{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T15:04:02Z","timestamp":1774969442985,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s00500-025-11021-z","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:35:17Z","timestamp":1768991717000},"page":"787-808","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum-secure lightweight fuzzy extractor based user authentication scheme for internet of medical things"],"prefix":"10.1007","volume":"30","author":[{"given":"Arman","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"S.","family":"Jagatheswari","sequence":"additional","affiliation":[]},{"given":"R.","family":"Praveen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"issue":"12","key":"11021_CR1","doi-asserted-by":"publisher","first-page":"16081","DOI":"10.1007\/s12652-022-03834-9","volume":"14","author":"AK Agrahari","year":"2023","unstructured":"Agrahari AK, Varma S, Venkatesan S (2023) Two factor authentication protocol for iot based healthcare monitoring system. J Ambient Intell Humaniz Comput 14(12):16081\u201316098","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11021_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad A, Jagatheswari S (2024) Lattice based three party authenticated key agreement scheme in medical iot for post-quantum environment, IEEE Access","DOI":"10.2139\/ssrn.4671916"},{"key":"11021_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad A, Jagatheswari S (2024) Quantum safe multi-factor user authentication protocol for cloud assisted medical iot, IEEE Access","DOI":"10.1109\/ACCESS.2024.3523530"},{"key":"11021_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.est.2024.111024","volume":"84","author":"M Ahrari","year":"2024","unstructured":"Ahrari M, Shirini K, Gharehveran SS, Ahsaee MG, Haidari S, Anvari P (2024) A security-constrained robust optimization for energy management of active distribution networks with presence of energy storage and demand flexibility. J Energy Storage 84:111024","journal-title":"J Energy Storage"},{"issue":"2","key":"11021_CR5","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/JSAC.2020.3020605","volume":"39","author":"T Alladi","year":"2020","unstructured":"Alladi T, Chamola V et al (2020) Harci: A two-way authentication protocol for three entity healthcare iot networks. IEEE J Sel Areas Commun 39(2):361\u2013369","journal-title":"IEEE J Sel Areas Commun"},{"key":"11021_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101200","volume":"26","author":"AN Bahache","year":"2024","unstructured":"Bahache AN, Chikouche N, Akleylek S (2024) Securing cloud-based healthcare applications with a quantum-resistant authentication and key agreement framework. Internet of Things 26:101200","journal-title":"Internet of Things"},{"key":"11021_CR7","doi-asserted-by":"publisher","first-page":"136947","DOI":"10.1109\/ACCESS.2023.3325886","volume":"11","author":"D Chaudhary","year":"2023","unstructured":"Chaudhary D, Kumar U, Saleem K (2023) A construction of three party post quantum secure authenticated key exchange using ring learning with errors and ecc cryptography. IEEE Access 11:136947\u2013136957","journal-title":"IEEE Access"},{"key":"11021_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102831","volume":"136","author":"C-M Chen","year":"2023","unstructured":"Chen C-M, Liu S, Li X, Islam SH, Das AK (2023) A provably-secure authenticated key agreement protocol for remote patient monitoring iomt. J Syst Architect 136:102831","journal-title":"J Syst Architect"},{"key":"11021_CR9","volume":"81","author":"X Chen","year":"2024","unstructured":"Chen X, Wang B, Li H (2024) A privacy-preserving multi-factor authentication scheme for cloud-assisted iomt with post-quantum security. J Inf Security Appl 81:103708","journal-title":"J Inf Security Appl"},{"issue":"10","key":"11021_CR10","doi-asserted-by":"publisher","first-page":"4089","DOI":"10.1007\/s12652-019-01675-7","volume":"11","author":"D Dharminder","year":"2020","unstructured":"Dharminder D, Chandran KP (2020) Lwesm: learning with error based secure communication in mobile devices using fuzzy extractor. J Ambient Intell Humaniz Comput 11(10):4089\u20134100","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11021_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333","volume":"177","author":"M Fotouhi","year":"2020","unstructured":"Fotouhi M, Bayat M, Das AK, Far