{"id":"https://openalex.org/W4382371657","doi":"https://doi.org/10.1109/tsc.2023.3289319","title":"Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation","display_name":"Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation","publication_year":2023,"publication_date":"2023-06-28","ids":{"openalex":"https://openalex.org/W4382371657","doi":"https://doi.org/10.1109/tsc.2023.3289319"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2023.3289319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2023.3289319","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037642352","display_name":"Chao Lin","orcid":"https://orcid.org/0000-0002-0101-8531"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Lin","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology/Center for Applied Mathematics of Fujian Province, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037642352"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":9.7657,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.98051557,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"16","issue":"5","first_page":"3294","last_page":"3304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8177624344825745},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7789938449859619},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6962946057319641},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6175240874290466},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6145349740982056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5803801417350769},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.5682010054588318},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.559959888458252},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.488295316696167},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4423351287841797},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.43541476130485535},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.41800862550735474},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.413074791431427},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3871297240257263},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3315613567829132},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.2653590440750122},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.24684423208236694},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12277445197105408},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10274720191955566},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07516723871231079}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8177624344825745},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7789938449859619},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6962946057319641},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6175240874290466},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6145349740982056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5803801417350769},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.5682010054588318},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.559959888458252},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.488295316696167},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4423351287841797},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.43541476130485535},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41800862550735474},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.413074791431427},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3871297240257263},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3315613567829132},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.2653590440750122},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.24684423208236694},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12277445197105408},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10274720191955566},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07516723871231079},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsc.2023.3289319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2023.3289319","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-133614","is_oa":false,"landing_page_url":"https://repository.hkust.edu.hk/ir/Record/1783.1-133614","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4699999988079071,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G1974263772","display_name":null,"funder_award_id":"BX2021399","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G457323686","display_name":null,"funder_award_id":"62202226","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4641413523","display_name":null,"funder_award_id":"BK20220935","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5310342163","display_name":null,"funder_award_id":"62272103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6179630980","display_name":null,"funder_award_id":"30922010917","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7249388177","display_name":null,"funder_award_id":"62102050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7406850032","display_name":null,"funder_award_id":"62102089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8361662618","display_name":null,"funder_award_id":"62272104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1543732261","https://openalex.org/W1964090466","https://openalex.org/W1987282778","https://openalex.org/W1988693516","https://openalex.org/W2024724761","https://openalex.org/W2024924520","https://openalex.org/W2037807700","https://openalex.org/W2043787647","https://openalex.org/W2074064064","https://openalex.org/W2107561818","https://openalex.org/W2119804741","https://openalex.org/W2133968079","https://openalex.org/W2149452334","https://openalex.org/W2151413173","https://openalex.org/W2165447539","https://openalex.org/W2469801051","https://openalex.org/W2514994441","https://openalex.org/W2522448907","https://openalex.org/W2555782333","https://openalex.org/W2561097737","https://openalex.org/W2616934625","https://openalex.org/W2736904962","https://openalex.org/W2756138490","https://openalex.org/W2786066717","https://openalex.org/W2789827290","https://openalex.org/W2804900363","https://openalex.org/W2889164466","https://openalex.org/W2904329524","https://openalex.org/W2938151977","https://openalex.org/W2963176735","https://openalex.org/W2977253149","https://openalex.org/W3003508977","https://openalex.org/W3045847535","https://openalex.org/W3138338505","https://openalex.org/W3151748982","https://openalex.org/W4239635077","https://openalex.org/W6678058272","https://openalex.org/W6744077507","https://openalex.org/W6748193459","https://openalex.org/W6793285265"],"related_works":["https://openalex.org/W2884894114","https://openalex.org/W4387370674","https://openalex.org/W2362418118","https://openalex.org/W1966142266","https://openalex.org/W2998969597","https://openalex.org/W2982358690","https://openalex.org/W2130871907","https://openalex.org/W2132971056","https://openalex.org/W2362628077","https://openalex.org/W2169590270"],"abstract_inverted_index":{"Electronic":[0],"Medical":[1],"Records":[2],"(EMRs)":[3],"sharing":[4,97,121],"enhances":[5],"healthcare":[6],"and":[7,16,39,88,114,137,145,157,166,189],"biomedical":[8],"discoveries":[9],"but":[10,24,58],"faces":[11],"challenges:":[12],"data":[13],"provider":[14],"centralization":[15],"limited":[17],"interoperability.":[18],"Blockchain":[19],"can":[20],"address":[21],"these":[22],"issues,":[23],"existing":[25,59,175],"systems":[26],"struggle":[27],"with":[28,181],"malicious":[29],"EMR":[30,96,120],"propagation":[31],"due":[32,64],"to":[33,65,83,123,131,174],"challenges":[34],"concerning":[35],"the":[36,42,76,109,117,125,154,182,187],"authenticity,":[37],"non-repudiation,":[38],"integrity":[40],"of":[41,140,191],"digital":[43],"signatures":[44],"they":[45],"employ.":[46],"Universal":[47],"Designated":[48],"Verifier":[49],"Signature":[50,80],"Proof":[51],"(UDVSP)":[52],"may":[53],"be":[54],"an":[55],"intuitive":[56],"solution,":[57,113],"UDVSP":[60,90,106,143,148,176,198],"schemes":[61],"are":[62],"inefficient":[63],"time-consuming":[66],"bilinear":[67,111],"pairing":[68],"operations.":[69],"In":[70],"this":[71],"article,":[72],"we":[73,129],"first":[74,110,118],"adopt":[75],"Elliptic":[77],"Curve":[78],"Digital":[79],"Algorithm":[81],"(ECDSA)":[82],"propose":[84],"a":[85,94,133],"more":[86],"efficient":[87],"blockchain-friendly":[89],"scheme,":[91],"following":[92],"by":[93],"blockchain-based":[95,119],"system":[98,122],"(EMRChain).":[99],"To":[100],"our":[101,104,142,197],"best":[102],"knowledge,":[103],"proposed":[105],"scheme":[107,144,149],"is":[108,116,150,194],"pairing-free":[112],"EMRChain":[115,183],"possess":[124],"anti-malicious":[126],"propagation.":[127],"Furthermore,":[128],"proceed":[130],"provide":[132],"thorough":[134],"security":[135,155],"analysis":[136],"performance":[138],"evaluation":[139],"both":[141],"EMRChain.":[146],"Our":[147],"provably":[151],"secure":[152],"within":[153],"model":[156],"offers":[158],"significant":[159],"computational":[160],"cost":[161],"savings":[162],"(at":[163,170],"least":[164,171],"86.76%)":[165],"reduced":[167],"communication":[168],"overhead":[169],"59.37%)":[172],"compared":[173],"schemes.":[177],"These":[178],"results,":[179],"along":[180],"prototype,":[184],"effectively":[185],"showcase":[186],"utility":[188],"effectiveness":[190],"EMRChain,":[192],"which":[193],"built":[195],"upon":[196],"scheme.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
