{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T06:07:05Z","timestamp":1770098825191,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-026-05945-w","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:42:36Z","timestamp":1770057756000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards quantum-enabled security for IoT-driven smart healthcare systems"],"prefix":"10.1007","volume":"29","author":[{"given":"Youssouf","family":"Achouri","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Hamouid","sequence":"additional","affiliation":[]},{"given":"Rima","family":"Djellab","sequence":"additional","affiliation":[]},{"given":"Mawloud","family":"Omar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"issue":"4","key":"5945_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MIC.2021.3051675","volume":"25","author":"SM Karunarathne","year":"2021","unstructured":"Karunarathne, S.M., Saxena, N., Khan, M.K.: Security and privacy in iot smart healthcare. IEEE Internet Comput. 25(4), 37\u201348 (2021)","journal-title":"IEEE Internet Comput."},{"issue":"4","key":"5945_CR2","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s11227-025-06980-x","volume":"81","author":"BR Bezanjani","year":"2025","unstructured":"Bezanjani, B.R., Ghafouri, S.H., Gholamrezaei, R.: Privacy-preserving healthcare data in iot: a synergistic approach with deep learning and blockchain. J. Supercomput. 81(4), 533 (2025)","journal-title":"J. Supercomput."},{"key":"5945_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.future.2021.11.028","volume":"129","author":"S Singh","year":"2022","unstructured":"Singh, S., Rathore, S., Alfarraj, O., Tolba, A., Yoon, B.: A framework for privacy-preservation of iot healthcare data using federated learning and blockchain technology. Future Gener. Comput. Syst. 129, 380\u2013388 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"5945_CR4","doi-asserted-by":"crossref","unstructured":"Hamouid, K., Mohammedi, M.: Dynamic and flexible access control for iot-enabled smart healthcare. In: International Symposium on Networks, Computers and Communications, ISNCC 2023, Doha, Qatar, October 23-26, 2023, pp. 1\u20136 (2023). IEEE","DOI":"10.1109\/ISNCC58260.2023.10323989"},{"issue":"2","key":"5945_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.36244\/ICJ.2019.2.2","volume":"11","author":"L Gyongyosi","year":"2019","unstructured":"Gyongyosi, L., Bacsardi, L., Imre, S.: A survey on quantum key distribution. Infocommunications J. 11(2), 14\u201321 (2019)","journal-title":"Infocommunications J."},{"key":"5945_CR6","doi-asserted-by":"crossref","unstructured":"Dervisevic, E., Tankovic, A., Fazel, E., Kompella, R., Fazio, P., Vozn\u00e1k, M., Mehic, M.: Quantum key distribution networks - key management: A survey. CoRR arXiv:2408.04580 (2024)","DOI":"10.1145\/3730575"},{"issue":"01","key":"5945_CR7","first-page":"9","volume":"4","author":"A Dahmani","year":"2024","unstructured":"Dahmani, A.: Trust-driven key management for secure wireless body area networks. Int. J Netw. Security 4(01), 9\u201312 (2024)","journal-title":"Int. J Netw. Security"},{"key":"5945_CR8","doi-asserted-by":"publisher","first-page":"175385","DOI":"10.1109\/ACCESS.2020.3026630","volume":"8","author":"ZU Rehman","year":"2020","unstructured":"Rehman, Z.U., Altaf, S., Iqbal, S.: An efficient lightweight key agreement and authentication scheme for wban. IEEE Access 8, 175385\u2013175397 (2020)","journal-title":"IEEE Access"},{"key":"5945_CR9","doi-asserted-by":"publisher","first-page":"178183","DOI":"10.1109\/ACCESS.2020.3025733","volume":"8","author":"AM Almuhaideb","year":"2020","unstructured":"Almuhaideb, A.M., Alqudaihi, K.S.: A lightweight and secure anonymity preserving protocol for wban. IEEE Access 8, 178183\u2013178194 (2020)","journal-title":"IEEE Access"},{"key":"5945_CR10","doi-asserted-by":"publisher","unstructured":"Prajapat, S., Kumar, P., Kumar, S.: A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks. Cluster Computing (7),(2024). https:\/\/doi.org\/10.1007\/s10586-024-04449-9","DOI":"10.1007\/s10586-024-04449-9"},{"issue":"3","key":"5945_CR11","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/s00779-021-01546-z","volume":"27","author":"V Kalaivani","year":"2023","unstructured":"Kalaivani, V., et al.: Enhanced bb84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. Pers. Ubiquit. Comput. 