{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T22:21:53Z","timestamp":1777587713592,"version":"3.51.4"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05854-4","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:33:02Z","timestamp":1767713582000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy preserving authentication protocol with optimized Elliptic Curve Cryptography for healthcare domain in cloud"],"prefix":"10.1007","volume":"29","author":[{"given":"T.","family":"Anandhi","sequence":"first","affiliation":[]},{"given":"A. Siva","family":"Sangari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"issue":"27","key":"5854_CR1","doi-asserted-by":"publisher","first-page":"70289","DOI":"10.1007\/s11042-024-18253-5","volume":"83","author":"S Arunprasath","year":"2024","unstructured":"Arunprasath, S., Annamalai, S.: Improving patient centric data retrieval and cyber security in healthcare: Privacy preserving solutions for a secure future. Multimedia Tools and Applications 83(27), 70289\u201370319 (2024)","journal-title":"Multimedia Tools and Applications"},{"key":"5854_CR2","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1016\/j.procs.2024.08.082","volume":"241","author":"A Naz","year":"2024","unstructured":"Naz, A., Ali, M., Cheema, S.M., Pires, I.M.: Cloud-Based framework for data exchange to enhance global healthcare. Procedia Comput. Sci. 241, 570\u2013575 (2024)","journal-title":"Procedia Comput. Sci."},{"key":"5854_CR3","doi-asserted-by":"crossref","unstructured":"Lavanya, A., Rajakumar, B., Anita Daniel, D., Surendran, R.: March. EnBF_Crypt: Enhanced Blowfish based Cryptography with Optimal S-Box Selection for Secure Data Sharing. In 2025 7th International Conference on Intelligent Sustainable Systems (ICISS) (pp. 501\u2013506). IEEE. (2025)","DOI":"10.1109\/ICISS63372.2025.11076569"},{"key":"5854_CR4","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-031-67268-2_6","volume-title":"Data Governance: a Guide","author":"D Sargiotis","year":"2024","unstructured":"Sargiotis, D.: Data security and privacy: Protecting sensitive information. In: Sargiotis, D. (ed.) Data Governance: A Guide, pp. 217\u2013245. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-67268-2_6"},{"key":"5854_CR5","doi-asserted-by":"crossref","unstructured":"Surendran, R., Krishnamoorthy, M., Babu, T., Balamurugan, K.S., Manoharan, A.: November. Efficient Authentication Scheme: AI-Assisted Detection Model for Node Capturing Threats in Cyber Security Applications. In 2024 IEEE 9th International Conference on Engineering Technologies and Applied Sciences (ICETAS) (pp. 1\u20136). IEEE. (2024)","DOI":"10.1109\/ICETAS62372.2024.11119995"},{"issue":"1","key":"5854_CR6","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-90908-1","volume":"15","author":"M Anjum","year":"2025","unstructured":"Anjum, M., Kraiem, N., Min, H., Dutta, A.K., Daradkeh, Y.I., Shahab, S.: Opportunistic access control scheme for enhancing IoT-enabled healthcare security using blockchain and machine learning. Sci. Rep. 15(1), 7589 (2025)","journal-title":"Sci. Rep."},{"issue":"1","key":"5854_CR7","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-86658-9","volume":"15","author":"M Natarajan","year":"2025","unstructured":"Natarajan, M., Bha, A., Varun, C.S., Selvarajan, S.: Quantum secure patient login credential system using blockchain for electronic health record sharing framework. Sci. Rep. 15(1), 4023 (2025)","journal-title":"Sci. Rep."