Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof
Abstract
:1. Introduction
- (1)
- We implement a healthcare zero-knowledge identity authentication system called Health-zkIDM, which consists of four entities, namely the user of the system, healthcare provider, blockchain, and trusted third party. The user, who accesses the proposed system, is a collection of patients and healthcare providers. The user can generate identity proof information and upload it to the blockchain. Healthcare providers can verify the user’s identity by querying the blockchain for information. The trusted third party will establish the blockchain, deploy the chaincode, and provide the trusted setup for ZKP;
- (2)
- We add the zk-SNARK, a ZKP algorithm, to the Health-zkIDM system for generating the user’s identity proof information and for verifying the proof information stored in the blockchain. The real information of users is not involved in blockchain, which ensures the security of users’ privacy;
- (3)
- Health-zkIDM is implemented on the Fabric [15] consortium blockchain. The chaincode is deployed on the Fabric and is used to upload and verify the user’s identity information. The invocation of the chaincode is triggered by any healthcare provider when verifying a user’s identity;
- (4)
- We test the performance of the Health-zkIDM system using Caliper [16]. The results show that our system can reach a throughput of over 400 TPS.
2. Related Work
3. Methodology
3.1. Review
3.1.1. Blockchain and Smart Contracts
3.1.2. Cryptographic Commitment and Zero-Knowledge Proofs
- (1)
- Hiding. Commitment value will not reveal any information about the secret value of any information.
- (2)
- Binding. Given a secret value and calculating its commitment value , it is impossible to exist a commitment value corresponding to another secret value equal to commitment . This property ensures that different secrets cannot generate the same commitment.
- (1)
- Initialization. , where is the cyclic group of the generating elements.
- (2)
- Calculation of commitment. .
- (1)
- Completeness. Knowing the validity of the witness statement, the testifier can convince the verifier.
- (2)
- Reliability. A malicious prover cannot convince the verifier if the statement is false.
- (3)
- Zero-knowledge. The verifier only knows that the statement is correct and does not know the specifics of the statement.
- (1)
- The trusted third party generates a specific domain-specific language (DSL) code in a readable manner, and the code can be compiled to generate a circuit file .
- (2)
- The circuit file is converted into a constrained circuit described by the Rank 1 Constraint System (R1CS) [46], which is compatible with the zk-SNARK, where constraint circuit is an abstraction of the circuit.
- (3)
- As with other zk-SNARK algorithms, go-snark performs a setup phase to share a common reference string (CRS), which generates two keys, including a proof key and a verification key .
- (4)
- Before generating a zk-SNARK proof, the verified program needs to provide the generator with the primary input and auxiliary inputs to compute the witness for zk-SNARK that satisfies the constraints.
- (5)
- The proof of zk-SNARK is computed based on the witness and proof key .
- (6)
- The proof combined with the primary input can be verified by the verification key . The returned authentication result will participate in the system’s identity management.
3.2. Architecture and Main Procedures
3.2.1. Program Overview
3.2.2. Entities
- User: A user who accesses the proposed system can be a patient or a healthcare provider. As the owner of the identity information, the user can conduct the trusted setup of zk-SNARK through the client and upload the generated identity proof information to the system. Each user has a unique ID that represents the user’s digital identity. The user can use the ID to view the information on the blockchain.
- Healthcare Providers: Healthcare providers are responsible for verifying the identity of patients. When a patient visits a healthcare facility, the healthcare provider can verify the patient’s identity by viewing the data on the blockchain. Since the on-chain data is not related to patient privacy, untrustworthy healthcare providers cannot reveal the patient’s identity.
- Blockchain and Smart Contracts: The consortium blockchain is used to provide a secure distributed management service for the user’s identification information. Blockchain platforms should support Fabric chaincode. Healthcare providers become verifiers by invoking the chaincode.
- The trusted third party: The establishment and supervision of the entire system are led by the trusted third party. A trusted third party is required to provide management, authorization, and supervision to each system participant during system operation, such as public security, government, medical regulatory agencies, etc. In addition, the trusted third-party organization is responsible for the trusted settings of the client and zk-SNARK, along with the user.
3.2.3. Existing Authentication Models
3.2.4. Improved Authentication System
- Deploy chaincode: Trusted third-party organizations implement chaincode through the client and deploy it to Fabric’s peer nodes.
- Initialization: The user inputs the polynomial constraint part of the coefficients through the client SDK, and the other part of the coefficients are randomly generated by the client to design the corresponding constraint circuit based on the circuit satisfiability problem. The constraint circuit is described in detail in the function CircuitConstraintSetup. The user inputs the primary input, , auxiliary input, , obtains the primary input file, and witnesses by computation. Further, the user uses the function TrustedSetup to generate the trusted setup file , which contains the proof key and the verification key . With the function GenerateProofs, the proof file can be generated using the and . Since the primary input file, trusted setup file, and proof file do not contain privacy, they can be packaged and uploaded to the Fabric as public data.