HAN, Pournaghi SM, Doostari M-A (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care iot. Comput Netw 177:107333","journal-title":"Comput Netw"},{"key":"11021_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2022.103952","volume":"83","author":"SS Gharehveran","year":"2022","unstructured":"Gharehveran SS, Ghassemzadeh S, Rostami N (2022) Two-stage resilience-constrained planning of coupled multi-energy microgrids in the presence of battery energy storages. Sustain Cities Soc 83:103952","journal-title":"Sustain Cities Soc"},{"key":"11021_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.est.2023.108263","volume":"72","author":"SS Gharehveran","year":"2023","unstructured":"Gharehveran SS, Zadeh SG, Rostami N (2023) Resilience-oriented planning and pre-positioning of vehicle-mounted energy storage facilities in community microgrids. J Energy Storage 72:108263","journal-title":"J Energy Storage"},{"issue":"1","key":"11021_CR14","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1186\/s12911-023-02289-y","volume":"23","author":"Y Gheibi","year":"2023","unstructured":"Gheibi Y, Shirini K, Razavi SN, Farhoudi M, Samad-Soltani T (2023) Cnn-res: deep learning framework for segmentation of acute ischemic stroke lesions on multimodal mri images. BMC Med Inform Decis Mak 23(1):192","journal-title":"BMC Med Inform Decis Mak"},{"key":"11021_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107567","volume":"183","author":"R Hajian","year":"2020","unstructured":"Hajian R, ZakeriKia S, Erfani SH, Mirabi M (2020) Shaparak: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement. Comput Netw 183:107567","journal-title":"Comput Netw"},{"issue":"17","key":"11021_CR16","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.3390\/electronics11172777","volume":"11","author":"S Hamid","year":"2022","unstructured":"Hamid S, Bawany NZ, Sodhro AH, Lakhan A, Ahmed S (2022) A systematic review and iomt based big data framework for covid-19 prevention and detection. Electronics 11(17):2777","journal-title":"Electronics"},{"key":"11021_CR17","unstructured":"Journal TWS (2024) Unitedhealth estimates change healthcare hack impacted about 190 million people, The Wall Street JournalAvailable at: https:\/\/www.wsj.com\/articles\/unitedhealth-estimates-change-healthcare-hack-impacted-about-190-million-people-9564533c"},{"issue":"15","key":"11021_CR18","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.3390\/electronics11152314","volume":"11","author":"J Ktari","year":"2022","unstructured":"Ktari J, Frikha T, Ben\u00a0Amor N, Louraidh L, Elmannai H, Hamdi M (2022) Iomt-based platform for e-health monitoring based on the blockchain. Electronics 11(15):2314","journal-title":"Electronics"},{"issue":"1","key":"11021_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4660","volume":"34","author":"U Kumar","year":"2023","unstructured":"Kumar U, Garg M, Kumari S, Dharminder D (2023) A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. Trans Emerg Telecommun Tech 34(1):e4660","journal-title":"Trans Emerg Telecommun Tech"},{"key":"11021_CR20","doi-asserted-by":"publisher","first-page":"107838","DOI":"10.1109\/ACCESS.2020.3001152","volume":"8","author":"A Kumari","year":"2020","unstructured":"Kumari A, Kumar V, Abbasi MY, Kumari S, Chaudhary P, Chen C-M (2020) Csef: cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 8:107838\u2013107852","journal-title":"IEEE Access"},{"issue":"1","key":"11021_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","volume":"14","author":"X Li","year":"2019","unstructured":"Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39\u201350","journal-title":"IEEE Syst J"},{"issue":"17","key":"11021_CR22","doi-asserted-by":"publisher","first-page":"13183","DOI":"10.1109\/JIOT.2021.3055827","volume":"8","author":"J Li","year":"2021","unstructured":"Li J, Su Z, Guo D, Choo K-KR, Ji Y (2021) Psl-maaka: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things. IEEE Internet Things J 8(17):13183\u201313195","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"11021_CR23","doi-asserted-by":"publisher","first-page":"562","DOI":"10.3390\/bios12080562","volume":"12","author":"P Manickam","year":"2022","unstructured":"Manickam P, Mariappan SA, Murugesan SM, Hansda S, Kaushik A, Shinde R, Thipperudraswamy S (2022) Artificial intelligence (ai) and internet of medical things (iomt) assisted biomedical systems for