{"id":"https://openalex.org/W4387822429","doi":"https://doi.org/10.3233/jifs-232802","title":"Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system","display_name":"Revised elliptic curve cryptography multi-signature scheme (RECC-MSS) for enhancing security in electronic health record (EHR) system","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4387822429","doi":"https://doi.org/10.3233/jifs-232802"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-232802","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-232802","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088749882","display_name":"G. Uganya","orcid":null},"institutions":[{"id":"https://openalex.org/I1330855593","display_name":"Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology","ror":"https://ror.org/05bc5bx80","country_code":"IN","type":"education","lineage":["https://openalex.org/I1330855593"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"G. Uganya","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I1330855593"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046330745","display_name":"R. M. Bommi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R.M. Bommi","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Chennai Institute of Technology, Chennai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Chennai Institute of Technology, Chennai, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026804864","display_name":"P. Muthu Krishnammal","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]},{"id":"https://openalex.org/I4401726783","display_name":"VIT-AP University","ror":"https://ror.org/007v4hf75","country_code":null,"type":"education","lineage":["https://openalex.org/I4401726783"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P. Muthu Krishnammal","raw_affiliation_strings":["School of Electronics Engineering, VIT-AP University, Amaravati, Andhrapradesh, India"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering, VIT-AP University, Amaravati, Andhrapradesh, India","institution_ids":["https://openalex.org/I4210131147","https://openalex.org/I4401726783"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000789897","display_name":"N. Vijayaraj","orcid":null},"institutions":[{"id":"https://openalex.org/I1330855593","display_name":"Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology","ror":"https://ror.org/05bc5bx80","country_code":"IN","type":"education","lineage":["https://openalex.org/I1330855593"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Vijayaraj","raw_affiliation_strings":["Department of Computer Science and Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I1330855593"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088749882"],"corresponding_institution_ids":["https://openalex.org/I1330855593"],"apc_list":null,"apc_paid":null,"fwci":0.7379,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73314953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"45","issue":"6","first_page":"11993","last_page":"12012"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7530823945999146},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.614229679107666},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6117743253707886},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5938639044761658},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.48424264788627625},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.46991482377052307},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.46120399236679077},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.4482625722885132},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41436439752578735},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.4110873341560364},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38878729939460754},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.37668806314468384},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3644353449344635},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3539677858352661},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3530811071395874},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3237781524658203},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.2857097089290619},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24998077750205994},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.24244359135627747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7530823945999146},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.614229679107666},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6117743253707886},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5938639044761658},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.48424264788627625},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.46991482377052307},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.46120399236679077},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.4482625722885132},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41436439752578735},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.4110873341560364},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38878729939460754},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