- User registration: The user generates a unique ID through the App, and the unique ID is the user’s digital identity. Function RegisterIdentity describes the user registration process in detail. When uploading data, the blockchain automatically runs the chaincode to check the legitimacy and correctness of the proof information.
3.2.5. Comparison
3.2.6. Algorithms
Algorithm 1 Zero-knowledge proof function |
1: function CircuitConstraintSetup (,) 2: Generate a polynomial , where two coefficients are , and the remaining coefficients are randomly generated by the client. 3: circuit file ←. {Write polynomial into the circuit file in Golang language} 4: According to the circuit file , circuit is generated by a circuit language called R1CS. 5: return 6: function TrustedSetup () 7: . {call the go-snark’s function to generate three vectors } 8: . where is a trusted setup file, is a proving key, and is a verification key. {call the go-snark’s function to generate keys for proof and verification} 9: return . 10: function GenerateProofs () 11: Set , where is witness, calculate by the user’s primary input and the user’s auxiliary input . 12: (). {call the go-snark’s function to generate proofs for prover} 13: return 14: function () 15: {call the go-snark’s function to verify} 16: if verified = true then 17: return 1. 18: else 19: return 0. 20: end if |
Algorithm 2 Chaincode function |
1: function RegisterIdentity () 2: if id exist then 3: return 0. 4: else 5: where is the user’s ID 6: return 1. 7: end if 8: function ModifyIdentity() 9: if exist then 10: 11: 12: return 1. 13: else 14: return 0. 15: end if 16: function QueryIdentity() 17: if exist then 18: 19: return . 20: else 21: return 0. 22: end if 23: function RevokeIdentity() 24: if exist then 25: 26: return 1. 27: else 28: return 0. 29: end if |
4. Evaluation and Analysis
4.1. Use Cases
4.2. Performance Analysis
4.2.1. Storage and Time Consumption
4.2.2. Throughput
4.3. Security Analysis
4.3.1. Security of the Bottom Layer
4.3.2. Security of the Application Layer
- Healthcare providers can verify the identity of users without obtaining their privacy.
- Any attacker cannot obtain the user’s privacy by analyzing the interaction between the user and the healthcare provider.
- The user’s proof information encrypted with zero-knowledge proof is stored on the blockchain and cannot be revealed. It is done so that no local computer, blockchain, healthcare provider, or trusted third party can directly view the user’s privacy. Patients have absolute control over their identity information, and only the actor who grants permission can verify the patient. Therefore, the system protects the privacy and security of users.
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Dunphy, P.; Petitcolas, F.A.P. A first look at identity management schemes on the blockchain. IEEE Secur. Priv. 2018, 16, 20–29. [Google Scholar] [CrossRef] [Green Version]
- AlpAlpárr, G.; Hoepman, J.H.; Siljee, J. The Identity Crisis Security, Privacy and Usability Issues in Identity Management. J. Inf. Syst. Secur. 2013, 9, 23–232. [Google Scholar]
- Gaetani, E.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. Blockchain-based database to ensure data integrity in cloud computing environments. In Proceedings of the Italian Conference on Cybersecurity, Venice, Italy, 17–20 January 2017. [Google Scholar]
- Attaran, M. Blockchain technology in healthcare: Challenges and opportunities. Int. J. Healthc. Manag. 2022, 15, 70–83. [Google Scholar] [CrossRef]
- Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y. Blockchain for healthcare data management: Opportunities, challenges, and future recommendations. Neural Comput. Appl. 2022, 34, 11475–11490. [Google Scholar] [CrossRef]
