYPT’07. Springer, Berlin, Heidelberg, pp 200–215. http://dl.acm.org/citation.cfm?id=1781454.1781471 Delerablée C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Proceedings of the advances in crypotology 13th international conference on theory and application of cryptology and information security. ASIACRYPT’07. Springer, Berlin, Heidelberg, pp 200–215. http://​dl.​acm.​org/​citation.​cfm?​id=​1781454.​1781471
Zurück zum Zitat Dubois R, Guillevic A, Sengelin Le Breton M (2013) Improved broadcast encryption scheme with constant-size ciphertext. In: Abdalla M, Lange T (eds) Pairing-based cryptography—Pairing 2012. Springer, Berlin, Heidelberg, pp 196–202 Dubois R, Guillevic A, Sengelin Le Breton M (2013) Improved broadcast encryption scheme with constant-size ciphertext. In: Abdalla M, Lange T (eds) Pairing-based cryptography—Pairing 2012. Springer, Berlin, Heidelberg, pp 196–202
Zurück zum Zitat Du Y, Liu J, Guan Z, Feng H (2018) A medical information service platform based on distributed cloud and blockchain. In: 2018 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 34–39 Du Y, Liu J, Guan Z, Feng H (2018) A medical information service platform based on distributed cloud and blockchain. In: 2018 IEEE international conference on smart cloud (SmartCloud). IEEE, pp 34–39
Zurück zum Zitat Fan Q, Chen J, Deborah LJ, Luo M (2021) A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. J Syst Archit 117:102112 Fan Q, Chen J, Deborah LJ, Luo M (2021) A secure and efficient authentication and data sharing scheme for internet of things based on blockchain. J Syst Archit 117:102112
Zurück zum Zitat Fiat A, Naor M (1993) Broadcast encryption. In: Annual international cryptology conference. Springer, pp 480–491 Fiat A, Naor M (1993) Broadcast encryption. In: Annual international cryptology conference. Springer, pp 480–491
Zurück zum Zitat Florence ML, Suresh D (2019) Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search. Cluster Computing 22:13119–13130CrossRef Florence ML, Suresh D (2019) Enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search. Cluster Computing 22:13119–13130CrossRef
Zurück zum Zitat Fukushima K, Kiyomoto S, Tanaka T, Sakurai K (2009) Ternary subset difference method and its quantitative analysis. In: Chung K-I, Sohn K, Yung M (eds) Information security applications. Springer, Berlin, Heidelberg, pp 225–239 Fukushima K, Kiyomoto S, Tanaka T, Sakurai K (2009) Ternary subset difference method and its quantitative analysis. In: Chung K-I, Sohn K, Yung M (eds) Information security applications. Springer, Berlin, Heidelberg, pp 225–239
Zurück zum Zitat Gupta BB, Li K-C, Leung VC, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Automatica Sinica 8(12):1877–1890 Gupta BB, Li K-C, Leung VC, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Automatica Sinica 8(12):1877–1890
Zurück zum Zitat Jain S, Ahuja NJ, Srikanth P, Bhadane KV, Nagaiah B, Kumar A, Konstantinou C (2021) Blockchain and autonomous vehicles: Recent advances and future directions. IEEE Access 9:130264–130328CrossRef Jain S, Ahuja NJ, Srikanth P, Bhadane KV, Nagaiah B, Kumar A, Konstantinou C (2021) Blockchain and autonomous vehicles: Recent advances and future directions. IEEE Access 9:130264–130328CrossRef
Zurück zum Zitat Jin H, Xu C, Luo Y, Li P (2020) Blockchain-based secure and privacy-preserving clinical data sharing and integration. In: Algorithms and architectures for parallel processing: 20th international conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III 20. Springer, pp 93–109 Jin H, Xu C, Luo Y, Li P (2020) Blockchain-based secure and privacy-preserving clinical data sharing and integration. In: Algorithms and architectures for parallel processing: 20th international conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III 20. Springer, pp 93–109
Zurück zum Zitat Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure and energy efficient-based e-health care framework for green internet of things. IEEE Trans Green Commun Network 5(3):1223–1231CrossRef Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure and energy efficient-based e-health care framework for green internet of things. IEEE Trans Green Commun Network 5(3):1223–1231CrossRef
Zurück zum Zitat Kaushik K, Kumar A (2023) Demystifying quantum blockchain for healthcare. Secur Privacy 6(3):284 Kaushik K, Kumar A (2023) Demystifying quantum blockchain for healthcare. Secur Privacy 6(3):284
