{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:55:48Z","timestamp":1777704948185,"version":"3.51.4"},"reference-count":18,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,12,2]]},"abstract":"<jats:p>Internet of things (IoT) is a recent developing technology in the field of smart healthcare. But it is difficult to transfer the patient\u2019s health record as a centralized network. So, \u201cblockchain technology\u201d has excellent consideration due to its unique qualities such as decentralized network, openness, irreversible data, and cryptography functions. Blockchain technology depends on cryptography hash techniques for safe transmission. For increased security, it transforms the variable size inputs into a constant length hash result. Current cryptographic hash algorithms with digital signatures are only able to access keys up to a size of 256 bytes and have concerns with single node accessibility. It just uses the bits that serve as the key to access the data. This paper proposes the \u201cRevised Elliptic Curve Cryptography Multi-Signature Scheme\u201d (RECC-MSS) for multinode availability to find the nearest path for secure communications with the medical image as keys. Here, the input image key can be converted into an array of data that can be extended up to 512 bytes of size. The performance of the proposed algorithm is analyzed with other cryptography hash functions like Secure Hashing Algorithms (SHAs) such as \u201cSHA224\u201d, \u201cSHA256\u201d, \u201cSHA384\u201d, \u201cSHA512\u201d, \u201cSHA3-224\u201d, \u201cSHA3-256\u201d, \u201cSHA3-384\u201d, \u201cSHA3-512\u201d, and \u201cMessage Digest5\u201d (MD5) by \u201cOne-way ANOVA\u201d test in terms of \u201caccuracy\u201d, \u201cthroughput\u201d and \u201ctime complexity\u201d. The proposed scheme with ECC achieved the throughput of 17.07 kilobytes per 200 nano seconds, 93.25% of accuracy, 1.5 nanoseconds latency of signature generation, 1.48 nanoseconds latency of signature verification, 1.5 nanoseconds of time complexity with 128 bytes of hash signature. The RECC-MSS achieved the significance of 0.001 for accuracy and 0.002 for time complexity which are less than 0.05. From the statistical analysis, the proposed algorithm has significantly high accuracy, high throughput and less time complexity than other cryptography hash algorithms.<\/jats:p>","DOI":"10.3233\/jifs-232802","type":"journal-article","created":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T10:50:41Z","timestamp":1697799041000},"page":"11993-12012","source":"Crossref","is-referenced-by-count":5,"title":["Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system"],"prefix":"10.1177","volume":"45","author":[{"given":"G.","family":"Uganya","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India"}]},{"given":"R.M.","family":"Bommi","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Chennai Institute of Technology, Chennai, Tamil Nadu, India"}]},{"given":"P.","family":"Muthu Krishnammal","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering, VIT-AP University, Amaravati, Andhrapradesh, India"}]},{"given":"N.","family":"Vijayaraj","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India"}]}],"member":"179","reference":[{"issue":"05","key":"10.3233\/JIFS-232802_ref1","doi-asserted-by":"crossref","first-page":"2130006","DOI":"10.1142\/S0218126621300063","article-title":"A survey on internet of things: Applications, recent issues, attacks, and security mechanisms","volume":"30","author":"Uganya Radhika","year":"2021","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"4","key":"10.3233\/JIFS-232802_ref3","doi-asserted-by":"crossref","first-page":"e0266462","DOI":"10.1371\/journal.pone.0266462","article-title":"Blockchain technology in healthcare: A systematic review","volume":"17","author":"Huma Saeed,","year":"2022","journal-title":"Plos One"},{"key":"10.3233\/JIFS-232802_ref4","doi-asserted-by":"crossref","first-page":"100217","DOI":"10.1016\/j.jii.2021.100217","article-title":"Blockchain technology in the healthcare industry: Trends and opportunities,","volume":"22","author":"Hassan Mansur Hussien","year":"2021","journal-title":"Journal of Industrial Information Integration"},{"issue":"2","key":"10.3233\/JIFS-232802_ref6","first-page":"100006","article-title":"A survey on the adoption of blockchain in iot: Challenges and solutions","volume":"2","author":"Md Ashraf Uddin","year":"2021","journal-title":"Blockchain: Research