{"id":"https://openalex.org/W4405522005","doi":"https://doi.org/10.1109/ict-dm62768.2024.10798936","title":"Robust Group Authentication Using Quantum Cryptography and Smart Contract for IoMT","display_name":"Robust Group Authentication Using Quantum Cryptography and Smart Contract for IoMT","publication_year":2024,"publication_date":"2024-11-19","ids":{"openalex":"https://openalex.org/W4405522005","doi":"https://doi.org/10.1109/ict-dm62768.2024.10798936"},"language":"en","primary_location":{"id":"doi:10.1109/ict-dm62768.2024.10798936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict-dm62768.2024.10798936","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030199602","display_name":"Rachida Hireche","orcid":null},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Rachida Hireche","raw_affiliation_strings":["LRSD Laboratory Ferhat Abbas University Setif 1,Setif,Algeria"],"affiliations":[{"raw_affiliation_string":"LRSD Laboratory Ferhat Abbas University Setif 1,Setif,Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060291905","display_name":"Houssem Mansouri","orcid":null},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Houssem Mansouri","raw_affiliation_strings":["LRSD Laboratory Ferhat Abbas University Setif 1,Setif,Algeria"],"affiliations":[{"raw_affiliation_string":"LRSD Laboratory Ferhat Abbas University Setif 1,Setif,Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005025214","display_name":"Yasmine Harbi","orcid":"https://orcid.org/0000-0001-6731-7895"},"institutions":[{"id":"https://openalex.org/I40193446","display_name":"University Ferhat Abbas of Setif","ror":"https://ror.org/02rzqza52","country_code":"DZ","type":"education","lineage":["https://openalex.org/I40193446"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Yasmine Harbi","raw_affiliation_strings":["LRSD Laboratory Ferhat Abbas University Setif 1,Setif,Algeria"],"affiliations":[{"raw_affiliation_string":"LRSD Laboratory Ferhat Abbas University Setif 1,Setif,Algeria","institution_ids":["https://openalex.org/I40193446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082471864","display_name":"Al\u2010Sakib Khan Pathan","orcid":"https://orcid.org/0000-0001-6572-3451"},"institutions":[{"id":"https://openalex.org/I63169043","display_name":"United International University","ror":"https://ror.org/01tqv1p28","country_code":"BD","type":"education","lineage":["https://openalex.org/I63169043"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Al-Sakib Khan Pathan","raw_affiliation_strings":["United International University,Department of Computer Science and Engineering,Dhaka,Bangladesh"],"affiliations":[{"raw_affiliation_string":"United International University,Department of Computer Science and Engineering,Dhaka,Bangladesh","institution_ids":["https://openalex.org/I63169043"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030199602"],"corresponding_institution_ids":["https://openalex.org/I40193446"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21331245,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.7222999930381775,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.7222999930381775,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6833000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.6689000129699707,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.6444337964057922},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5987652540206909},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5945553779602051},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5829135179519653},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5602606534957886},{"id":"https://openalex.org/keywords/group","display_name":"Group (periodic table)","score":0.4852721393108368},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3667839765548706},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.3484184443950653},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.11944112181663513},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.11508148908615112},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.06192106008529663}],"concepts":[{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.6444337964057922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5987652540206909},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5945553779602051},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5829135179519653},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5602606534957886},{"id":"https://openalex.org/C2781311116","wikidata":"https://www.wikidata.org/wiki/Q83306","display_name":"Group (periodic table)","level":2,"score":0.4852721393108368},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3667839765548706},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3484184443950653},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.11944112181663513},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.11508148908615112},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.06192106008529663}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ict-dm62768.2024.10798936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ict-dm62768.2024.10798936","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2153281696","https://openalex.org/W2617427664","https://openalex.org/W2979826091","https://openalex.org/W3036907975","https://openalex.org/W3042565401","https://openalex.org/W3046325143","https://openalex.org/W3160705937","https://openalex.org/W4285226027","https://openalex.org/W4292258984","https://openalex.org/W4312559487","https://openalex.org/W4385585426","https://openalex.org/W4386001466","https://openalex.org/W4387106635","https://openalex.org/W4387631239","https://openalex.org/W4392449654","https://openalex.org/W4394976967","https://openalex.org/W4394989833","https://openalex.org/W6751693474"],"related_works":["https://openalex.org/W2526025196","https://openalex.org/W2184221808","https://openalex.org/W2740147593","https://openalex.org/W2295565109","https://openalex.org/W2547800031","https://openalex.org/W3173339789","https://openalex.org/W4288754535","https://openalex.org/W4385627932","https://openalex.org/W2548040793","https://openalex.org/W3008265109"],"abstract_inverted_index":{"Medical":[0,31],"risk":[1],"management":[2],"is":[3,160],"a":[4,69],"critical":[5],"process":[6],"within":[7],"healthcare":[8],"institutions":[9],"that":[10,157],"involves":[11],"identifying,":[12],"assessing,":[13],"and":[14,21,44,110,117,129,137,153,171],"mitigating":[15],"risks":[16],"to":[17,61,72,142,168],"ensure":[18],"patient":[19,39],"safety":[20],"improve":[22],"care":[23],"quality.":[24],"In":[25,64],"recent":[26,143],"years,":[27],"the":[28,50,85,126],"Internet":[29],"of":[30,52,87,148],"Things":[32],"(IoMT)":[33],"has":[34],"proved":[35],"effective":[36,98],"in":[37,146],"monitoring":[38],"health,":[40],"particularly":[41],"during":[42],"disasters":[43],"epidemics":[45],"such":[46,58],"as":[47],"COVID-19.":[48],"However,":[49],"transmission":[51],"information":[53],"over":[54],"open":[55],"channels":[56],"makes":[57],"networks":[59],"vulnerable":[60],"potential":[62],"attacks.":[63,89],"addition,":[65],"quantum":[66,88],"computing":[67],"presents":[68,96],"significant":[70],"threat":[71],"current":[73],"cryptographic":[74],"algorithms.":[75],"While":[76],"existing":[77],"solutions":[78],"protect":[79],"against":[80],"well-known":[81],"threats,":[82],"few":[83],"address":[84,91],"issue":[86],"To":[90],"these":[92],"challenges,":[93],"this":[94],"work":[95],"an":[97],"group":[99],"authentication":[100],"scheme":[101],"for":[102,163],"IoMT":[103,165],"systems,":[104],"leveraging":[105],"post-quantum":[106],"security":[107,154],"using":[108,131],"Kyber-PKE":[109],"Dilithium,":[111],"Shamir\u2019s":[112],"secret":[113],"sharing":[114],"(SSS)":[115],"algorithm,":[116],"smart":[118],"contract.":[119],"The":[120],"proposed":[121],"solution":[122],"was":[123],"simulated":[124],"on":[125],"Ethereum":[127],"platform":[128],"evaluated":[130],"Hyperledger":[132],"Caliper,":[133],"demonstrating":[134],"its":[135,169],"efficiency":[136],"scalability.":[138],"A":[139],"comparative":[140],"analysis":[141],"pertinent":[144],"works":[145],"terms":[147],"computation":[149],"cost,":[150],"power":[151],"consumption,":[152],"requirements":[155],"shows":[156],"our":[158],"system":[159],"well":[161],"suited":[162],"various":[164],"applications":[166],"due":[167],"robustness":[170],"efficiency.":[172]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
