The running time.

<div><p>The widespread adoption of e-health systems raises critical concerns regarding data privacy and network security. Ensuring secure and reliable data sharing between patients and healthcare professionals remains a significant challenge. To address this, we propose a novel anonymous...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Xuechun Mao (8972447) (author)
مؤلفون آخرون: Xiaqing Zhou (6651515) (author), Xiaoming Zhao (484793) (author), Ying Chen (9697) (author)
منشور في: 2025
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1852019254523592704
author Xuechun Mao (8972447)
author2 Xiaqing Zhou (6651515)
Xiaoming Zhao (484793)
Ying Chen (9697)
author2_role author
author
author
author_facet Xuechun Mao (8972447)
Xiaqing Zhou (6651515)
Xiaoming Zhao (484793)
Ying Chen (9697)
author_role author
dc.creator.none.fl_str_mv Xuechun Mao (8972447)
Xiaqing Zhou (6651515)
Xiaoming Zhao (484793)
Ying Chen (9697)
dc.date.none.fl_str_mv 2025-06-17T17:53:26Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0324289.g005
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/The_running_time_/29344390
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Microbiology
Science Policy
Space Science
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
reliable data sharing
healthcare professionals remains
140 &# 8201
detailed security analysis
based zkp scheme
xlink ">
widespread adoption
verification time
verification process
significant challenge
secure authentication
replay attacks
proof range
preserving authentication
network security
multimodal biometrics
knowledge proof
key contributions
iris modalities
integrating zero
integrating fingerprint
including anonymity
health environments
forward security
ensuring secure
dc.title.none.fl_str_mv The running time.
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <div><p>The widespread adoption of e-health systems raises critical concerns regarding data privacy and network security. Ensuring secure and reliable data sharing between patients and healthcare professionals remains a significant challenge. To address this, we propose a novel anonymous authentication scheme tailored for e-health environments, integrating zero-knowledge proof (ZKP) with multimodal biometrics. Our key contributions are as follows: (1) applying the Pedersen vector commitment algorithm to construct a biometric-based ZKP scheme, thereby ensuring enhanced security and privacy-preserving authentication; (2) utilizing multimodal cancelable biometrics generate (MCBG) technology, integrating fingerprint, face, and iris modalities to strengthen the security of the verification process; and (3) providing a detailed security analysis that demonstrates our scheme meets essential security requirements, including anonymity, authenticity, unlinkability, forward security, and resistance to replay attacks. Experimental results demonstrate stable proving and verification time of approximately 78 ms and 140 ms, respectively, regardless of the proof range, validating its efficiency and practicality for secure authentication in e-health systems.</p></div>
eu_rights_str_mv openAccess
id Manara_0dc5e3fb00a731fa8076238ffbd25bd1
identifier_str_mv 10.1371/journal.pone.0324289.g005
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/29344390
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling The running time.Xuechun Mao (8972447)Xiaqing Zhou (6651515)Xiaoming Zhao (484793)Ying Chen (9697)MicrobiologyScience PolicySpace ScienceBiological Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedreliable data sharinghealthcare professionals remains140 &# 8201detailed security analysisbased zkp schemexlink ">widespread adoptionverification timeverification processsignificant challengesecure authenticationreplay attacksproof rangepreserving authenticationnetwork securitymultimodal biometricsknowledge proofkey contributionsiris modalitiesintegrating zerointegrating fingerprintincluding anonymityhealth environmentsforward securityensuring secure<div><p>The widespread adoption of e-health systems raises critical concerns regarding data privacy and network security. Ensuring secure and reliable data sharing between patients and healthcare professionals remains a significant challenge. To address this, we propose a novel anonymous authentication scheme tailored for e-health environments, integrating zero-knowledge proof (ZKP) with multimodal biometrics. Our key contributions are as follows: (1) applying the Pedersen vector commitment algorithm to construct a biometric-based ZKP scheme, thereby ensuring enhanced security and privacy-preserving authentication; (2) utilizing multimodal cancelable biometrics generate (MCBG) technology, integrating fingerprint, face, and iris modalities to strengthen the security of the verification process; and (3) providing a detailed security analysis that demonstrates our scheme meets essential security requirements, including anonymity, authenticity, unlinkability, forward security, and resistance to replay attacks. Experimental results demonstrate stable proving and verification time of approximately 78 ms and 140 ms, respectively, regardless of the proof range, validating its efficiency and practicality for secure authentication in e-health systems.</p></div>2025-06-17T17:53:26ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0324289.g005https://figshare.com/articles/figure/The_running_time_/29344390CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/293443902025-06-17T17:53:26Z
spellingShingle The running time.
Xuechun Mao (8972447)
Microbiology
Science Policy
Space Science
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
reliable data sharing
healthcare professionals remains
140 &# 8201
detailed security analysis
based zkp scheme
xlink ">
widespread adoption
verification time
verification process
significant challenge
secure authentication
replay attacks
proof range
preserving authentication
network security
multimodal biometrics
knowledge proof
key contributions
iris modalities
integrating zero
integrating fingerprint
including anonymity
health environments
forward security
ensuring secure
status_str publishedVersion
title The running time.
title_full The running time.
title_fullStr The running time.
title_full_unstemmed The running time.
title_short The running time.
title_sort The running time.
topic Microbiology
Science Policy
Space Science
Biological Sciences not elsewhere classified
Information Systems not elsewhere classified
reliable data sharing
healthcare professionals remains
140 &# 8201
detailed security analysis
based zkp scheme
xlink ">
widespread adoption
verification time
verification process
significant challenge
secure authentication
replay attacks
proof range
preserving authentication
network security
multimodal biometrics
knowledge proof
key contributions
iris modalities
integrating zero
integrating fingerprint
including anonymity
health environments
forward security
ensuring secure