},{"key":"5854_CR8","unstructured":"Olufemi, A.A., Aremu, D.R.: Development of Hybridized Security Model for internet of Things Devices using Challenge Handshake Authentication Protocol and Rijndael Algorithm. In Conference Organising Committee (p. 80). (2024)"},{"key":"5854_CR9","doi-asserted-by":"crossref","unstructured":"Gnesdilov, V.S., Mironov, Y.B., Buzhin, I.G., Antonova, V.M.: User authentication and authorization while accessing a virtual laboratory. In 2024 Systems of Signals Generating and Processing in the Field of on Board Communications (pp. 1\u20135). IEEE. (2024), March","DOI":"10.1109\/IEEECONF60226.2024.10496805"},{"issue":"4","key":"5854_CR10","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.26599\/TST.2023.9010080","volume":"29","author":"A Alzu\u2019Bi","year":"2024","unstructured":"Alzu\u2019Bi, A., Alomar, A.A., Alkhaza\u2019Leh, S., Abuarqoub, A., Hammoudeh, M.: A review of privacy and security of edge computing in smart healthcare systems: issues, challenges, and research directions. Tsinghua Sci. Technol. 29(4), 1152\u20131180 (2024)","journal-title":"Tsinghua Sci. Technol."},{"issue":"6","key":"5854_CR11","doi-asserted-by":"publisher","first-page":"8015","DOI":"10.1007\/s10586-024-04411-9","volume":"27","author":"R Agrawal","year":"2024","unstructured":"Agrawal, R., Singhal, S., Sharma, A.: Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Comput 27(6), 8015\u20138030 (2024)","journal-title":"Cluster Comput"},{"issue":"1","key":"5854_CR12","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-58578-7","volume":"14","author":"EU Haque","year":"2024","unstructured":"Haque, E.U., Shah, A., Iqbal, J., Ullah, S.S., Alroobaea, R., Hussain, S.: A scalable blockchain based framework for efficient IoT data management using lightweight consensus. Sci. Rep. 14(1), 7841 (2024)","journal-title":"Sci. Rep."},{"key":"5854_CR13","doi-asserted-by":"publisher","unstructured":"Puneeth, R.P., Parthasarathy, G.: Seamless data exchange: Advancing healthcare with cross-chain interoperability in blockchain for electronic health records. Int. J. Adv. Comput. Sci. Appl. 14(10), 280\u2013289 (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0141031","DOI":"10.14569\/IJACSA.2023.0141031"},{"key":"5854_CR14","unstructured":"Devanapalli, S., Phaneendra, K., ON: Int. J. Adv. Soft Comput. Intell. Syst. (IJASCIS). 2(1), 14\u201326 (2023). CRYPTANALYSIS"},{"issue":"1","key":"5854_CR15","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-89502-2","volume":"15","author":"X Wang","year":"2025","unstructured":"Wang, X., Wang, W., Liu, A., Liu, W., Zhang, Z., Li, W.: PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method. Sci. Rep. 15(1), 6846 (2025)","journal-title":"Sci. Rep."},{"issue":"9","key":"5854_CR16","doi-asserted-by":"publisher","first-page":"6688","DOI":"10.1109\/JIOT.2021.3111552","volume":"9","author":"J Zhang","year":"2021","unstructured":"Zhang, J., Zhang, F.: Identity-based key agreement for blockchain-powered intelligent edge. IEEE Internet Things J. 9(9), 6688\u20136702 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"5854_CR17","doi-asserted-by":"publisher","first-page":"2999","DOI":"10.1007\/s10586-023-04130-7","volume":"27","author":"D Balakrishnan","year":"2024","unstructured":"Balakrishnan, D., Rajkumar, T.D., Dhanasekaran, S., Murugan, B.S.: Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC. Cluster Comput. 27(3), 2999\u20133016 (2024)","journal-title":"Cluster Comput."},{"key":"5854_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2023.101753","volume":"90","author":"MR Servati","year":"2023","unstructured":"Servati, M.R., Safkhani, M.: ECCbAS: An ECC based authentication scheme for healthcare IoT systems. Pervasive and Mobile Computing 90, 101753 (2023)","journal-title":"Pervasive and Mobile Computing"},{"issue":"2","key":"5854_CR19","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.32604\/cmc.2024.054676","volume":"82","author":"S Ullah","year":"2025","unstructured":"Ullah, S., Nasir, H.M., Kadir, K., Khan, A., Memon, A., Azhar, S., Ashraf, M.: End-To-End encryption enabled lightweight mutual