Research Article

Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks

Algorithm 1

Shared Storage of PHI Data.

1: Procedure  :
2: Trapdoor Function: (parent keys)trapdoor permutation function e.g. RSA, Rabin
3:
4:party has parent keys
5:
6:
7:
8:
9:
10: The sender creates a group of ring signature:
11: Procedure  use public key of the parties as an input
12: Create RS:
13:
14: AddNewMembers:in case: add new members
15:
16: end procedure
17: Procedure  the recipient creates stealth address
18:
19:
20:sender creates new OTP for recipient
21: end procedure
22: Procedure confidential ring signature as an option
23:True
24:
25:
26:  False
27: end procedure
28: Procedure  in this case, the PHI data is from the hospital
29:
30:
31:
32:KeyImage: to prevent storing the same data
33:
34: end procedure
35: Procedure
36:
37:
38:
39: Truetransaction is success
40:
41:
42:   False
43: End