Zurück zum Zitat Kumar A, Gopal K, Aggarwal A (2016) Design and analysis of lightweight trust mechanism for secret data using lightweight cryptographic primitives in manets. Int J Netw Secur 18(1):1–18 Kumar A, Gopal K, Aggarwal A (2016) Design and analysis of lightweight trust mechanism for secret data using lightweight cryptographic primitives in manets. Int J Netw Secur 18(1):1–18
Zurück zum Zitat Kumar A, Ottaviani C, Gill SS, Buyya R (2022) Securing the future internet of things with post-quantum cryptography. Secur Privacy 5(2):200 Kumar A, Ottaviani C, Gill SS, Buyya R (2022) Securing the future internet of things with post-quantum cryptography. Secur Privacy 5(2):200
Zurück zum Zitat Lin H, Zhang H, Yan H, Wang H, Shi Y, Gao F, Wen Q (2021) A secure online treatment blockchain service. Wirel Perso Commun 117:1773–1795CrossRef Lin H, Zhang H, Yan H, Wang H, Shi Y, Gao F, Wen Q (2021) A secure online treatment blockchain service. Wirel Perso Commun 117:1773–1795CrossRef
Zurück zum Zitat Lin C, He D, Huang X, Choo K-KR, Vasilakos AV (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42–52 Lin C, He D, Huang X, Choo K-KR, Vasilakos AV (2018) Bsein: a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J Netw Comput Appl 116:42–52
Zurück zum Zitat Liu W, Liu J, Wu Q, Qin B, Li Y (2016) Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption. Int J Inform Secur 15(1):35–50CrossRef Liu W, Liu J, Wu Q, Qin B, Li Y (2016) Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption. Int J Inform Secur 15(1):35–50CrossRef
Zurück zum Zitat Li Y, Zhou F, Ji D, Xu Z (2022) A hierarchical searchable encryption scheme using blockchain-based indexing. Electronics 11(22):3832 Li Y, Zhou F, Ji D, Xu Z (2022) A hierarchical searchable encryption scheme using blockchain-based indexing. Electronics 11(22):3832
Zurück zum Zitat Lubicz D, Sirvent T (2008) Attribute-based broadcast encryption scheme made efficient, pp 325–342 Lubicz D, Sirvent T (2008) Attribute-based broadcast encryption scheme made efficient, pp 325–342
Zurück zum Zitat Mandal M, Nuida K (2020) Identity-based outsider anonymous broadcast encryption with simultaneous individual messaging. In: International conference on network and system security. Springer, pp 167–186 Mandal M, Nuida K (2020) Identity-based outsider anonymous broadcast encryption with simultaneous individual messaging. In: International conference on network and system security. Springer, pp 167–186
Zurück zum Zitat Mandal M, Nuida K (2020) Identity-based outsider anonymous broadcast encryption with simultaneous individual messaging. In: Network and system security: 14th international conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings 14. Springer, pp 167–186 Mandal M, Nuida K (2020) Identity-based outsider anonymous broadcast encryption with simultaneous individual messaging. In: Network and system security: 14th international conference, NSS 2020, Melbourne, VIC, Australia, November 25–27, 2020, Proceedings 14. Springer, pp 167–186
Zurück zum Zitat Mihaljević MJ, Knežević M, Urošević D, Wang L, Xu S (2023) An approach for blockchain and symmetric keys broadcast encryption based access control in IoT. Symmetry 15(2):299 Mihaljević MJ, Knežević M, Urošević D, Wang L, Xu S (2023) An approach for blockchain and symmetric keys broadcast encryption based access control in IoT. Symmetry 15(2):299
Zurück zum Zitat Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Kilian J (ed) Advances in cryptology CRYPTO 2001. Springer, Berlin, Heidelberg, pp 41–62 Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Kilian J (ed) Advances in cryptology CRYPTO 2001. Springer, Berlin, Heidelberg, pp 41–62
Zurück zum Zitat Ohtake G, Hanaoka G, Ogawa K (2010) Efficient broadcast encryption with personalized messages. In: International conference on provable security. Springer, pp 214–228 Ohtake G, Hanaoka G, Ogawa K (2010) Efficient broadcast encryption with personalized messages. In: International conference on provable security. Springer, pp 214–228
Zurück zum Zitat Phuong TVX, Yang G, Susilo W, Chen X (2015) Attribute based broadcast encryption with short ciphertext and decryption key, pp 252–269 Phuong TVX, Yang G, Susilo W, Chen X (2015) Attribute based broadcast encryption with short ciphertext and decryption key, pp 252–269
Zurück zum Zitat Sabitha S, Rajasree MS (2020) Multi-level on-demand access control for flexible data sharing in cloud. Clust Comput 0123456789 Sabitha S, Rajasree MS (2020) Multi-level on-demand access control for flexible data sharing in cloud. Clust Comput 0123456789
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005. Springer, Berlin, Heidelberg, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in cryptology—EUROCRYPT 2005. Springer, Berlin, Heidelberg, pp 457–473
