uses his nonce key kbto calculate Equation (17). It
doesn’t matter which side is liar. If someone cheats to
another ones, this scheme will fail to stop; else it is a
contradiction. The Lemma 2 and Lemma 3 gave good
provable security.
Scenario 4: We did not assume while health bureau be
hacked this situation. If health bureau honest, he would
use his semi key kdto compute Equation (15) and (16)
before send back to hospital; if Equation (25) is hold
Chka
?
≡ySawa
a·Sawxc
c(mod p1),(25)
otherwise that is contradiction.
In summary, this study contributes to the current
knowledge by offering an innovative method of secured
data transmission based on the features of blockchain
technology. Their adaption in encryption and decryption
can enable a dynamic authentication mechanism for
each receiver for better outcomes both on security and
efficiency. Further application in different areas and how
to scale up its employment can be considered in future
work.
The authors would like to thank the anonymous re-
viewers for their useful comments. This work is partially
supported from university project under the number
NUIT2020-001. This work also partially supported by
Guandong province special funds to foster the student’s
science and technology innovation under the number
PDJH2020B0689 (Climbing program funds).
[1] X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare
data gateways: Found healthcare intelligence on blockchain with
novel privacy risk control,” Journal of Medical Systems, vol. 40,
no. 10, pp. 218:1–8, October 2016.
[2] C. C. Agbo, Q. H. Mahmoud, and J. M. Eklund, “Blockchain
technology in healthcare: A systematic review,” Healthcare,
vol. 7, no. 2, p. 56, 2019.
[3] S. Khezr, M. Moniruzzaman, A. Yassine, and R. Benlamri,
“Blockchain technology in healthcare: A comprehensive review
and directions for future research,” Applied Sciences, vol. 9,
no. 9, p. 1736, 2019.
[4] A. Hasselgren, K. Kralevska, D. Gligoroski, S. A. Pedersen, and
A. Faxvaag, “Blockchain in healthcare and health sciences–a
scoping review,” International Journal of Medical Informatics,
vol. 134, p. 104040, 2020.
[5] H. M. Hussien, S. M. Yasin, N. I. Udzir, M. I. H. Ninggal, and
S. Salman, “Blockchain technology in the healthcare industry:
Trends and opportunities,” Journal of Industrial Information
Integration, vol. 22, p. 100217, June 2021.
[6] C.-M. F. Chiang, “Medical research and personal-data
protection–take Japanese epidemiology research as the basis,”
Technology Law Review, vol. 10, no. 1, pp. 61–113, 2013.
[7] S. Park, G. J. Choi, and H. Ko, “Information technology-based
tracing strategy in response to COVID-19 in South Korea-
privacy controversies,” JAMA, vol. 323, no. 21, pp. 2129–2130,
June 2020.
[8] D. Bouslimi and G. Coatrieux, “A crypto-watermarking system
for ensuring reliability control and traceability of medical
images,” Signal Processing: Image Communication, vol. 47, pp.
160–169, September 2016.
[9] M. K. Abdmouleh, A. Khalfallah, and M. S. Bouhlel, “A novel
selective encryption scheme for medical images transmission
based-on JPEG compression algorithm,” Procedia Computer
Science, vol. 112, pp. 369–376, 2017.
[10] N. Zermi, A. Khaldi, K. Redouane, K. Fares, and E. Salah,
“A DWT-SVD based robust digital watermarking for medical
image security,” Forensic Science International, vol. 320, p.
110691, 2021.
[11] A. Anand and A. K. Singh, “An improved DWT-SVD do-
main watermarking for medical information security,” Computer
Communications, vol. 152, pp. 72–80, February 2020.
[12] J. Fang, C. Liu, and S. C.-I. Chen, “Toward security and confi-
dentiality in personal health records via blockchain technology,”
Basic and Clinical Pharmacology and Toxicology, vol. 126,
no. S5, p. 10, April 2020.
[13] C. Liu, J. Fang, S. C.-I. Chen, and D. Gardner, “Study of
anonymous complaint system based on patient-doctor and hos-
pital tripartite scheme,” Basic and Clinical Pharmacology and
Toxicology, vol. 126, no. S5, pp. 11–12, April 2020.
[14] J. Wu and C. Liu, “A study of anonymous delivery based on
blind signature scheme,” Procedia Computer Science, vol. 52,
pp. 1065–1070, 2015.
[15] J. Wu, C. Liu, and D. Gardner, “A study of anonymous pur-
chasing based on mobile payment system,” Procedia Computer
Science, vol. 83, pp. 685–689, 2016.
[16] C. Zhang, Y.-Z. Luo, C. Liu, and B. Zhao, “A dynamic passcode
system for mobile purchasing without bank card,” in 2018 9th
International Symposium on Parallel Architectures, Algorithms
and Programming (PAAP), 2018, pp. 111–113.
[17] R. L. Rivest, A. Shamir, and L. Adleman, “A method for
obtaining digital signatures and public-key cryptosystems,”
Communications of the ACM, vol. 21, no. 2, pp. 120–126, Feb.
1978.
[18] T. ElGamal, “A public key cryptosystem and a signature scheme
based on discrete logarithms,” IEEE Transactions on Informa-
tion Theory, vol. 31, no. 4, pp. 469–472, 1985.
[19] Y. Lv, C. Liu, and T. Huang, “Research on the university library
anonymous customer complaint system based on blockchain
technology,” Design Engineering, no. 2, pp. 681–689, 2021.
[20] D. V. Dimitrov, “Blockchain applications for healthcare data
management,” Healthcare Informatics Research, vol. 25, no. 1,
pp. 51–56, 2019.
[21] D. Manset, L. Berna, M. Koscina, and O. P. Kempner,
“Blockchain and GDPR compliance for the healthcare indus-
try,” Health Management, vol. 19, no. 1, pp. 41–44, 2019.
[22] W. Feng, Y.-G. He, H.-M. Li, and C.-L. Li, “Image en-
cryption algorithm based on discrete logarithm and memris-
tive chaotic system,” The European Physical Journal Spe-
cial Topics, vol. 228, no. 10, pp. 1951–1967, October 2019,
10.1140/epjst/e2019-800209-3.
[23] C. KONOMA, M. MAMBO, and H. SHIZUYA, “Complex-
ity analysis of the cryptographic primitive problems through
square-root exponent,” IEICE TRANSACTIONS on Fundamen-
tals of Electronics, Communications and Computer Sciences,
vol. E87-A, no. 5, pp. 1083–1091, May 2004.
5. Conclusions
Acknowledgments
References
WSEAS TRANSACTIONS on ELECTRONICS
DOI: 10.37394/232017.2022.13.13
Chenglian Liu, Sonia Chien-I Chen