27(3), 875 (2023)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"32","key":"5945_CR12","first-page":"331","volume":"7","author":"YS Suguna","year":"2018","unstructured":"Suguna, Y.S., Reddy, B.K., Durga, V.K., Roshini, A.: Secure quantum key distribution encryption method for efficient data communication in wireless body area sensor net-works. Int. J. Eng. Technol. (UAE) 7(32), 331\u2013335 (2018)","journal-title":"Int. J. Eng. Technol. (UAE)"},{"issue":"14","key":"5945_CR13","doi-asserted-by":"publisher","first-page":"3940","DOI":"10.3390\/s20143940","volume":"20","author":"VS Naresh","year":"2020","unstructured":"Naresh, V.S., Nasralla, M.M., Reddi, S., Garc\u00eda-Magari\u00f1o, I.: Quantum diffie-hellman extended to dynamic quantum group key agreement for e-healthcare multi-agent systems in smart cities. Sensors 20(14), 3940 (2020)","journal-title":"Sensors"},{"key":"5945_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D.: Identity-based encryption from the weil pairing. (2001). Crypto","DOI":"10.1007\/3-540-44647-8_13"},{"key":"5945_CR15","doi-asserted-by":"crossref","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. In: 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM\u201907), pp. 10\u201310 (2007). IEEE","DOI":"10.1109\/ICQNM.2007.18"},{"issue":"3","key":"5945_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11128-020-2595-9","volume":"19","author":"H Iqbal","year":"2020","unstructured":"Iqbal, H., Krawec, W.O.: Semi-quantum cryptography. Quantum Inf. Process. 19(3), 97 (2020)","journal-title":"Quantum Inf. Process."},{"key":"5945_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2021.126265","volume":"582","author":"L Chen","year":"2021","unstructured":"Chen, L., Li, Q., Liu, C., Peng, Y., Yu, F.: Efficient mediated semi-quantum key distribution. Physica A 582, 126265 (2021)","journal-title":"Physica A"},{"key":"5945_CR18","doi-asserted-by":"crossref","unstructured":"Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp. 219\u2013233 (2003)","DOI":"10.1109\/CSFW.2003.1212715"},{"issue":"1","key":"5945_CR19","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-02614-3","volume":"11","author":"C-W Tsai","year":"2021","unstructured":"Tsai, C.-W., Yang, C.-W.: Lightweight mediated semi-quantum key distribution protocol with a dishonest third party based on bell states. Sci. Rep. 11(1), 23222 (2021)","journal-title":"Sci. Rep."},{"issue":"3","key":"5945_CR20","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"5945_CR21","doi-asserted-by":"crossref","unstructured":"Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686\u2013690 (2015). IEEE","DOI":"10.1109\/ISIT.2015.7282542"},{"key":"5945_CR22","unstructured":"Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. arXiv preprint arXiv:1608.07728 (2016)"},{"issue":"26","key":"5945_CR23","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the holevo limit. Phys. Rev. Lett. 85(26), 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5945_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjqt\/s40507-023-00180-3","volume":"10","author":"C-Q Ye","year":"2023","unstructured":"Ye, C.-Q., Li, J., Chen, X.-B., Hou, Y., Wang, Z.: Security and application of semi-quantum key distribution protocol for users with different quantum capabilities. EPJ Quantum Technology 10(1), 1\u201323 (2023)","journal-title":"EPJ Quantum Technology"},{"issue":"1","key":"5945_CR25","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-23135-7","volume":"12","author":"C-W Yang","year":"2022","unstructured":"Yang, C.-W.: Encryption chain based on measurement result and its applications on semi-quantum key distribution protocol. Sci. Rep. 12(1), 18381 (2022)","journal-title":"Sci. Rep."},{"key":"5945_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2023.171125","volume":"287","author":"T Hwang","year":"2023","unstructured":"Hwang, T., Chen, Y.-J., Tsai, C.-W., Kuo, C.-C., Chen, M.-J.: Lightweight mediated quantum key distribution. Optik 287, 171125 (2023)","journal-title":"Optik"},{"issue":"6","key":"5945_CR27","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202X\/ad3f96","volume":"21","author":"S Zhou","year":"2024","unstructured":"Zhou, S., Xie, Q.-M., Zhou, N.-R.: Measurement-free mediated semi-quantum key distribution protocol based on single-particle states. Laser Phys. Lett. 21(6), 065207 (2024)","journal-title":"Laser Phys. Lett."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05945-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05945-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05945-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T18:42:38Z","timestamp":1770057758000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05945-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,2]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5945"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05945-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,2]]},"assertion":[{"value":"27 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"123"}}