2021
DOI: 10.1007/978-3-662-63958-0_34
|View full text |Cite
|
Sign up to set email alerts
|

Reactive Key-Loss Protection in Blockchains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Users who can directly generate the encryption key that they use for EMR sharing can generate an encryption key each time an EMR is created, thus protecting the EMR with a different key each time. Because of the nature of an EMR that has been used for a long time, the encryption key must be maintained as is when data are encrypted [ 62 ]. However, this introduces security vulnerabilities, endangering EMR and patient privacy.…”
Section: Methodsmentioning
confidence: 99%
“…Users who can directly generate the encryption key that they use for EMR sharing can generate an encryption key each time an EMR is created, thus protecting the EMR with a different key each time. Because of the nature of an EMR that has been used for a long time, the encryption key must be maintained as is when data are encrypted [ 62 ]. However, this introduces security vulnerabilities, endangering EMR and patient privacy.…”
Section: Methodsmentioning
confidence: 99%
“…An NFT system is an assembly technology with a blend of blockchain, storage, and web applications (Blackshear et al, 2021). The system is vulnerable to the properties of each component; thus, vulnerability of one component may make the whole system vulnerable to attackers (Chohan, 2021).…”
Section: Security Issuesmentioning
confidence: 99%