- Javed, I.T.; Copeland, R.; Crespi, N.; Emmelmann, M.; Corici, A.; Bouabdallah, A.; Zhang, T.; el Jaouhari, S.; Beierle, F.; Göndör, S.; et al. Cross-domain identity and discovery framework for web calling services. Ann. Telecommun. 2017, 72, 459–468. [Google Scholar] [CrossRef]
- Efanov, D.; Roschin, P. The all-pervasiveness of the blockchain technology. Procedia Comput. Sci. 2018, 123, 116–121. [Google Scholar] [CrossRef]
- Javed, I.T.; Alharbi, F.; Margaria, T.; Crespi, N.; Qureshi, K.N. PETchain: A blockchain-based privacy enhancing technology. IEEE Access 2021, 9, 41129–41143. [Google Scholar] [CrossRef]
- Alamri, B.; Javed, I.T.; Margaria, T. Preserving patients’ privacy in medical IoT using blockchain. In Edge Computing—EDGE 2020, Proceedings of the International Conference on Edge Computing, Beijing, China, 19–23 October 2020; Springer: Cham, Switzerland, 2020; pp. 103–110. [Google Scholar]
- Alamri, B.; Javed, I.T.; Margaria, T. A GDPR-compliant framework for IoT-based personal health records using blockchain. In Proceedings of the 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–5. [Google Scholar]
- Yang, X.; Li, W. A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput. Secur. 2020, 99, 102050. [Google Scholar] [CrossRef]
- Antwi, M.S.; Adnane, A.; Ahmad, F.; Hussain, R.; Rehman, M.H.u.; Kerrache, C.A. The case of hyperledger fabric as a blockchain solution for healthcare applications. Blockchain: Res. Appl. 2021, 2, 100012. [Google Scholar] [CrossRef]
- Dwivedi, A.D.; Singh, R.; Ghosh, U.; Mukkamala, R.R.; Tolba, A.; Said, O. Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things. J. Ambient. Intell. Humaniz. Comput. 2022, 13, 4639–4649. [Google Scholar] [CrossRef]
- Beduschi, A. Rethinking digital identity for post-COVID-19 societies: Data privacy and human rights considerations. Data Policy 2021, 3, e15. [Google Scholar] [CrossRef]
- Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; de Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
- Hyperledger Calipar. Available online: https://github.com/hyperledger/caliper (accessed on 19 June 2022).
- Mell, P.; Dray, J.; Shook, J. Smart contract federated identity management without third party authentication services. arXiv 2019, arXiv:physics/0402096. Available online: http://arxiv.org/abs/physics/1906.11057 (accessed on 15 May 2022).
- Shuaib, M.; Alam, S.; Alam, M.S.; Nasir, M.S. Self-sovereign identity for healthcare using blockchain. Mater. Today Proc. 2021; in press. [Google Scholar] [CrossRef]
- Windley, P.; Sovrin, R.D. A Protocol and Token for Self-Sovereign Identity and Decentralized Trust; Sovrin Foundation: Provo, UT, USA, 2018. [Google Scholar]
- Tobin, A.; Reed, D. The Inevitable Rise of Self-Sovereign Identity; The Sovrin Foundation: Provo, UT, USA, 2016. [Google Scholar]
- Lundkvist, C.; Heck, R.; Torstensson, J.; Mitton, Z.; Sena, M. Uport: A Platform for Self-Sovereign Identity. 2017. Available online: https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf (accessed on 22 May 2022).
- Ali, M.; Nelson, J.; Shea, R.; Freedman, M.J. Blockstack: A global naming and storage system secured by blockchains. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC 16), Denver, CO, USA, 22–24 June 2016; pp. 181–194. [Google Scholar]
- Liu, Y.; He, D.; Obaidat, M.S.; Kumar, N.; Khan, M.K.; Choo, K.R. Blockchain-based identity management systems: A review. J. Netw. Comput. Appl. 2020, 166, 102731. [Google Scholar] [CrossRef]
- ShoCard. The premier blockchain-based mobile identity platform. Available online: https://shocard.com.html (accessed on 23 May 2022).
