{"id":"https://openalex.org/W4416366642","doi":"https://doi.org/10.1109/tce.2025.3634583","title":"A Blockchain-Enabled Quantum Encryption Scheme for Securing Consumer-Centric Digital Twin Healthcare Networks","display_name":"A Blockchain-Enabled Quantum Encryption Scheme for Securing Consumer-Centric Digital Twin Healthcare Networks","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416366642","doi":"https://doi.org/10.1109/tce.2025.3634583"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3634583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634583","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087763096","display_name":"Sunil Prajapat","orcid":"https://orcid.org/0000-0001-9343-5182"},"institutions":[{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sunil Prajapat","raw_affiliation_strings":["Department of Computer Engineering, AI and Big Data, Marwadi University, Rajkot, India","Department of Computer Engineering-AI &#x0026; Big Data, Marwadi University, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, AI and Big Data, Marwadi University, Rajkot, India","institution_ids":["https://openalex.org/I3132999081"]},{"raw_affiliation_string":"Department of Computer Engineering-AI &#x0026; Big Data, Marwadi University, India","institution_ids":["https://openalex.org/I3132999081"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086844518","display_name":"Seong Oun Hwang","orcid":"https://orcid.org/0000-0003-4240-6255"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seong Oun Hwang","raw_affiliation_strings":["Department of Computer Engineering, Gachon University, Seongnam-si, Republic of Korea","Department of Computer Engineering, Gachon University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Gachon University, Seongnam-si, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]},{"raw_affiliation_string":"Department of Computer Engineering, Gachon University, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100747929","display_name":"Pankaj Kumar","orcid":"https://orcid.org/0000-0002-4589-3573"},"institutions":[{"id":"https://openalex.org/I180952551","display_name":"Central University of Himachal Pradesh","ror":"https://ror.org/04v5nzb91","country_code":"IN","type":"education","lineage":["https://openalex.org/I180952551"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pankaj Kumar","raw_affiliation_strings":["Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Kangra, India","Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, Kangra, India","institution_ids":["https://openalex.org/I180952551"]},{"raw_affiliation_string":"Srinivasa Ramanujan Department of Mathematics, Central University of Himachal Pradesh, India","institution_ids":["https://openalex.org/I180952551"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068752835","display_name":"Mohammad Shabaz","orcid":"https://orcid.org/0000-0001-5106-7609"},"institutions":[{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohammad Shabaz","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Engineering and Technology, Marwadi University Research Center, Marwadi University, Rajkot, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Engineering and Technology, Marwadi University Research Center, Marwadi University, Rajkot, Gujarat, India","institution_ids":["https://openalex.org/I3132999081"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087763096"],"corresponding_institution_ids":["https://openalex.org/I3132999081"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.48688092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1846","last_page":"1856"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.4943999946117401,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.4943999946117401,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.14900000393390656,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13052","display_name":"Molecular Communication and Nanonetworks","score":0.06629999727010727,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7425000071525574},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5293999910354614},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.436599999666214},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.4133000075817108},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.36070001125335693},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.336899995803833},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3280999958515167},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.31119999289512634}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7425000071525574},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7177000045776367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6226999759674072},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5293999910354614},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48100000619888306},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.436599999666214},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.4133000075817108},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.36070001125335693},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.336899995803833},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3280999958515167},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.29649999737739563},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.29170000553131104},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2653000056743622},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2590999901294708},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.25189998745918274},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3634583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3634583","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,121,173],"integration":[1],"of":[2,73,164],"consumer-centric":[3],"digital":[4,78],"twin":[5,79],"(CCDT)":[6],"technology":[7,46],"is":[8,47,180],"set":[9],"to":[10,32,95,117,126,149,169],"transform":[11],"healthcare":[12,35,115,156,196],"systems,":[13],"enabling":[14],"blockchain-based":[15],"solutions":[16],"for":[17,113,190],"enhanced":[18],"medical":[19,26],"services.":[20,69],"By":[21],"precisely":[22],"simulating":[23],"patients":[24,128],"and":[25,42,53,66,76],"processes,":[27],"CCDT":[28,114,145,195],"establish":[29],"a":[30,86,108,138],"link":[31],"the":[33,51,71,83,135,162,165,177],"virtual":[34,54],"environment,":[36],"supporting":[37],"improved":[38],"diagnosis,":[39],"real-time":[40],"monitoring,":[41],"predictive":[43],"analytics.":[44],"Blockchain":[45],"critical":[48],"in":[49],"connecting":[50],"physical":[52],"health":[55],"care":[56],"worlds,":[57],"providing":[58],"secure":[59,119,139],"storage,":[60],"efficient":[61],"communication,":[62],"reduced":[63],"computational":[64],"costs,":[65],"reliable":[67],"hosting":[68],"However,":[70],"security":[72,184,193],"patient":[74],"data":[75],"its":[77,187],"counterpart":[80],"stored":[81],"on":[82,131],"blockchain":[84,125],"remains":[85],"potential":[87,189],"vulnerability,":[88],"as":[89],"any":[90],"alteration":[91],"or":[92],"unauthorized":[93],"access":[94],"this":[96,104],"information":[97],"could":[98],"pose":[99],"significant":[100,188],"risks.":[101],"To":[102],"address":[103],"challenge,":[105],"we":[106],"propose":[107],"blockchain-enabled":[109],"quantum":[110,140],"encryption":[111,141,171],"protocol":[112,123,179],"networks":[116],"ensure":[118],"communication.":[120],"proposed":[122,166],"leverages":[124],"authenticate":[127,150],"without":[129],"relying":[130],"third-party":[132],"entities.":[133],"At":[134],"same":[136],"time,":[137],"mechanism":[142],"ensures":[143],"that":[144,176],"do":[146],"not":[147],"need":[148],"repeatedly":[151],"when":[152],"interacting":[153],"with":[154],"multiple":[155],"providers.":[157],"A":[158],"performance":[159],"evaluation":[160],"demonstrates":[161],"effectiveness":[163],"scheme":[167],"compared":[168],"existing":[170],"methods.":[172],"results":[174],"indicate":[175],"suggested":[178],"resilient":[181],"against":[182],"various":[183],"threats,":[185],"showcasing":[186],"enhancing":[191],"communication":[192],"within":[194],"networks.":[197]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-19T00:00:00"}
