{"id":"https://openalex.org/W4399230864","doi":"https://doi.org/10.1007/s40747-024-01477-1","title":"A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records","display_name":"A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records","publication_year":2024,"publication_date":"2024-05-31","ids":{"openalex":"https://openalex.org/W4399230864","doi":"https://doi.org/10.1007/s40747-024-01477-1"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-024-01477-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-024-01477-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-024-01477-1.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-024-01477-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000028489","display_name":"Shtwai Alsubai","orcid":"https://orcid.org/0000-0002-6584-7400"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Shtwai Alsubai","raw_affiliation_strings":["Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011944197","display_name":"Abdullah Alqahtani","orcid":"https://orcid.org/0000-0002-2859-1629"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdullah Alqahtani","raw_affiliation_strings":["Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054194585","display_name":"Harish Garg","orcid":"https://orcid.org/0000-0001-9099-8422"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Harish Garg","raw_affiliation_strings":["Department of Mathematics, Thapar Institute of Engineering and Technology (Deemed University), Patiala, 147004, Punjab, India"],"raw_orcid":"https://orcid.org/0000-0001-9099-8422","affiliations":[{"raw_affiliation_string":"Department of Mathematics, Thapar Institute of Engineering and Technology (Deemed University), Patiala, 147004, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087641073","display_name":"Mohemmed Sha","orcid":"https://orcid.org/0000-0001-6255-9529"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohemmed Sha","raw_affiliation_strings":["Department of Software Engineering, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043393776","display_name":"Abdu Gumaei","orcid":"https://orcid.org/0000-0001-8512-9687"},"institutions":[{"id":"https://openalex.org/I142608572","display_name":"Prince Sattam Bin Abdulaziz University","ror":"https://ror.org/04jt46d36","country_code":"SA","type":"education","lineage":["https://openalex.org/I142608572"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdu Gumaei","raw_affiliation_strings":["Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, 11942, Al-Kharj, Saudi Arabia","institution_ids":["https://openalex.org/I142608572"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000028489","https://openalex.org/A5054194585"],"corresponding_institution_ids":["https://openalex.org/I142608572","https://openalex.org/I162030827"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":14.92,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.98904241,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":"5","first_page":"6117","last_page":"6141"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9329560995101929},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6991846561431885},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6766380071640015},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5899376273155212},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.5679894685745239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5281189680099487},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1341625154018402},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10517433285713196}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9329560995101929},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6991846561431885},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6766380071640015},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5899376273155212},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.5679894685745239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5281189680099487},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1341625154018402},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10517433285713196},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-024-01477-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-024-01477-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-024-01477-1.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:16596e5c68df48f8af598ff6985c8f30","is_oa":true,"landing_page_url":"https://doaj.org/article/16596e5c68df48f8af598ff6985c8f30","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 10, Iss 5, Pp 6117-6141 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-024-01477-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-024-01477-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-024-01477-1.