Fig. 3

Decryption workflow of the proposed system, the encrypted data is decrypted using the same keystream, ensuring that only authorized users with the correct key can access patient health records.

Decryption workflow of the proposed system, the encrypted data is decrypted using the same keystream, ensuring that only authorized users with the correct key can access patient health records.