intelligent healthcare. Biosensors 12(8):562","journal-title":"Biosensors"},{"key":"11021_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101228","volume":"27","author":"K Mansoor","year":"2024","unstructured":"Mansoor K, Afzal M, Iqbal W, Abbas Y, Mussiraliyeva S, Chehri A (2024) Pqcaie: Post quantum cryptographic authentication scheme for iot-based e-health systems. Internet of Things 27:101228","journal-title":"Internet of Things"},{"issue":"4","key":"11021_CR25","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.jiph.2024.01.013","volume":"17","author":"DM Mathkor","year":"2024","unstructured":"Mathkor DM, Mathkor N, Bassfar Z, Bantun F, Slama P, Ahmad F, Haque S (2024) Multirole of the internet of medical things (iomt) in biomedical systems for managing smart healthcare systems: An overview of current and future innovative trends. J Infection Public Health 17(4):559\u2013572","journal-title":"J Infection Public Health"},{"key":"11021_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2024.108036","volume":"170","author":"S Messinis","year":"2024","unstructured":"Messinis S, Temenos N, Protonotarios NE, Rallis I, Kalogeras D, Doulamis N (2024) Enhancing internet of medical things security with artificial intelligence: A comprehensive review. Comput Bio Med 170:108036","journal-title":"Comput Bio Med"},{"issue":"6","key":"11021_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4049","volume":"33","author":"M Papaioannou","year":"2022","unstructured":"Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (iomt). Trans Emerg Telecommun Tech 33(6):e4049","journal-title":"Trans Emerg Telecommun Tech"},{"key":"11021_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.110028","volume":"123","author":"S Prajapat","year":"2025","unstructured":"Prajapat S, Thakur G, Kumar P, Das AK, Jamal SS, Susilo W (2025) Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications. Comput Electr Eng 123:110028","journal-title":"Comput Electr Eng"},{"issue":"5","key":"11021_CR29","first-page":"7523","volume":"44","author":"R Praveen","year":"2023","unstructured":"Praveen R, Pabitha P (2023) A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications. J Intell Fuzzy Syst 44(5):7523\u20137542","journal-title":"J Intell Fuzzy Syst"},{"issue":"4","key":"11021_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4732","volume":"34","author":"R Praveen","year":"2023","unstructured":"Praveen R, Pabitha P (2023) Improved gentry-halevi\u2019s fully homomorphic encryption-based lightweight privacy preserving scheme for securing medical internet of things. Transa Emerg Telecommun Tech 34(4):e4732","journal-title":"Transa Emerg Telecommun Tech"},{"key":"11021_CR31","doi-asserted-by":"publisher","first-page":"2415","DOI":"10.1007\/s12083-024-01716-9","volume":"17","author":"JC Priya","year":"2024","unstructured":"Priya JC, Praveen R, Nivitha K, Sudhakar T (2024) Improved blockchain-based user authentication protocol with ring signature for internet of medical things. Peer-to-Peer Netw Appl 17:2415\u20132434","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"11021_CR32","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s11277-023-10428-x","volume":"131","author":"P Ramalingam","year":"2023","unstructured":"Ramalingam P, Pabitha P (2023) Ask-ram-imot: Autonomous shared keys based remote authentication method for internet of medical things applications. Wireless Pers Commun 131(1):273\u2013293","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"11021_CR33","doi-asserted-by":"publisher","first-page":"5557","DOI":"10.1109\/JSYST.2021.3073537","volume":"15","author":"MA Saleem","year":"2021","unstructured":"Saleem MA, Shamshad S, Ahmed S, Ghaffar Z, Mahmood K (2021) Security analysis on \u201ca secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems\u2019\u2019. IEEE Syst J 15(4):5557\u20135559","journal-title":"IEEE Syst J"},{"issue":"1","key":"11021_CR34","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11227-024-06650-4","volume":"81","author":"BB Sezer","year":"2025","unstructured":"Sezer BB, Akleylek S (2025) Pplbb: a novel privacy-preserving lattice-based blockchain platform in iomt. J Supercomput 81(1):219","journal-title":"J Supercomput"},{"issue":"3","key":"11021_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JOEUC.20210501.oa1","volume":"33","author":"M Shuai","year":"2021","unstructured":"Shuai