The issue of identity authentication for online medical services has been one of the key focuses of the healthcare industry in recent years. Most healthcare organizations use centralized identity management systems (IDMs), which not only limit the interoperability of patient identities between institutions of healthcare, but also create isolation between data islands. The more important matter is that centralized IDMs may lead to privacy disclosure. Therefore, we propose Health-zkIDM, a decentralized identity authentication system based on zero-knowledge proof and blockchain technology, which allows patients to identify and verify their identities transparently and safely in different health fields and promotes the interaction between IDM providers and patients. The users in Health-zkIDM are uniquely identified by one ID registered. The zero-knowledge proof technology is deployed on the client, which provides the user with a proof of identity information and automatically verifies the user's identity after registration. We implemented chaincodes on the Fabric, including the upload of proof of identity information, identification, and verification functions. The experiences show that the performance of the Health-zkIDM system can achieve throughputs higher than 400 TPS in Caliper.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9608194 | PMC |
http://dx.doi.org/10.3390/s22207716 | DOI Listing |
Blockchain Healthc Today
August 2024
Chief Medical Officer, GuardianMedx, Las Vegas, Nevada.
Web 3.0 represents the next significant evolution of the internet that embodies the underlying decentralized network architectures, distributed ledgers, and advanced AI capabilities. Though the technologies are maturing rapidly, considerable barriers exist to high-scale adoption.
View Article and Find Full Text PDFSci Rep
November 2024
Centre for Advances in Reliability and Safety (CAiRS), Hong Kong, China.
Decentralized Federated Learning improves data privacy and eliminates single points of failure by removing reliance on centralized storage and model aggregation in distributed computing systems. Ensuring the integrity of computations during local model training is a significant challenge, especially before sharing gradient updates from each local client. Current methods for ensuring computation integrity often involve patching local models to implement cryptographic techniques, such as Zero-Knowledge Proofs.
View Article and Find Full Text PDFPeerJ Comput Sci
September 2024
Dalian Minzu University, College of Computer Science and Engineering, Dalian, Liaoning, China.
Sensors (Basel)
September 2024
Infili Technologies, 15572 Athens, Greece.
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains.
View Article and Find Full Text PDFInt J Inf Secur
September 2023
Universitat Pompeu Fabra, Barcelona, Spain.
Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are the most efficient proof systems in terms of proof size and verification. Currently, Groth's scheme from EUROCRYPT 2016, , is the state-of-the-art and is widely deployed in practice. is originally proven to achieve knowledge soundness, which does not guarantee the non-malleability of proofs.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!