authentication scheme for resource constrained IoT network. Computers, Materials & Continua 82(2), 3223\u20133249 (2025)","journal-title":"Computers, Materials & Continua"},{"key":"5854_CR20","doi-asserted-by":"publisher","DOI":"10.1177\/18479790251318538","volume":"17","author":"K Samal","year":"2025","unstructured":"Samal, K., Sunanda, S.K., Jena, D., Patnaik, S.: A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature. International Journal of Engineering Business Management 17, 18479790251318538 (2025)","journal-title":"International Journal of Engineering Business Management"},{"issue":"1","key":"5854_CR21","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s41870-023-01588-x","volume":"16","author":"A Srivastava","year":"2024","unstructured":"Srivastava, A., Gupta, J.: Attack resistant blockchain-based healthcare record system using modified RSA algorithm. International Journal of Information Technology 16(1), 417\u2013424 (2024)","journal-title":"International Journal of Information Technology"},{"key":"5854_CR22","doi-asserted-by":"crossref","unstructured":"Kumaran, G.J., Logu, K.: A cloud based secured fully anonymous HMAC encryption algorithm in comparison with diffie Hellman algorithm for improved key exchange. In AIP Conference Proceedings (Vol. 2729, No. 1). AIP Publishing. (2024), February","DOI":"10.1063\/5.0180771"},{"key":"5854_CR23","doi-asserted-by":"publisher","unstructured":"Rachmayanti, A., Wirawan, W.: Elliptic curve cryptography (ECC) based authentication scheme on IoT networks for health information systems. In: Handayani, P. (ed.), 2024 International Seminar on Intelligent Technology and its Applications (ISITIA) (pp. 125\u2013130). IEEE. (2024), July. https:\/\/doi.org\/10.1109\/ISITIA63062.2024.10668289","DOI":"10.1109\/ISITIA63062.2024.10668289"},{"key":"5854_CR24","doi-asserted-by":"crossref","unstructured":"Sahay, R., Sekaran, K., Priyadharshini, M.: Quantum-Enhanced Elliptic Curve Cryptography Implementations for IoT: A Comparative Analysis. In 2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 102\u2013107). IEEE. (2024), December","DOI":"10.1109\/ANTS63515.2024.10898369"},{"issue":"4","key":"5854_CR25","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s40860-024-00236-w","volume":"10","author":"L Negi","year":"2024","unstructured":"Negi, L., Kumar, D.: ECC based certificateless aggregate signature scheme for healthcare wireless sensor networks. J. Reliable Intell. Environ. 10(4), 489\u2013500 (2024)","journal-title":"J. Reliable Intell. Environ."},{"issue":"1","key":"5854_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/sym16010089","volume":"16","author":"L Wang","year":"2024","unstructured":"Wang, L., Liu, X., Shao, W., Guan, C., Huang, Q., Xu, S., Zhang, S.: A blockchain-based privacy-preserving healthcare data sharing scheme for incremental updates. Symmetry 16(1), 89 (2024)","journal-title":"Symmetry"},{"issue":"1","key":"5854_CR27","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-94550-9","volume":"15","author":"T Sudhakar","year":"2025","unstructured":"Sudhakar, T., Praveen, R., Natarajan, V.: An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. Sci. Rep. 15(1), 9974 (2025)","journal-title":"Sci. Rep."},{"key":"5854_CR28","doi-asserted-by":"publisher","unstructured":"Itoo, S., Baksh, R., Som, L.K., Ahmad, M., Masoodi, F.S.: Enhancing medical data protection with a resilient ECC and blockchain authentication framework. Inform. Secur. Journal: Global Perspective. 