{"id":"https://openalex.org/W4415721904","doi":"https://doi.org/10.3390/cryptography9040069","title":"A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification","display_name":"A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification","publication_year":2025,"publication_date":"2025-10-30","ids":{"openalex":"https://openalex.org/W4415721904","doi":"https://doi.org/10.3390/cryptography9040069"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9040069","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040069","pdf_url":"https://www.mdpi.com/2410-387X/9/4/69/pdf?version=1761832291","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/4/69/pdf?version=1761832291","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100657575","display_name":"Shaobo Zhang","orcid":"https://orcid.org/0000-0001-7980-9651"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]},{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]},{"id":"https://openalex.org/I4210149102","display_name":"Sanya University","ror":"https://ror.org/04fa2qd52","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149102"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaobo Zhang","raw_affiliation_strings":["Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"],"affiliations":[{"raw_affiliation_string":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","institution_ids":["https://openalex.org/I4210149102","https://openalex.org/I16609230"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108515103","display_name":"Y. Yin","orcid":"https://orcid.org/0009-0007-6959-9452"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]},{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]},{"id":"https://openalex.org/I4210149102","display_name":"Sanya University","ror":"https://ror.org/04fa2qd52","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149102"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijie Yin","raw_affiliation_strings":["Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"],"affiliations":[{"raw_affiliation_string":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","institution_ids":["https://openalex.org/I4210149102","https://openalex.org/I16609230"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100753993","display_name":"Ni Chen","orcid":"https://orcid.org/0000-0002-0628-0723"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]},{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]},{"id":"https://openalex.org/I4210149102","display_name":"Sanya University","ror":"https://ror.org/04fa2qd52","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149102"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nangui Chen","raw_affiliation_strings":["Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China"],"affiliations":[{"raw_affiliation_string":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","institution_ids":["https://openalex.org/I4210149102","https://openalex.org/I16609230"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102949645","display_name":"Huiming Ning","orcid":"https://orcid.org/0000-0002-1439-7198"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]},{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]},{"id":"https://openalex.org/I4210149102","display_name":"Sanya University","ror":"https://ror.org/04fa2qd52","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210149102"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Honghui Ning","raw_affiliation_strings":["College of Law and Public Management, Hunan University of Science and Technology, Xiangtan 411201, China","Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China"],"affiliations":[{"raw_affiliation_string":"College of Law and Public Management, Hunan University of Science and Technology, Xiangtan 411201, China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"Sanya Institute of Hunan University of Science and Technology, Sanya 572024, China","institution_ids":["https://openalex.org/I4210149102","https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100657575"],"corresponding_institution_ids":["https://openalex.org/I121296143","https://openalex.org/I16609230","https://openalex.org/I4210149102"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17093212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"4","first_page":"69","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.5440000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.5440000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.22349999845027924,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.03799999877810478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6144000291824341},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5351999998092651},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.517799973487854},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5127000212669373},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5074999928474426},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.5002999901771545},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.49720001220703125},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.48559999465942383},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4690999984741211},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.40709999203681946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7078999876976013},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6144000291824341},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5351999998092651},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.517799973487854},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5127000212669373},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5074999928474426},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.5002999901771545},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.49720001220703125},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.48559999