Research Article
Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks
Algorithm 1
Shared Storage of PHI Data.
1: Procedure : | |
2: Trapdoor Function: (parent keys)trapdoor permutation function e.g. RSA, Rabin | |
3: | |
4:party has parent keys | |
5: | |
6: | |
7: | |
8: | |
9: | |
10: The sender creates a group of ring signature: | |
11: Procedure use public key of the parties as an input | |
12: Create RS: | |
13: | |
14: AddNewMembers:in case: add new members | |
15: | |
16: end procedure | |
17: Procedure the recipient creates stealth address | |
18: | |
19: | |
20:sender creates new OTP for recipient | |
21: end procedure | |
22: Procedure confidential ring signature as an option | |
23:True | |
24: | |
25: | |
26: False | |
27: end procedure | |
28: Procedure in this case, the PHI data is from the hospital | |
29: | |
30: | |
31: | |
32:KeyImage: to prevent storing the same data | |
33: | |
34: end procedure | |
35: Procedure | |
36: | |
37: | |
38: | |
39: Truetransaction is success | |
40: | |
41: | |
42: False | |
43: End |