×
The submission system is temporarily under maintenance. Please send your manuscripts to
Go to Editorial ManagerBecause elliptic curve cryptography offers a promising trade-off between security and computational performance, the field of current cryptographic techniques has taken a particular interest in it. Two basic digital signature algorithms—the Elliptic Curve Diffie-Hellman Algorithm (ECDH) and the Elliptic Curve Digital Signature Algorithm (ECDSA) are the subject of this performance analysis and comparison. These methods are based on elliptic curve cryptography. The analysis takes into consideration realistic application demands as well as factors like key length and security level. The results provide useful information on trade-offs between performance and security. A list of acceptable ECDSA requirements for digital signatures was used for the comparison. These characteristics are sign, sign/s, no PC verify, no PC verify/s, siglen, keygen, keygen/s, verify, and verify/s.
This work addresses the critical need for secure and patient-controlled Electronic Health Records (EHR) migration among healthcare hospitals’ cloud servers (HHS). The relevant approaches often lack robust access control and leave data vulnerable during transfer. Our proposed scheme empowers patients to delegate EHR migration to a trusted Third-Party Hospital (TTPH); which is the Certification Authority (CA) while enforcing access control. The system leverages asymmetric encryption utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA), EEC and ECDSA added robust security and lightness EHR sharing. Patient and user privacy is managed due to anonymity through cryptographic hashing for data protection and utilizes mutual authentication for secure communication. Formal security analysis using the Scyther tool and informal analysis was conducted to validate the system’s robustness. The proposed scheme achieved EHR integrity due to the verification of the communicated HHS and ensuring the integrity of the HHS digital certificate during EHR migration. Ultimately, the result achieved in the proposed work demonstrated the scheme’s high balance between data security and accuracy of communication, where the best result obtained represented 7.7/ ms as computational cost and 1248 /bits as communication cost compared with the relevant approaches.