Research Article
Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models
Algorithm 2
Pseudocode of attribute-based multisignature scheme.
(1) | Estimate e = HASH (m), where HASH is a cryptographic hash function like SHA-1 | (2) | Let Z be the Ln leftmost bits of e, where Ln is the bit length of the group order n | (3) | Choose a random integer k from [1, n − 1] | (4) | Compute the curve point (x1, y1) = | (5) | Compute r = x1 (mod n). If r = 0, go back to step 3 | (6) | Compute s = k − 1 (Z + rdA) (mod n). If s = 0, go back to step 3 | (7) | The signature is the pair (r, s) |
|