Book Image

Blockchain for Enterprise

By : Narayan Prusty
Book Image

Blockchain for Enterprise

By: Narayan Prusty

Overview of this book

The increasing growth in blockchain use is enormous, and it is changing the way business is done. Many leading organizations are already exploring the potential of blockchain. With this book, you will learn to build end-to-end enterprise-level decentralized applications and scale them across your organization to meet your company's needs. This book will help you understand what DApps are and how the blockchain ecosystem works, via real-world examples. This extensive end-to-end book covers every blockchain aspect for business and for developers. You will master process flows and incorporate them into your own enterprise. You will learn how to use J.P. Morgan’s Quorum to build blockchain-based applications. You will also learn how to write applications that can help communicate enterprise blockchain solutions. You will learn how to write smart contracts that run without censorship and third-party interference. Once you've grasped what a blockchain is and have learned about Quorum, you will jump into building real-world practical blockchain applications for sectors such as payment and money transfer, healthcare, cloud computing, supply chain management, and much more.
Table of Contents (14 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Ensuring data privacy in a blockchain using PRE


Before getting any further and building our decentralized EMR data management and sharing system, let's learn about what PRE is. In our solution, we will be using PRE to ensure security and privacy. 

PRE is a set of algorithms that allows you to encrypt some text with your key and then alter the ciphertext so that it can be decrypted by another party without revealing your key. To alter the ciphertext, you need the other party's private or public key, based on whether you are using interactive or noninteractive PRE algorithms, respectively. Regardless of the algorithm, PRE involves generating a re-encrypt key, which is used to re-encrypt the data. The re-encrypt key is generated based on the owner's private key and the recipient's private or public key, based on the type of algorithm.

In practice, PRE is used to store sensitive data on a third-party server and lets you decide who gets access to the data without revealing the actual data to the...