Deniable Authentication Encryption for Privacy Protection using Blockchain
نویسندگان
چکیده
Cloud applications that work on medical data using blockchain is used by managers and doctors in order to get the image shared between various healthcare institutions. To ensure workability privacy of data, it important verify authenticity retrieve cypher encrypt plain data. An effective methodology use a public key authenticated encryption which ensures But, there are number such methodologies available have been formulated previously. However, drawback with those their inadequacy protecting In overcome these disadvantages, we propose searchable algorithm can be for sharing blockchain- based This provides traceability, unforgettable non-tampered blockhain technology, overcoming drawbacks as computing power storage. The proposed will also sustain keyword guessing attacks apart from verification protection Taking factors into consideration, determine much involved providing stronger security senders. meets requirement indistinguishability trapdoor ciphertext. highlights its capability improving performance system terms protection.
منابع مشابه
Privacy-Enhanced Deniable Authentication E-Mail Service
E-mail brings us lots of conveniences. Especially with help of PGP and S/MIME, it gives both confidentiality and message/origin authentication. However, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can r...
متن کاملDeniable Encryption
Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secret key, if one exists) used in generating the ciphertext, thereby exposing the cleartext. An encryption scheme is deniable if the sender can generate ‘fake random choices’ that will make the ciphertext ‘look like’ an encr...
متن کاملK-Anonymity Algorithm Using Encryption for Location Privacy Protection
In this paper, we solved a location privacy protection in location-based services (LBS) where the mobile user had to report her exact location information to an LBS provider for the purpose of obtaining her wished services. Location invisible had been well proposed and researched to defend user privacy. However, as the nature of the insecure wireless net environment the user’s location informat...
متن کاملStream Deniable-Encryption Algorithms
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher. One of the key streams is generated depending on the secret key and the other one is generated depending on the fake key. The key streams are mixed wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Artificial Intelligence and Copsule Networks
سال: 2021
ISSN: ['2582-2012']
DOI: https://doi.org/10.36548/jaicn.2021.3.008