Research Article
Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models
Algorithm 2
Pseudocode of attribute-based multisignature scheme.
| (1) | Estimate e = HASH (m), where HASH is a cryptographic hash function like SHA-1 | | (2) | Let Z be the Ln leftmost bits of e, where Ln is the bit length of the group order n | | (3) | Choose a random integer k from [1, n − 1] | | (4) | Compute the curve point (x1, y1) = | | (5) | Compute r = x1 (mod n). If r = 0, go back to step 3 | | (6) | Compute s = k − 1 (Z + rdA) (mod n). If s = 0, go back to step 3 | | (7) | The signature is the pair (r, s) |
|