{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T19:49:05Z","timestamp":1771876145342,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-06004-0","type":"journal-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:44:11Z","timestamp":1771872251000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revolutionizing medical imaging privacy with lattice-based zk-STARKs in AI driven healthcare"],"prefix":"10.1007","volume":"29","author":[{"given":"Trisha","family":"Bhavini","sequence":"first","affiliation":[]},{"given":"Senthil Prakash","family":"P.N","sequence":"additional","affiliation":[]},{"given":"Ravulapati","family":"Shipreethi","sequence":"additional","affiliation":[]},{"given":"Kamkanala","family":"Keerthi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,23]]},"reference":[{"key":"6004_CR1","unstructured":"Adoji, A.R.A.M.: Securing health data exchange: Advancing quantum-resistant cryptography solutions. Preprint or Technical Report (2024)"},{"key":"6004_CR2","doi-asserted-by":"crossref","unstructured":"Albrecht, M.R., Cini, V., Lai, R.W.F., et al.: Lattice-based snarks: Publicly verifiable, preprocessing, and recursively composable (full version). Cryptology ePrint Archive, Report 2022\/941 (2022)","DOI":"10.1007\/978-3-031-15979-4_4"},{"key":"6004_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Chen, B.: Latticefold+: Faster, simpler, shorter lattice-based folding for succinct proof systems. Cryptology ePrint Archive (2025)","DOI":"10.1007\/978-3-032-01907-3_11"},{"key":"6004_CR4","unstructured":"Chang, Y., Liu, H., Jaff, E., et al.: Sok: Security and privacy risks of medical ai. arXiv preprint arXiv:2409.07415 (2024)"},{"issue":"6","key":"6004_CR5","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1109\/TITS.2021.3066487","volume":"22","author":"JA Chaudhry","year":"2021","unstructured":"Chaudhry, J.A., Saleem, K., Alazab, M., et al.: Data security through zero-knowledge proof and statistical fingerprinting in vehicle-to-healthcare everything (v2hx) communications. IEEE Transactions on Intelligent Transportation Systems 22(6), 3869\u20133879 (2021)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"6004_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e14917","author":"S Chen","year":"2023","unstructured":"Chen, S., Chen, J.: Lattice-based group signatures with forward security for anonymous authentication. Heliyon (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e14917","journal-title":"Heliyon"},{"key":"6004_CR7","doi-asserted-by":"crossref","unstructured":"Chin, E.T.W., Kamsin, I.F.B., Amin, S.B., et al.: Hybrid zero-knowledge access control system in e-health. In: Proceedings of the 2023 15th International Conference on Developments in eSystems Engineering (DeSE), IEEE, 106\u2013111 (2023)","DOI":"10.1109\/DeSE58274.2023.10099775"},{"key":"6004_CR8","doi-asserted-by":"crossref","unstructured":"Derei, T., Aulenbach, B., Carolino, V., et al.: Scaling zero-knowledge to verifiable databases. In: Proceedings of the 1st Workshop on Verifiable Database Systems, 1\u20139 (2023)","DOI":"10.1145\/3595647.3595648"},{"issue":"8","key":"6004_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/info15080463","volume":"15","author":"M El-Hajj","year":"2024","unstructured":"El-Hajj, M., Roelink, B.O.: Evaluating the efficiency of zk-snark, zk-stark, and bulletproof in real-world scenarios: A benchmark study. Information 15(8), 463 (2024)","journal-title":"Information"},{"key":"6004_CR10","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Minelli, M., Nitulescu, A., et al.: Lattice-based zk-snarks from square span programs. Cryptology ePrint Archive, Report 2018\/275 (2018)","DOI":"10.1145\/3243734.3243845"},{"issue":"2","key":"6004_CR11","doi-asserted-by":"publisher","DOI":"10.29304\/jqcm.2023.15.2.1230","volume":"15","author":"BK Hilal","year":"2023","unstructured":"Hilal, B.K., Jawad, M.Q., Shehab, A.W.: New trend for lwe application in different computer science fields. Journal of Al-Qadisiyah for Computer Science and Mathematics 15(2), 27 (2023)","journal-title":"Journal of Al-Qadisiyah for Computer Science and Mathematics"},{"key":"6004_CR12","unstructured":"Ishai, Y., Su, H., Wu, D.J.: Shorter and faster post-quantum designated-verifier zksnarks from lattices. Cryptology ePrint Archive (2023)"},{"key":"6004_CR13","doi-asserted-by":"crossref","unstructured":"Li, K.C., Shi, R.H., Guo, W.P., et al.: Dynamic range query privacy-preserving scheme for blockchain-enhanced smart grid based on lattice. IEEE Transactions on Dependable and Secure Computing (2023)","DOI":"10.1109\/TDSC.2023.3288228"},{"key":"6004_CR14","doi-asserted-by":"crossref","unstructured":"Lin, X., Cao, H., Liu, F.H., et al.: Shorter zk-snarks from square span programs over ideal lattices. Cybersecurity 7(33) (2024)","DOI":"10.1186\/s42400-024-00215-x"},{"key":"6004_CR15","doi-asserted-by":"crossref","unstructured":"Misha, G., Hazela, B., Chaurasia, B.K.: