{"id":"https://openalex.org/W2917071185","doi":"https://doi.org/10.1109/glocom.2018.8648089","title":"LEASE: Lattice and ECC-Based Authentication and Integrity Verification Scheme in E-Healthcare","display_name":"LEASE: Lattice and ECC-Based Authentication and Integrity Verification Scheme in E-Healthcare","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2917071185","doi":"https://doi.org/10.1109/glocom.2018.8648089","mag":"2917071185"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8648089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8648089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://durham-repository.worktribe.com/output/1140947","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042685878","display_name":"Amit Dua","orcid":"https://orcid.org/0000-0002-3190-389X"},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amit Dua","raw_affiliation_strings":["Department of Computer Science and Information Systems, BITS Pilani, Pilani, Rajasthan, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, BITS Pilani, Pilani, Rajasthan, India","institution_ids":["https://openalex.org/I74796645"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086598229","display_name":"Rajat Chaudhary","orcid":"https://orcid.org/0000-0002-6554-918X"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajat Chaudhary","raw_affiliation_strings":["Computer Science & Engineering Department, Thapar Institute of Engineering & Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Thapar Institute of Engineering & Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036704324","display_name":"Gagangeet Singh Aujla","orcid":"https://orcid.org/0000-0002-2870-8938"},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gagangeet Singh Aujla","raw_affiliation_strings":["Computer Science & Engineering Department, Chandigarh University, Gharuan, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Chandigarh University, Gharuan, Punjab, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063414144","display_name":"Anish Jindal","orcid":"https://orcid.org/0000-0002-3052-2892"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anish Jindal","raw_affiliation_strings":["Computer Science & Engineering Department, Thapar Institute of Engineering & Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Thapar Institute of Engineering & Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Computer Science & Engineering Department, Thapar Institute of Engineering & Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Computer Science & Engineering Department, Thapar Institute of Engineering & Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076776322","display_name":"Joel J. P. C. Rodrigues","orcid":"https://orcid.org/0000-0001-8657-3800"},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Joel J.P.C. Rodrigues","raw_affiliation_strings":["Instituto de Telecomunica\u00e7\u00f5es, Portugal"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica\u00e7\u00f5es, Portugal","institution_ids":["https://openalex.org/I4210120471"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042685878"],"corresponding_institution_ids":["https://openalex.org/I74796645"],"apc_list":null,"apc_paid":null,"fwci":0.5063,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75514258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7597285509109497},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6245303750038147},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.5948351621627808},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5055127143859863},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5031649470329285},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.4989054203033447},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4295508861541748},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42126697301864624},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41139906644821167},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3916201889514923},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3320322036743164},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2873825430870056},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17335131764411926}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7597285509109497},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6245303750038147},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.5948351621627808},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5055127143859863},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5031649470329285},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.4989054203033447},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4295508861541748},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42126697301864624},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41139906644821167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3916201889514923},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3320322036743164},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2873825430870056},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17335131764411926}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/glocom.2018.8648089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8648089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},{"id":"pmh:oai:durham-repository.worktribe.com:1140947","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1140947","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Presentation / Conference Contribution"}],"best_oa_location":{"id":"pmh:oai:durham-repository.worktribe.com:1140947","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1140947","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Presentation / Conference Contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W776210257","https://openalex.org/W1500958697","https://openalex.org/W1797691632","https://openalex.org/W1976385711","https://openalex.org/W1989218295","https://openalex.org/W2031496381","https://openalex.org/W2032377220","https://openalex.org/W2052321528","https://openalex.org/W2063138430","https://openalex.org/W2098290658","https://openalex.org/W2140256428","https://openalex.org/W2167179301","https://openalex.org/W2398538644","https://openalex.org/W2796495462","https://openalex.org/W6712624421"],"related_works":["https://openalex.org/W2944823289","https://openalex.org/W3037018281","https://openalex.org/W2070735207","https://openalex.org/W2184304911","https://openalex.org/W2198520256","https://openalex.org/W2387862062","https://openalex.org/W2014813105","https://openalex.org/W2125457424","https://openalex.org/W2976831250","https://openalex.org/W2349430786"],"abstract_inverted_index":{"Security":[0],"has":[1,194,218],"become":[2],"one":[3],"of":[4,37,45,91,133,189,203,212],"major":[5],"concern":[6],"especially":[7],"in":[8,19,88,156,179,201],"critical":[9],"applications":[10],"like":[11],"e-healthcare.":[12],"To":[13],"cater":[14],"to":[15,56,76,147,159],"the":[16,35,68,89,114,131,157,161,169,180,185,190,210,213,225],"security":[17],"needs":[18],"e-healthcare,":[20],"this":[21,52,66],"paper":[22,158],"proposes":[23],"a":[24,57,62,124,149],"novel":[25],"scheme":[26,41,153,193,217],"which":[27,117],"prevents":[28],"data":[29,70,115,126,134,182,215],"from":[30,48],"unauthorized":[31],"fabrication":[32],"and":[33,140,174,206],"preserves":[34],"integrity":[36,46,121,141,216],"data.":[38],"The":[39,163,187],"proposed":[40,155,191,214],"also":[42],"removes":[43],"overhead":[44],"validation":[47],"user's":[49,81],"end":[50],"as":[51],"work":[53],"is":[54,74,85,95,110,118,129,135,142,154,165,171,176],"assigned":[55],"trusted":[58],"third":[59],"party,":[60],"i.e.,":[61],"proxy":[63,77],"server.":[64],"For":[65],"purpose,":[67],"patient's":[69,125],"given":[71],"by":[72,184,197,221],"user":[73,170],"sent":[75,183],"server":[78,116],"along":[79],"with":[80,224],"signature":[82],"where":[83],"it":[84,223],"broken":[86],"down":[87],"form":[90],"blocks.":[92],"A":[93],"`tag'":[94],"then":[96,111,143],"generated":[97],"for":[98,120],"each":[99],"block":[100,132],"using":[101,137],"lightweight":[102,150],"elliptic":[103],"curve":[104],"cryptography":[105],"(ECC).":[106],"This":[107],"block-tag":[108],"pair":[109],"uploaded":[112],"on":[113],"used":[119],"checking.":[122],"Whenever":[123],"access":[127],"request":[128,164],"raised,":[130],"retrieved":[136],"tag":[138],"value":[139],"verified.":[144],"In":[145],"addition":[146],"it,":[148],"lattice-based":[151],"authentication":[152,192],"authenticate":[160],"users.":[162],"served":[166],"only":[167],"when":[168],"deemed":[172],"authentic":[173],"there":[175],"no":[177],"modification":[178],"original":[181],"user.":[186],"effectiveness":[188],"been":[195,219],"proven":[196],"performing":[198],"its":[199],"analysis":[200],"terms":[202],"computation":[204],"time":[205],"communication":[207],"cost.":[208],"Moreover,":[209],"superiority":[211],"validated":[220],"comparing":[222],"traditional":[226],"discrete":[227],"logarithmic":[228],"scheme.":[229]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