and Applications"},{"issue":"12","key":"10.3233\/JIFS-232802_ref7","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","article-title":"Blockchain: A distributed solution to automotive security and privacy","volume":"55","author":"Ali Dorri","year":"2017","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"10.3233\/JIFS-232802_ref8","doi-asserted-by":"crossref","first-page":"4557","DOI":"10.1109\/JIOT.2019.2960027","article-title":"A group signature and authentication scheme for blockchain-based mobile-edge computing","volume":"7","author":"Shijie Zhang","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JIFS-232802_ref9","doi-asserted-by":"crossref","first-page":"3023","DOI":"10.1109\/TIFS.2020.2976607","article-title":"Practical escrow protocol for itcoin,","volume":"15","author":"Xiao Yang","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/JIFS-232802_ref10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.jisa.2017.09.005","article-title":"Batch verification of digital signatures: approaches and challenges,","volume":"37","author":"Apurva Kittur","year":"2017","journal-title":"Journal of Information Security and Applications"},{"issue":"4","key":"10.3233\/JIFS-232802_ref11","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s13389-014-0082-x","article-title":"New algorithms for batch verification of standard ECDSA signatures","volume":"4","author":"Sabyasachi Karati","year":"2014","journal-title":"Journal of Cryptographic Engineering"},{"key":"10.3233\/JIFS-232802_ref13","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.jisa.2022.103407","article-title":"Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram","volume":"72","author":"Anushiadevi","year":"2023","journal-title":"Journal of Information Security and Applications"},{"issue":"8","key":"10.3233\/JIFS-232802_ref14","doi-asserted-by":"crossref","first-page":"1769","DOI":"10.3390\/math11081769","article-title":"Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments","volume":"11","author":"Hemalatha Mahalingam","year":"2023","journal-title":"Mathematics"},{"key":"10.3233\/JIFS-232802_ref16","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.ins.2021.08.053","article-title":"An efficient identity-based signature scheme with provable security,","volume":"576","author":"Peng Yi","year":"2021","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-232802_ref17","doi-asserted-by":"crossref","first-page":"11830","DOI":"10.1109\/ACCESS.2022.3146148","article-title":"A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator,","volume":"10","author":"Hoai Luan Pham","year":"2022","journal-title":"IEEE Access"},{"issue":"2","key":"10.3233\/JIFS-232802_ref21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1504\/IJSNET.2021.118486","article-title":"Protection of surveillance recordings via blockchain-assisted multimedia security","volume":"37","author":"Zhaowei Ma","year":"2021","journal-title":"International Journal of Sensor Networks"},{"issue":"05","key":"10.3233\/JIFS-232802_ref22","first-page":"83","article-title":"How to use SPSS software to help students in scientific research","volume":"4","author":"Doan Van Truong","year":"2021","journal-title":"IJER-International Journal of Educational Research"},{"key":"10.3233\/JIFS-232802_ref23","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","article-title":"Block-DEF: A secure digital evidence framework using blockchain,","volume":"491","author":"Tian","year":"2019","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-232802_ref24","doi-asserted-by":"crossref","unstructured":"Uganya G. , Radhika Baskar , Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency, Engineering 45(1) (2023).","DOI":"10.32604\/csse.2023.028341"},{"issue":"10","key":"10.3233\/JIFS-232802_ref25","doi-asserted-by":"crossref","first-page":"1699","DOI":"10.3390\/sym12101699","article-title":"Towards a secure signature scheme based on multimodal biometric technology: application for IOT Blockchain network","volume":"12","author":"Hassen","year":"2020","journal-title":"Symmetry"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-232802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:42:29Z","timestamp":1777455749000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-232802"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"references-count":18,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-232802","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,2]]}}}