.37668806314468384},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3644353449344635},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3539677858352661},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3530811071395874},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3237781524658203},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.2857097089290619},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24998077750205994},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.24244359135627747}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-232802","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-232802","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1968455823","https://openalex.org/W2605157201","https://openalex.org/W2769275896","https://openalex.org/W2931991156","https://openalex.org/W2996306964","https://openalex.org/W3008392896","https://openalex.org/W3044881406","https://openalex.org/W3092806822","https://openalex.org/W3133065136","https://openalex.org/W3133567477","https://openalex.org/W3196129747","https://openalex.org/W4206942283","https://openalex.org/W4225579721","https://openalex.org/W4234250652","https://openalex.org/W4292183632","https://openalex.org/W4313201054","https://openalex.org/W4363675256"],"related_works":["https://openalex.org/W2782833818","https://openalex.org/W2360623194","https://openalex.org/W1565266559","https://openalex.org/W3191743943","https://openalex.org/W2037734447","https://openalex.org/W2633581358","https://openalex.org/W2186564849","https://openalex.org/W2111698159","https://openalex.org/W2170258245","https://openalex.org/W2069736719"],"abstract_inverted_index":{"Internet":[0],"of":[1,12,92,155,165,169,205,219,227,232,238,243,249,257],"things":[2],"(IoT)":[3],"is":[4,17,173],"a":[5,26,70,90],"recent":[6],"developing":[7],"technology":[8,51],"in":[9,203],"the":[10,21,65,105,110,114,119,132,139,145,170,217,255,272,275],"field":[11],"smart":[13],"healthcare.":[14],"But":[15],"it":[16,63],"difficult":[18],"to":[19,36,85,89,112,130,162],"transfer":[20],"patient\u2019s":[22],"health":[23],"record":[24],"as":[25,41,109,142,186],"centralized":[27],"network.":[28],"So,":[29],"\u201cblockchain":[30],"technology\u201d":[31],"has":[32,278],"excellent":[33],"consideration":[34],"due":[35],"its":[37],"unique":[38],"qualities":[39],"such":[40,185],"decentralized":[42],"network,":[43],"openness,":[44],"irreversible":[45],"data,":[46],"and":[47,95,195,208,261,284],"cryptography":[48,54,177,290],"functions.":[49],"Blockchain":[50],"depends":[52],"on":[53],"hash":[55,73,77,178,250,291],"techniques":[56],"for":[57,127,135,259,263],"safe":[58],"transmission.":[59],"For":[60],"increased":[61],"security,":[62],"transforms":[64],"variable":[66],"size":[67,91],"inputs":[68],"into":[69,152],"constant":[71],"length":[72],"result.":[74],"Current":[75],"cryptographic":[76],"algorithms":[78],"with":[79,98,138,175,214,246],"digital":[80],"signatures":[81],"are":[82,267],"only":[83],"able":[84],"access":[86,113],"keys":[87],"up":[88,161],"256":[93],"bytes":[94,164,248],"have":[96],"concerns":[97],"single":[99],"node":[100],"accessibility.":[101],"It":[102],"just":[103],"uses":[104],"bits":[106],"that":[107,157],"serve":[108],"key":[111,148],"data.":[115],"This":[116],"paper":[117],"proposes":[118],"\u201cRevised":[120],"Elliptic":[121],"Curve":[122],"Cryptography":[123],"Multi-Signature":[124],"Scheme\u201d":[125],"(RECC-MSS)":[126],"multinode":[128],"availability":[129],"find":[131],"nearest":[133],"path":[134],"secure":[136],"communications":[137],"medical":[140],"image":[141,147],"keys.":[143],"Here,":[144],"input":[146],"can":[149,158],"be":[150,159],"converted":[151],"an":[153],"array":[154],"data":[156],"extended":[160],"512":[163],"size.":[166],"The":[167,211,252],"performance":[168],"proposed":[171,212,276],"algorithm":[172,277],"analyzed":[174],"other":[176,289],"functions":[179],"like":[180],"Secure":[181],"Hashing":[182],"Algorithms":[183],"(SHAs)":[184],"\u201cSHA224\u201d,":[187],"\u201cSHA256\u201d,":[188],"\u201cSHA384\u201d,":[189],"\u201cSHA512\u201d,":[190],"\u201cSHA3-224\u201d,":[191],"\u201cSHA3-256\u201d,":[192],"\u201cSHA3-384\u201d,":[193],"\u201cSHA3-512\u201d,":[194],"\u201cMessage":[196],"Digest5\u201d":[197],"(MD5)":[198],"by":[199],"\u201cOne-way":[200],"ANOVA\u201d":[201],"test":[202],"terms":[204],"\u201caccuracy\u201d,":[206],"\u201cthroughput\u201d":[207],"\u201ctime":[209],"complexity\u201d.":[210],"scheme":[213],"ECC":[215],"achieved":[216,254],"throughput":[218,283],"17.07":[220],"kilobytes":[221],"per":[222],"200":[223],"nano":[224],"seconds,":[225],"93.25%":[226],"accuracy,":[228,281],"1.5":[229,241],"nanoseconds":[230,236,242],"latency":[231,237],"signature":[233,239],"generation,":[234],"1.48":[235],"verification,":[240],"time":[244,264,286],"complexity":[245,265,287],"128":[247],"signature.":[251],"RECC-MSS":[253],"significance":[256],"0.001":[258],"accuracy":[260],"0.002":[262],"which":[266],"less":[268,285],"than":[269,288],"0.05.":[270],"From":[271],"statistical":[273],"analysis,":[274],"significantly":[279],"high":[280,282],"algorithms.":[292]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