- Kuperberg, M. Blockchain-based identity management: A survey from the enterprise and ecosystem perspective. IEEE Trans. Eng. Manag. 2019, 67, 1008–1027. [Google Scholar] [CrossRef]
- Sousa, P.R.; Resende, J.S.; Martins, R.; Antunes, L. The case for blockchain in IoT identity management. J. Enterp. Inf. Manag. 2020. [Google Scholar] [CrossRef]
- Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. MedRec: Using blockchain for medical data access and permission management. In Proceedings of the 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016; pp. 25–30. [Google Scholar]
- Xu, J.; Xue, K.; Li, S.; Tian, H.; Hong, J.; Hong, P.; Yu, N. Healthchain: A blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J. 2019, 6, 8770–8781. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Srivastava, G.; Parizi, R.M.; Dehghantanha, A.; Choo, K.R.; Aledhari, M. Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE J. Biomed. Health Inform. 2020, 24, 2146–2156. [Google Scholar] [CrossRef]
- Jabbar, R.; Fetais, N.; Krichen, M.; Barkaoui, K. Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity. In Proceedings of the IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, 2–5 February 2020; pp. 310–317. [Google Scholar]
- Abbas, A.; Alroobaea, R.; Krichen, M.; Rubaiee, S.; Vimal, S.; Almansour, F.M. Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers. Ubiquitous Comput. 2021, 1–14. [Google Scholar] [CrossRef]
- Wang, Q.; Qin, S. A Hyperledger Fabric-Based System Framework for Healthcare Data Management. Appl. Sci. 2021, 11, 11693. [Google Scholar] [CrossRef]
- Javed, I.T.; Alharbi, F.; Bellaj, B.; Margaria, T.; Crespi, N.; Qureshi, K.N. Health-ID: A blockchain-based decentralized identity management for remote healthcare. Healthcare 2021, 9, 712. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 4, 21260. [Google Scholar]
- Bünz, B.; Bootle, J.; Boneh, D.; Poelstra, A.; Wuille, P.; Maxwell, G. Bulletproofs: Short proofs for confidential transactions and more. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 315–334. [Google Scholar]
- Feige, U.; Fiat, A.; Shamir, A. Zero-knowledge proofs of identity. J. Cryptol. 1988, 1, 77–94. [Google Scholar] [CrossRef]
- Camenisch, J.; Chaabouni, R. Efficient protocols for set membership and range proofs. In Advances in Cryptology—ASIACRYPT 2008, Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 6–10 December 2021; Springer: Berlin/Heidelberg, Germany, 2008; pp. 234–252. [Google Scholar]
- Ben-Sasson, E.; Chiesa, A.; Tromer, E.; Virza, M. Succinct {Non-Interactive} Zero Knowledge for a von Neumann Architecture. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA, 20–22 August 2014; pp. 781–796. [Google Scholar]
- Giacomelli, I.; Madsen, J.; Orlandi, C. {ZKBoo}: Faster {Zero-Knowledge} for Boolean Circuits. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 1069–1083. [Google Scholar]
- Ben-Sasson, E.; Bentov, I.; Horesh, Y.; Riabzev, M. Scalable, transparent, and post-quantum secure computational integrity. Cryptol. Eprint Arch. 2018. Available online: https://eprint.iacr.org/2018/046 (accessed on 22 December 2021).
- Miers, I.; Garman, C.; Green, M.; Rubin, A.D. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; pp. 397–411. [Google Scholar]
- Sasson, E.B.; Chiesa, A.; Garman, C.; Green, M.; Miers, I.; Tromer, E.; Virza, M. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014; pp. 459–474. [Google Scholar]
- Pauwels, P. zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs. Cryptol. Eprint Arch. 2021. Available online: https://eprint.iacr.org/2021/907 (accessed on 22 April 2022).
- Mundele, B.; Han, C. Polynomial Commitment-Based Zero-Knowledge Proof Schemes: A Brief Review. AIJR Prepr. 2022. [Google Scholar] [CrossRef]
- Groth, J. On the size of pairing-based non-interactive argument. In Advances in Cryptology—EUROCRYPT 2016, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 17–21 October 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 305–326. [Google Scholar]
- Ben-Sasson, E.; Chiesa, A.; Riabzev, M.; Spooner, N.; Virza, M.; Ward, N.P. Aurora: Transparent succinct arguments for R1CS. In Advances in Cryptology—EUROCRYPT 2019, Proceedings of the Annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, 19–23 May 2019; Springer: Cham, Switzerland, 2019; pp. 103–128. [Google Scholar]
- Wan, Z.; Zhou, Y.; Ren, K. zk-AuthFeed: Protecting data feed to smart contracts with authenticated zero knowledge proof. IEEE Trans. Dependable Secur. Comput. 2022. [Google Scholar] [CrossRef]
- Stamatellis, C.; Papadopoulos, P.; Pitropakis, N.; Katsikas, S.; Buchanan, W.J. A privacy-preserving healthcare framework using hyperledger fabric. Sensors 2020, 20, 6587. [Google Scholar] [CrossRef]