465942383},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4690999984741211},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.40709999203681946},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.40689998865127563},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3785000145435333},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3700000047683716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36329999566078186},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35040000081062317},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.34599998593330383},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34459999203681946},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.34369999170303345},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3384999930858612},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32120001316070557},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.32030001282691956},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.31869998574256897},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2971000075340271},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.2847999930381775},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2615000009536743},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2581000030040741}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9040069","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040069","pdf_url":"https://www.mdpi.com/2410-387X/9/4/69/pdf?version=1761832291","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:df6badad154d4672bf5900829a3d56be","is_oa":true,"landing_page_url":"https://doaj.org/article/df6badad154d4672bf5900829a3d56be","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 4, p 69 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9040069","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9040069","pdf_url":"https://www.mdpi.com/2410-387X/9/4/69/pdf?version=1761832291","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6434207113","display_name":null,"funder_award_id":"2025JJ","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"},{"id":"https://openalex.org/G8676935197","display_name":null,"funder_award_id":"2025JJ50398","funder_id":"https://openalex.org/F4320322843","funder_display_name":"Natural Science Foundation of\u00a0Hunan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415721904.pdf","grobid_xml":"https://content.openalex.org/works/W4415721904.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W810580911","https://openalex.org/W1524327560","https://openalex.org/W1976420017","https://openalex.org/W2010109924","https://openalex.org/W2063746015","https://openalex.org/W2086298846","https://openalex.org/W2108072891","https://openalex.org/W2270222676","https://openalex.org/W2282199360","https://openalex.org/W2343895449","https://openalex.org/W2549989740","https://openalex.org/W2765861043","https://openalex.org/W2789950367","https://openalex.org/W2794461956","https://openalex.org/W2963180904","https://openalex.org/W2980279200","https://openalex.org/W3010457411","https://openalex.org/W3013745011","https://openalex.org/W3016659975","https://openalex.org/W3128174515","https://openalex.org/W3129387832","https://openalex.org/W3132981372","https://openalex.org/W3134041340","https://openalex.org/W3136931855","https://openalex.org/W3161595163","https://openalex.org/W3187909356","https://openalex.org/W4200357198","https://openalex.org/W4226059379","https://openalex.org/W4283789173","https://openalex.org/W4285134272","https://openalex.org/W4285256539","https://openalex.org/W4312191315","https://openalex.org/W4312268846","https://openalex.org/W4312500318","https://openalex.org/W4313349364","https://openalex.org/W4360603887","https://openalex.org/W4361856576","https://openalex.org/W4376130058","https://openalex.org/W4379117074","https://openalex.org/W4389037476","https://openalex.org/W4392523464","https://openalex.org/W4394862903","https://openalex.org/W4401539846","https://openalex.org/W4406098816","https://openalex.org/W4410053748","https://openalex.org/W4410252675"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"growth":[2],"of":[3,34,80,83],"smart":[4],"healthcare":[5],"improves":[6],"medical":[7,45,55],"efficiency":[8],"through":[9],"electronic":[10],"data":[11,21,46,56,106],"sharing":[12,57],"but":[13],"introduces":[14],"security":[15],"risks":[16],"like":[17],"privacy":[18],"leaks":[19],"and":[20,38,85,88,105,111,126],"tampering.":[22],"However,":[23],"existing":[24,124],"ciphertext-policy":[25],"attribute-based":[26],"encryption":[27],"faces":[28],"challenges":[29],"such":[30,130],"as":[31,131],"single":[32,81],"points":[33],"failure,":[35],"weak":[36],"authentication,":[37],"inadequate":[39],"integrity":[40,107],"protection,":[41],"hindering":[42],"secure,":[43],"efficient":[44],"sharing.":[47],"Therefore,":[48],"we":[49],"propose":[50],"LDDV,":[51],"a":[52,64,91],"lightweight":[53,65,92],"decentralized":[54],"scheme":[58],"with":[59],"dual":[60,93],"verification.":[61,108],"LDDV":[62,116],"constructs":[63],"multi-authority":[66],"collaborative":[67],"key":[68],"management":[69],"architecture":[70],"based":[71,96],"on":[72,97],"elliptic":[73,98],"curve":[74,99],"cryptography,":[75],"which":[76],"eliminates":[77],"the":[78],"risk":[79],"point":[82],"failure":[84],"balances":[86],"reliability":[87],"efficiency.":[89],"Meanwhile,":[90],"verification":[94],"mechanism":[95],"digital":[100],"signature":[101],"provides":[102],"identity":[103],"authentication":[104],"Security":[109],"analysis":[110],"experimental":[112],"results":[113],"show":[114],"that":[115],"achieves":[117],"28\u201342%":[118],"faster":[119],"decryption":[120],"speeds":[121],"compared":[122],"to":[123],"schemes":[125],"resists":[127],"specific":[128],"threats":[129],"chosen":[132],"plaintext":[133],"attacks.":[134]},"counts_by_year":[],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-31T00:00:00"}