Zero knowledge based authentication for internet of medical things. In: Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)","DOI":"10.1109\/ICCCNT56998.2023.10307359"},{"key":"6004_CR16","doi-asserted-by":"crossref","unstructured":"Mizrahi, A., Koren, N., Rottenstreich, O.: Optimizing merkle proof size for blockchain transactions. In: Proceedings of the 2021 International Conference on Communication Systems and Networks (COMSNETS), IEEE, 299\u2013307 (2021)","DOI":"10.1109\/COMSNETS51098.2021.9352820"},{"key":"6004_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3466245","author":"A Mizrahi","year":"2024","unstructured":"Mizrahi, A., Koren, N., Rottenstreich, O., et al.: Traffic-aware merkle trees for shortening blockchain transaction proofs. IEEE\/ACM Transactions on Networking (2024). https:\/\/doi.org\/10.1109\/TNET.2024.3466245","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"6004_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-0989-z","volume":"1","author":"E Morais","year":"2019","unstructured":"Morais, E., Koens, T., van Wijk, C., et al.: A survey on zero knowledge range proofs and applications. SN Applied Sciences 1, 946 (2019)","journal-title":"SN Applied Sciences"},{"key":"6004_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2024.100974","author":"S Pati","year":"2024","unstructured":"Pati, S., Kumar, S., Varma, A., et al.: Privacy preservation for federated learning in health care. Patterns (2024). https:\/\/doi.org\/10.1016\/j.patter.2024.100974","journal-title":"Patterns"},{"key":"6004_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104992","volume":"196","author":"L Petrosino","year":"2025","unstructured":"Petrosino, L., Masi, L., D\u2019Antoni, F., et al.: A zero-knowledge proof federated learning on dlt for healthcare data. J. Parallel Distrib. Comput. 196, 104992 (2025)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"6004_CR21","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/JIOT.2020.3014686","volume":"8","author":"Y Rahulamathavan","year":"2020","unstructured":"Rahulamathavan, Y., Dogan, S., Shi, X., et al.: Scalar product lattice computation for efficient privacy-preserving systems. IEEE Internet Things J. 8(3), 1417\u20131427 (2020)","journal-title":"IEEE Internet Things J."},{"key":"6004_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e31406","author":"M SaberiKamarposhti","year":"2024","unstructured":"SaberiKamarposhti, M., Ng, K.W., Chua, F.F., et al.: Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2024.e31406","journal-title":"Heliyon"},{"key":"6004_CR23","doi-asserted-by":"crossref","unstructured":"Soni, M., Singh, D.K.: Blockchain implementation for privacy preserving and securing the healthcare data. In: Proceedings of the 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), IEEE, 729\u2013734 (2021)","DOI":"10.1109\/CSNT51715.2021.9509722"},{"key":"6004_CR24","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Sakzad, A., Esgin, M.F., et al.: Luna: Quasi-optimally succinct designated-verifier zero-knowledge arguments from lattices. In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 3167\u20133181 (2024)","DOI":"10.1145\/3658644.3670345"},{"key":"6004_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2024.100419","volume":"10","author":"S Sutradhar","year":"2024","unstructured":"Sutradhar, S., Majumder, S., Bose, R., et al.: A blockchain privacy-conserving framework for secure medical data transmission in the internet of medical things. Decision Analytics Journal 10, 100419 (2024)","journal-title":"Decision Analytics Journal"},{"key":"6004_CR26","doi-asserted-by":"crossref","unstructured":"Verma, P., Tripathi, V., Pant, B.: Zeromedchain: Layer 2 security and zero-knowledge proof integration for decentralized identity and access management in healthcare. In: Proceedings of the 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, 1023\u20131027 (2024)","DOI":"10.23919\/INDIACom61295.2024.10498190"},{"key":"6004_CR27","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Li, W., Liu, X., et al.: Ligerolight: Optimized iop-based zero-knowledge argument for blockchain scalability. IEEE Transactions on Dependable and Secure Computing (2023)","DOI":"10.1109\/TDSC.2023.3336717"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06004-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-06004-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06004-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:44:14Z","timestamp":1771872254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-06004-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,23]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["6004"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-06004-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,23]]},"assertion":[{"value":"26 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"193"}}