Zurück zum Zitat Singh D, Ranvijay YR (2018) A state-of-art approach to misbehaviour detection and revocation in vanet: survey. Int J Ad Hoc and Ubiquit Comput 28(2):77–93 Singh D, Ranvijay YR (2018) A state-of-art approach to misbehaviour detection and revocation in vanet: survey. Int J Ad Hoc and Ubiquit Comput 28(2):77–93
Zurück zum Zitat Sohal M, Bharany S, Sharma S, Maashi MS, Aljebreen M (2022) A hybrid multi-cloud framework using the IBBE key management system for securing data storage. Sustainability 14(20):13561 Sohal M, Bharany S, Sharma S, Maashi MS, Aljebreen M (2022) A hybrid multi-cloud framework using the IBBE key management system for securing data storage. Sustainability 14(20):13561
Zurück zum Zitat Verma E, Abraham J, Yadav S (2009) Design of energy efficient scheme for conducting secure e-class application on manet. In: 2009 first international conference on computational intelligence, communication systems and networks. IEEE, pp 464–469 Verma E, Abraham J, Yadav S (2009) Design of energy efficient scheme for conducting secure e-class application on manet. In: 2009 first international conference on computational intelligence, communication systems and networks. IEEE, pp 464–469
Zurück zum Zitat Vijayakumar P, Chang V, Deborah LJ, Balusamy B, Shynu P (2018) Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Fut Gen Comput Syst 78:943–955CrossRef Vijayakumar P, Chang V, Deborah LJ, Balusamy B, Shynu P (2018) Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Fut Gen Comput Syst 78:943–955CrossRef
Zurück zum Zitat Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B (2017) Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust Computi 20(3):2439–2450 Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B (2017) Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust Computi 20(3):2439–2450
Zurück zum Zitat Wang H, Zhang Y, Chen K, Sui G, Zhao Y, Huang X (2019) Functional broadcast encryption with applications to data sharing for cloud storage. Inform Sci 502:109–124CrossRef Wang H, Zhang Y, Chen K, Sui G, Zhao Y, Huang X (2019) Functional broadcast encryption with applications to data sharing for cloud storage. Inform Sci 502:109–124CrossRef
Zurück zum Zitat Yadav S (2020) An efficient affinity propagation clustering technique. Int J Adv Sci Technol 29(04):9555–9573 Yadav S (2020) An efficient affinity propagation clustering technique. Int J Adv Sci Technol 29(04):9555–9573
Zurück zum Zitat Yadav S, Tiwari N (2020) Recent advancements in chaos-based image encryption techniques: a review. In: Social networking and computational intelligence: proceedings of SCI-2018, pp 639–647 Yadav S, Tiwari N (2020) Recent advancements in chaos-based image encryption techniques: a review. In: Social networking and computational intelligence: proceedings of SCI-2018, pp 639–647
Zurück zum Zitat Yadav S, Tiwari N (2022) An efficient and secure data sharing method using asymmetric pairing with shorter ciphertext to enable rapid learning in healthcare. Comput Intell Neurosci 2022 (2022) Yadav S, Tiwari N (2022) An efficient and secure data sharing method using asymmetric pairing with shorter ciphertext to enable rapid learning in healthcare. Comput Intell Neurosci 2022 (2022)
Zurück zum Zitat Yadav S, Tiwari N (2023) Privacy preserving data sharing method for social media platforms. PloS One (181):0280182 Yadav S, Tiwari N (2023) Privacy preserving data sharing method for social media platforms. PloS One (181):0280182
Zurück zum Zitat Yadav S, Tiwari N (2023) Secure and efficient online data sharing scheme using broadcast encryption with personalised message system Yadav S, Tiwari N (2023) Secure and efficient online data sharing scheme using broadcast encryption with personalised message system
Zurück zum Zitat Yao S, Zhang D (2023) Bprt: a blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages. Trans Emerg Telecommun Technol 34(1):4675 Yao S, Zhang D (2023) Bprt: a blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages. Trans Emerg Telecommun Technol 34(1):4675
Zurück zum Zitat Zhang L (2019) Key management scheme for secure channel establishment in fog computing. IEEE Trans Cloud Comput 9(3):1117–1128CrossRef Zhang L (2019) Key management scheme for secure channel establishment in fog computing. IEEE Trans Cloud Comput 9(3):1117–1128CrossRef
Metadaten
Titel
A Sustainable Blockchain and Asymmetric Broadcast Encryption-Based Secure E-Healthcare System
verfasst von
Snehlata Yadav
Vivek Yadav
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0088-2_4