M, Yu N, Wang H, Xiong L, Li Y (2021) A lightweight three-factor anonymous authentication scheme with privacy protection for personalized healthcare applications. J Organizational End User Comput (JOEUC) 33(3):1\u201318","journal-title":"J Organizational End User Comput (JOEUC)"},{"key":"11021_CR36","unstructured":"Statista (2023) Number of cyberattacks involving iot and iomt devices in u.s. healthcare institutions between 2020 and 2022, available at: https:\/\/www.statista.com\/statistics\/1421177\/us-healthcare-cyberattacks-iot-iomt\/"},{"issue":"1","key":"11021_CR37","first-page":"20230220","volume":"33","author":"HA Tarish","year":"2024","unstructured":"Tarish HA, Hassan R, Ariffin KAZ, Jaber MM (2024) Network security framework for internet of medical things applications: A survey. J Intell Syst 33(1):20230220","journal-title":"J Intell Syst"},{"issue":"11","key":"11021_CR38","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf\u2019s law in passwords. IEEE Trans Inf Forensics Secur 12(11):2776\u20132791","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"11021_CR39","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2021.3129512","volume":"20","author":"Q Wang","year":"2021","unstructured":"Wang Q, Wang D, Cheng C, He D (2021) Quantum2fa: Efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Trans Dependable Secure Comput 20(1):193\u2013208","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"11021_CR40","first-page":"2299632","volume":"1","author":"T-Y Wu","year":"2021","unstructured":"Wu T-Y, Yang L, Luo J-N, Ming-Tai\u00a0Wu J (2021) A provably secure authentication and key agreement protocol in cloud-based smart healthcare environments. Security Commun Netw 1:2299632","journal-title":"Security Commun Netw"},{"issue":"17","key":"11021_CR41","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.3390\/math11173701","volume":"11","author":"T-Y Wu","year":"2023","unstructured":"Wu T-Y, Wang L, Chen C-M (2023) Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht. Mathematics 11(17):3701","journal-title":"Mathematics"},{"issue":"1","key":"11021_CR42","first-page":"317","volume":"134","author":"T-Y Wu","year":"2023","unstructured":"Wu T-Y, Meng Q, Yang L, Kumari S, Pirouz M (2023) Amassing the security: An enhanced authentication and key agreement protocol for remote surgery in healthcare environment. Comput Model Eng Sci 134(1):317\u2013341","journal-title":"Comput Model Eng Sci"},{"issue":"1","key":"11021_CR43","first-page":"4799223","volume":"2021","author":"Q Xie","year":"2021","unstructured":"Xie Q, Ding Z, Hu B (2021) A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in internet of things. Security and commun Netw 2021(1):4799223","journal-title":"Security and commun Netw"},{"key":"11021_CR44","doi-asserted-by":"publisher","first-page":"60534","DOI":"10.1109\/ACCESS.2022.3181182","volume":"10","author":"S Yu","year":"2022","unstructured":"Yu S, Park K (2022) Sals-tmis: Secure, anonymous, and lightweight privacy-preserving scheme for iomt-enabled tmis environments. IEEE Access 10:60534\u201360549","journal-title":"IEEE Access"},{"issue":"20","key":"11021_CR45","doi-asserted-by":"publisher","first-page":"20214","DOI":"10.1109\/JIOT.2022.3171791","volume":"9","author":"S Yu","year":"2022","unstructured":"Yu S, Park Y (2022) A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions. IEEE Internet Things J 9(20):20214\u201320228","journal-title":"IEEE Internet Things J"},{"key":"11021_CR46","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Ding J, Snook M, Dagdelen \u00d6 (2015) Authenticated key exchange from ideal lattices, In: Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II 34, Springer, pp. 719\u2013751","DOI":"10.1007\/978-3-662-46803-6_24"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-11021-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-11021-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-11021-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T09:03:56Z","timestamp":1772096636000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-11021-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,21]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["11021"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-11021-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,21]]},"assertion":[{"value":"11 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}