Explore chapters and articles related to this topic
An Efficient Decentralized Medical Prescription Tracking Using Blockchain
Published in G. Rajesh, X. Mercilin Raajini, Hien Dang, Industry 4.0 Interoperability, Analytics, Security, and Case Studies, 2021
D.R. Anita Sofia Liz, M. Stefi Vinciya, H. Saagarika, A. Kapil Ramachandran
A private number has been generated for each user; the pharmacies can access the current prescribed medicine with the private number. The private number cannot be used by any other entities other than pharmacies. These private numbers are known to pharmacies and patients; using this the prescriptions are sent to the patients through their mail id. The secret key generation is mainly for security purposes. This phase is done by the doctor, after the doctor logged in using the doctor’s unique user id and password, he/she have an authority to add patient details such as name, age, date of birth, infection, blood pressure, patient’s prescription, and patient mail id. With this entered patient email id, the mail will be sent to the patient carrying a unique number which is also known as the private number. It is a onetime generation note for each patient, that is, the same key is not repeated for different users. Along with this key the doctor prescribed medication for the patient will be viewed. The pharmacist can only view this prescription; they are not allowed to delete or make any changes regarding medicine. As mentioned, this key is for security purposes, in such a way that using this key the pharmacist can view the entire prescription and the history of patient so that they are able to give the medicine. This may be achieved via implementing an answer like a zero-knowledge proof (Figure 13.7).
Introduction
Published in Borra Surekha, Thanki Rohit, Dey Nilanjan, Digital Image Watermarking, 2018
Borra Surekha, Thanki Rohit, Dey Nilanjan
The DRM aims to prevent unauthorized access, copying, and redistribution of digital media by encrypting the data and not making it directly accessible (Mohanty et al., 2017). The DRM can be referred to as the extension to digital media copyrighting, though both have different objectives and regula tions. The DRM recommends key-based encryption and watermarking algorithms, along with some security protocols for ensuring confidentiality, authentication, copy control, and data integrity. The key management plays a crucial role and has a challenging task in providing security as the working of algorithms is made open (Borda, 2005). Key generation, verification, secure storage and transfer, revocation, and key escrow are all part of key management. The usage of biometrics as secret keys helps in overcoming key exchange problems.
Implementing blockchain in information systems: a review
Published in Enterprise Information Systems, 2022
The digital signature is the digital simulation of a handwritten signature, which mainly includes three processes: key generation, signature, and signature verification. The public key and the private key are a key pair obtained through a key generation algorithm. The public key is the public part of the key pair, and the private key is the non-public part. The key generation algorithm ensures that it is difficult to calculate the private key using only the public key, thereby ensuring the security of the user’s private key. In blockchain, the public key is the account address. One user can have multiple public keys. Each public key is a random number and has nothing to do with the real identity of the user. Others cannot infer the real identity of the user through the public key. The verified information includes identity verification (sent by the owner of the public key), integrity (the information has not been edited by anyone and cannot be rejected), and ownership (the owner of the public key cannot refuse that the information has been sent) (Mendling et al. 2018; Kumar, Liu, and Shan 2020).