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399230864.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W3000833961","https://openalex.org/W3021455220","https://openalex.org/W3037160881","https://openalex.org/W3049054937","https://openalex.org/W3080743033","https://openalex.org/W3087335979","https://openalex.org/W3088127267","https://openalex.org/W3101846967","https://openalex.org/W3118436442","https://openalex.org/W3132111025","https://openalex.org/W3134681443","https://openalex.org/W3156579791","https://openalex.org/W3156596229","https://openalex.org/W3173303278","https://openalex.org/W3175846286","https://openalex.org/W3196625120","https://openalex.org/W3198549936","https://openalex.org/W4200162146","https://openalex.org/W4200210888","https://openalex.org/W4220657891","https://openalex.org/W4223997068","https://openalex.org/W4280602049","https://openalex.org/W4293220995","https://openalex.org/W4294183037","https://openalex.org/W4295242256","https://openalex.org/W4306173264","https://openalex.org/W4312163441","https://openalex.org/W4312923001","https://openalex.org/W4313132011","https://openalex.org/W4324126158","https://openalex.org/W4360978582","https://openalex.org/W4379382472","https://openalex.org/W4379805355","https://openalex.org/W4379931308","https://openalex.org/W4384787485","https://openalex.org/W4386632270","https://openalex.org/W4386883039","https://openalex.org/W4387407403","https://openalex.org/W4388888614","https://openalex.org/W4389408248"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2799059781"],"abstract_inverted_index":{"Abstract":[0],"Electronic":[1],"health":[2],"records":[3],"(EHRs)":[4],"are":[5],"important":[6],"for":[7,44,74],"the":[8,23,77,89,105,115,122,153,191,195,199,225,229],"efficient":[9,166],"management":[10],"of":[11,124,160,201,214,234],"healthcare":[12,35],"data.":[13,196],"However,":[14],"Healthcare":[15],"data":[16,36],"travels":[17],"across":[18],"an":[19,55,165],"open":[20],"route,":[21],"i.e.,":[22],"Internet,":[24],"making":[25],"EHR":[26,56],"security":[27,71],"a":[28,99,132,186],"difficult":[29],"process":[30],"to":[31,38,174,193,208],"do.":[32],"This":[33],"puts":[34],"vulnerable":[37],"cyber":[39],"assaults.":[40,143],"A":[41],"possible":[42],"method":[43,135],"protecting":[45],"EHRs":[46,75],"is":[47,81,131,137,172],"blockchain":[48],"technology.":[49],"In":[50],"this":[51],"work,":[52],"we":[53,97],"develop":[54],"architecture":[57],"based":[58],"on":[59,121],"blockchain,":[60],"which":[61],"ensures":[62,180],"all":[63],"stakeholder's":[64],"safety":[65],"and":[66,76,112,162,167,219,236],"privacy.":[67],"We":[68,197],"analyze":[69],"various":[70],"architectures":[72],"used":[73],"standard":[78],"encryption":[79],"system":[80,93,170],"integrated":[82],"with":[83,185],"quantum":[84,95,175],"computing":[85],"(QC).":[86],"To":[87],"safeguard":[88],"conventional":[90],"traditional":[91],"encrypting":[92],"against":[94,140],"assaults,":[96],"provide":[98],"hybrid":[100],"signature":[101,134,169],"technique":[102,146,227],"that":[103,136,171,181,224],"combines":[104],"Elliptic":[106],"Curve":[107],"Digital":[108],"Signature":[109],"Algorithm":[110],"(ECDSA)":[111],"Dilithium":[113,130,163],"within":[114],"anti-quantum":[116],"lattice-based":[117,133],"blind":[118],"signature.":[119],"Based":[120],"difficulty":[123],"lattice":[125,154],"problems":[126],"over":[127],"finite":[128],"fields,":[129],"substantially":[138],"safe":[139],"selected":[141],"message":[142],"The":[144,158,177],"developed":[145,226],"creates":[147],"high":[148],"entropy":[149],"secret":[150],"keys":[151],"using":[152],"basis":[155],"delegation":[156],"mechanism.":[157],"combination":[159],"ECDSA":[161],"provides":[164],"secure":[168],"resilient":[173],"attacks.":[176],"proposed":[178],"scheme":[179,203],"only":[182],"authorized":[183],"users":[184],"defined":[187],"role":[188],"can":[189],"use":[190],"database":[192],"access":[194],"evaluate":[198],"efficiency":[200,235],"our":[202],"by":[204],"comparing":[205],"its":[206],"performance":[207],"other":[209],"state-of-the-art":[210],"solutions":[211],"in":[212,232],"terms":[213,233],"transaction":[215],"throughput,":[216],"resource":[217],"utilization,":[218],"communication":[220],"cost.":[221],"Results":[222],"demonstrate":[223],"outperforms":[228],"existing":[230],"techniques":[231],"security.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
