{"id":"https://openalex.org/W7128855291","doi":"https://doi.org/10.48550/arxiv.2602.12106","title":"MedExChain: Enabling Secure and Efffcient PHR Sharing Across Heterogeneous Blockchains","display_name":"MedExChain: Enabling Secure and Efffcient PHR Sharing Across Heterogeneous Blockchains","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128855291","doi":"https://doi.org/10.48550/arxiv.2602.12106"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.12106","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125930198","display_name":"Yongyang Lv","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lv, Yongyang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125957019","display_name":"Xiaohong Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xiaohong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100682687","display_name":"Kui Chen","orcid":"https://orcid.org/0000-0002-3910-1402"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Kui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101429856","display_name":"Zhe Hou","orcid":"https://orcid.org/0000-0002-8713-7442"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hou, Zhe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018516368","display_name":"Sin G. Teo","orcid":"https://orcid.org/0000-0003-1090-505X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bai, Guangdong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5032257261","display_name":"Ruitao Feng","orcid":"https://orcid.org/0000-0001-9080-6865"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng, Ruitao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5125930198"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6847000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6847000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.12389999628067017,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.08449999988079071,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6383000016212463},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5309000015258789},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49549999833106995},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4878000020980835},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4447999894618988},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.412200003862381},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.3955000042915344},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.3357999920845032}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7476999759674072},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6383000016212463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6137999892234802},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5309000015258789},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49549999833106995},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4878000020980835},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4447999894618988},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.412200003862381},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3955000042915344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36480000615119934},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.33570000529289246},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.3287999927997589},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.32820001244544983},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.30489999055862427},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2874000072479248},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2822999954223633},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.2791999876499176},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.26820001006126404},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2574999928474426},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.25290000438690186}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.12106","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.12106","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.12106","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.12106","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,14,37,59,98,105,169],"proliferation":[2],"of":[3,16,31,101,128,172],"intelligent":[4,41],"healthcare":[5],"systems,":[6],"patients'":[7],"Personal":[8],"Health":[9],"Records":[10],"(PHR)":[11],"generated":[12],"by":[13,58],"Internet":[15],"Medical":[17],"Things":[18],"(IoMT)":[19],"in":[20,26],"real-time":[21],"play":[22],"a":[23,68,113],"vital":[24],"role":[25],"disease":[27],"diagnosis.":[28],"The":[29,85,126],"integration":[30],"emerging":[32],"blockchain":[33,53,83,114,176],"technologies":[34],"signiffcantly":[35,155],"enhanced":[36],"data":[38,45,70],"security":[39,63,124,147],"inside":[40],"medical":[42],"systems.":[43,84,177],"However,":[44],"sharing":[46,71],"across":[47,81,94,174],"different":[48],"systems":[49],"based":[50],"on":[51],"varied":[52],"architectures":[54],"is":[55,131],"still":[56],"constrained":[57],"unsolved":[60],"performance":[61,99],"and":[62,112,122,142,158,167],"challenges.":[64],"This":[65],"paper":[66],"constructs":[67],"cross-chain":[69],"scheme,":[72],"termed":[73],"MedExChain,":[74],"which":[75],"aims":[76],"to":[77,117],"securely":[78],"share":[79],"PHR":[80,90,173],"heterogeneous":[82],"MedExChain":[86,154],"scheme":[87,106,130],"ensures":[88],"that":[89,153],"can":[91],"be":[92],"shared":[93],"chains":[95],"even":[96],"under":[97],"limitations":[100],"IoMT":[102,165],"devices.":[103],"Additionally,":[104],"incorporates":[107],"Cryptographic":[108],"Reverse":[109],"Firewall":[110],"(CRF)":[111],"audit":[115],"mechanism":[116],"defend":[118],"against":[119],"both":[120],"internal":[121],"external":[123],"threats.":[125],"robustness":[127],"our":[129],"validated":[132],"through":[133],"BAN":[134],"logic,":[135],"Scyther":[136],"tool,":[137],"Chosen":[138],"Plaintext":[139],"Attack":[140,145],"(CPA)":[141],"Algorithm":[143],"Substitution":[144],"(ASA)":[146],"analysis":[148],"veriffcation.":[149],"Extensive":[150],"evaluations":[151],"demonstrate":[152],"minimizes":[156],"computation":[157],"communication":[159],"overhead,":[160],"making":[161],"it":[162],"suitable":[163],"for":[164],"devices":[166],"fostering":[168],"efffcient":[170],"circulation":[171],"diverse":[175]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-14T00:00:00"}
