top of page

Project EISEI

The ongoing impact of the COVID-19 pandemic is significantly disrupting our everyday routines and activities. To curb the spread of infectious diseases, it is crucial to establish an efficient contact tracing mechanism. Regrettably, current methods suffer from serious privacy concerns, posing threats to the identity and location privacy of both users and patients. While some privacy-preserving systems have been suggested, challenges persist due to centralization. In response to these issues, we introduce a Privacy-preserving Contact Tracing scheme, dubbed Project EISEI, integrated with 5G and based on Blockchain technology within medical applications.

A Privacy-preserving contact Tracing scheme in 5G-integrated and Blockchain-based Medical applications, dubbed Project EISEI, is proposed.

How it works:

Eisei allows anyone can use their mobile phones to conduct location checks and determine if they have potentially come into contact with a confirmed patient, all while respecting their privacy.

Decentralized Privacy-Preserving Healthcare Blockchain

01

The blocks are interconnected in a chain structure, starting with the initial block called Genesis. Every block comprises a Block Header, Transaction Counter, and Transaction. This functions as a decentralized framework for data recording.

Structure of the Blockchain

02

For asymmetric encryption, the sender possesses a key pair skpriv,skpub, and the receiver has a different key pair (rkpriv, rkpub). Information can be encrypted using the receiver's public key (rkpub) and decrypted using their private key (rkpriv).

Symmetric Key Encryption

03

A symmetric algorithm employs a single key for both encrypting plaintext and decrypting ciphertext. On the other hand, asymmetric algorithms (Public key encryption) utilize distinct keys for the encryption of plaintext and the decryption of ciphertext.

Asymmetric Key Encryption

04

To ensure authentication, we incorporate a digital signature into the data. Yet, traditional digital signatures are impractical due to resource constraints in IoT devices. Hence, we propose the adoption of lightweight digital signatures designed for small devices, as outlined in the provided reference.

Data Signature

05

We also employ lightweight Ring signature technology [2], enabling a signer to anonymously sign data (Figure 10). This involves blending the signature with other entities in a group known as a "ring," where only the actual signer knows which member signed the message. Rivest originally introduced Ring Signature in 2001.

Digital Ring Signature

06

bottom of page