- Han, Y.; Chen, H.; Qiu, Z.; Luo, L.; Qian, G. A Complete Privacy-Preserving Credit Score System Using Blockchain and Zero Knowledge Proof. In Proceedings of the IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 3629–3636. [Google Scholar]
- Li, W.; Guo, H.; Nejad, M.; Shen, C.-C. Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach. IEEE Access 2020, 8, 181733–181743. [Google Scholar] [CrossRef]
Ref | Technology | Solution | ZKP | Healthcare Scenarios | Identity Authentication | The Main Contributions |
---|---|---|---|---|---|---|
[19,20] | Hyperledger Indy | Sovrin | √ | × | √ | Create self-sovereign identities |
[23,24] | Bitcoin | ShoCard | × | × | √ | Provide a trusted authentication |
[27] | Ethereum | MedRec | × | √ | √ | Manage medical records |
[28] | Public blockchain & IoT | HealthChain | × | √ | × | Remotely monitor and share health data |
[29] | Public blockchain | - | × | √ | √ | Provides a decentralized authentication method |
[30] | Ethereum | BiiMED | × | √ | × | Secure sharing of EHR |
[31] | Public blockchain & IoMT | BSDMF | × | √ | × | Provide secure data management |
[32] | Hyperledger Fabric | - | × | √ | × | Strengthen privacy protection in data sharing |
[33] | Ethereum | Health-ID | × | √ | √ | Security management of identity information |
Our work | Hyperledger Fabric | Health-zkIDM | √ | √ | √ | Provides a secure IDM in healthcare scenarios |
Deployment | Step 1 | Deploy smart contract |
Step 2 | Uploads public key | |
Registration | Step 3 | Send the registered ID |
Step 4 | Request public key | |
Step 5 | Send challenge message | |
Step 6 | Response to the challenge | |
Step 7 | Response whether the registration was successful | |
Verification | Step 8 | Send the registered ID |
Step 9 | Request public key | |
Step 10 | Challenge and verify |
Comparison | Number of Interactions between Users and Third Parties | Number of Interactions between Users and Healthcare Providers | Storage and Authentication of Public and Private Keys | ZKP | Time of Interaction | Security of the Interaction Process |
---|---|---|---|---|---|---|
Existing models | 4 | 4 | √ | × | Long | Normal |
Improved models | 0 | 2 | × | √ | Short | Strong |
TrustedSetup Time | GenerateProofs Time | Verify Time | Total |
---|---|---|---|
711.0457 ms | 285.2845 ms | 2.1122 s | 3.1685 s |
Input | TrustedSetup | GenerateProofs | |
---|---|---|---|
Primary | Auxiliary | ||
10 | 5 | 25,160 | 962 |
Name | Succ | Fail | Send Rate | Max Latency (s) | Min Latency (s) | Avg Latency (s) | Throughput (TPS) |
---|---|---|---|---|---|---|---|
Register identity. | 20,000 | 0 | 481.8 | 2.68 | 0.05 | 1.07 | 463.0 |
Modify identity. | 20,000 | 0 | 468.4 | 2.68 | 0.07 | 1.11 | 451.5 |
Query identity. | 20,000 | 0 | 496.9 | 2.57 | 0.10 | 1.04 | 477.3 |
Revoke identity. | 20,000 | 0 | 490.8 | 2.67 | 0.02 | 1.09 | 471.4 |
Name | Succ | Fail | Send Rate | Max Latency (s) | Min Latency (s) | Avg Latency (s) | Throughput (TPS) |
---|---|---|---|---|---|---|---|
Register identity. | 20,000 | 0 | 344.7 | 2.94 | 0.02 | 1.29 | 322.5 |
Modify identity. | 20,000 | 0 | 352.4 | 2.89 | 0.04 | 1.27 | 330.4 |
Query identity. | 20,000 | 0 | 367.1 | 2.61 | 0.03 | 1.25 | 345.0 |
Revoke identity. | 20,000 | 0 | 368.6 | 2.88 | 0.02 | 1.26 | 343.6 |
Security Constraint | Condition | Purpose |
---|---|---|
Zero-knowledge security | Appropriate bilinear groups should be chosen. | Prevents the input used to generate the proof from being revealed. |
Anti-Replay Attack | Used proofs should not be validly validated. | Prevents attackers from replay proofs to access healthcare organizations and enjoy services. |
Special computational security | The trusted setup phase, performed by a trusted third party and the user, needs to be verified correctly. | Prevent attackers from revealing zero knowledge by attacking either party to obtain constrained information. |
User privacy protection | When the identity is verified, the user does not have to present the real identity information. | Prevent the user’s identity information from being exposed to attackers. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bai, T.; Hu, Y.; He, J.; Fan, H.; An, Z. Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof. Sensors 2022, 22, 7716. https://doi.org/10.3390/s22207716
Bai T, Hu Y, He J, Fan H, An Z. Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof. Sensors. 2022; 22(20):7716. https://doi.org/10.3390/s22207716
Chicago/Turabian StyleBai, Tianyu, Yangsheng Hu, Jianfeng He, Hongbo Fan, and Zhenzhou An. 2022. "Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof" Sensors 22, no. 20: 7716. https://doi.org/10.3390/s22207716
APA StyleBai, T., Hu, Y., He, J., Fan, H., & An, Z. (2022). Health-zkIDM: A Healthcare Identity System Based on Fabric Blockchain and Zero-Knowledge Proof. Sensors, 22(20), 7716. https://doi.org/10.3390/s22207716