34, 1\u201317. (2025). https:\/\/doi.org\/10.1080\/19393555.2025.2533841","DOI":"10.1080\/19393555.2025.2533841"},{"issue":"6","key":"5854_CR29","doi-asserted-by":"publisher","first-page":"e0322131","DOI":"10.1371\/journal.pone.0322131","volume":"20","author":"N Alzahrani","year":"2025","unstructured":"Alzahrani, N.: Security importance of edge-IoT ecosystem: An ECC-based authentication scheme. PLoS One 20(6), e0322131 (2025)","journal-title":"PLoS One"},{"issue":"5","key":"5854_CR30","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s11276-021-02743-7","volume":"30","author":"CH Liu","year":"2024","unstructured":"Liu, C.H., Chen, T.L., Chang, C.Y., Wu, Z.Y.: A reliable authentication scheme of personal health records in cloud computing. Wireless Netw. 30(5), 3759\u20133769 (2024)","journal-title":"Wireless Netw."},{"issue":"3","key":"5854_CR31","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1049\/ise2.12024","volume":"15","author":"S Shukla","year":"2021","unstructured":"Shukla, S., Patel, S.J.: Securing fingerprint templates by enhanced minutiae-based encoding scheme in fuzzy commitment. IET Information Security 15(3), 256\u2013266 (2021)","journal-title":"IET Information Security"},{"key":"5854_CR32","first-page":"529","volume-title":"International Conference on Advances in Computing and Data Sciences","author":"S Shukla","year":"2019","unstructured":"Shukla, S., Patel, S.J.: A context-aware approach to enhance service utility for location privacy in internet of things. In: International Conference on Advances in Computing and Data Sciences, pp. 529\u2013542. Springer Singapore, Singapore (2019)"},{"issue":"5","key":"5854_CR33","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1007\/s00607-021-01041-6","volume":"104","author":"S Shukla","year":"2022","unstructured":"Shukla, S., Patel, S.J.: A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing. Computing 104(5), 1173\u20131202 (2022)","journal-title":"Computing"},{"issue":"2","key":"5854_CR34","doi-asserted-by":"publisher","first-page":"e7889","DOI":"10.1002\/cpe.7889","volume":"36","author":"KA Patel","year":"2024","unstructured":"Patel, K.A., Shukla, S., Patel, S.J.: A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier. Concurrency and Computation: Practice and Experience 36(2), e7889 (2024)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"5854_CR35","doi-asserted-by":"publisher","unstructured":"Shukla, S., Patel, S.J.A.: Novel pairing-free ECC-based ciphertext-policy attribute-based proxy re-encryption for secure cloud storage. In: Proceedings of the 11th International Conference on Information Systems Security and Privacy (ICISSP 2025), vol. 1, pp. 225\u2013233. (2025). https:\/\/doi.org\/10.5220\/0013138600003899","DOI":"10.5220\/0013138600003899"},{"issue":"1","key":"5854_CR36","first-page":"615","volume":"144","author":"Y Lahraoui","year":"2025","unstructured":"Lahraoui, Y., Jebrane, J., Amal, Y., Lazaar, S., Cheng-Chi, L.: IECC-SAIN: Innovative ECC-Based approach for secure authentication in IoT networks. Comput. Model. Eng. Sci. 144(1), 615 (2025)","journal-title":"Comput. Model. Eng. Sci."},{"key":"5854_CR37","doi-asserted-by":"publisher","first-page":"156765","DOI":"10.1109\/ACCESS.2024.3482991","volume":"12","author":"I Keshta","year":"2024","unstructured":"Keshta, I.: A CRC-Based authentication model and ECC-Based authentication protocol for Resource-Constrained IoT applications. IEEE Access 12, 156765\u2013156784 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3482991","journal-title":"IEEE Access"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05854-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05854-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05854-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:33:08Z","timestamp":1767713588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05854-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5854"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05854-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"25 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"77"}}