{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T16:32:23Z","timestamp":1779294743259,"version":"3.51.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T00:00:00Z","timestamp":1529539200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772403"],"award-info":[{"award-number":["61772403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1401251"],"award-info":[{"award-number":["U1401251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2017JM6004"],"award-info":[{"award-number":["2017JM6004"]}]},{"name":"National 111 Program of China","award":["B16037"],"award-info":[{"award-number":["B16037"]}]},{"name":"National 111 Program of China","award":["B08038"],"award-info":[{"award-number":["B08038"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10916-018-0993-7","type":"journal-article","created":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T00:47:37Z","timestamp":1529542057000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":528,"title":["MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-6657","authenticated-orcid":false,"given":"Kai","family":"Fan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shangyang","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanhui","family":"Ren","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yintang","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,6,21]]},"reference":[{"key":"993_CR1","doi-asserted-by":"publisher","unstructured":"Perera, G., Holbrook, A., Lehana, T. et al., Views on health information sharing using electronic medical records. Int. J. Med. Inform. 80, 2011. \n                    https:\/\/doi.org\/10.1016\/j.ijmedinf.2010.11.005\n                    \n                  .","DOI":"10.1016\/j.ijmedinf.2010.11.005"},{"issue":"9","key":"993_CR2","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1038\/nbt.3340","volume":"33","author":"LJ Kish","year":"2015","unstructured":"Kish, L. J., and Topol, E. J., Unpatients\u2013 why patients should own their medical data. Nat. Biotechnol. 33(9):921\u2013924, 2015. \n                    https:\/\/doi.org\/10.1038\/nbt.3340\n                    \n                  .","journal-title":"Nat. Biotechnol."},{"issue":"5","key":"993_CR3","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/JBHI.2016.2614991","volume":"21","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Li, P.-F. et al., A shared decision-making system for diabetes medication choice. IEEE Journal of Biomedical and Health Informatics. 21(5):1280\u20131287, 2017. \n                    https:\/\/doi.org\/10.1109\/JBHI.2016.2614991\n                    \n                  .","journal-title":"IEEE Journal of Biomedical and Health Informatics."},{"issue":"7","key":"993_CR4","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1016\/j.jalz.2017.06.1469","volume":"13","author":"SJ Lee","year":"2017","unstructured":"Lee, S. J., Larson, E. B., Dublin, S., Walker, R. L., Marcum, Z., and Barnes, D. E., Electronic medical record (EMR) predictors of undiagnosed dementia. Alzheimer's and Dementia. 13(7):1040\u20131041, 2017. \n                    https:\/\/doi.org\/10.1016\/j.jalz.2017.06.1469\n                    \n                  .","journal-title":"Alzheimer's and Dementia."},{"key":"993_CR5","doi-asserted-by":"publisher","unstructured":"Thilakanathan, D., Chen, S., Nepal, S., Calvo, R. A., Liu, D., and Zic, J., Secure multiparty data sharing in the cloud using hardware-based TPM devices. In: Proc. IEEE 7th Int. Conf. on Cloud Comput. (CLOUD), pp. 224\u2013231, 2014. \n                    https:\/\/doi.org\/10.1109\/CLOUD.2014.39\n                    \n                  .","DOI":"10.1109\/CLOUD.2014.39"},{"issue":"2","key":"993_CR6","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1007\/s11227-014-1269-8","volume":"70","author":"AN Khan","year":"2014","unstructured":"Khan, A. N., Kiah, M. L. M., Ali, M., Madani, S. A., Khan, A. U. R., and Shamshirband, S., BSS: Block-based sharing scheme for secure data storage services in mobile cloud environment. J. Super Comput. 70(2):946\u2013976, 2014. Springer US. \n                    https:\/\/doi.org\/10.1007\/s11227-014-1269-8\n                    \n                  .","journal-title":"J. Super Comput."},{"key":"993_CR7","doi-asserted-by":"crossref","unstructured":"Jena, D., Mishra, B., et al. Securing Files in the Cloud. Presented at 2016 IEEE International Conference on, 2016. 10.1109\/CCEM.2016.016. Available: \n                    http:\/\/ieeexplore.ieee.org\/document\/7819669\/","DOI":"10.1109\/CCEM.2016.016"},{"issue":"5","key":"993_CR8","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1016\/j.jbi.2013.07.001","volume":"46","author":"A O\u2019Driscoll","year":"2013","unstructured":"O\u2019Driscoll, A., Daugelaite, J., and Sleator, R. D., \u2018Big data\u2019, Hadoop and cloud computing in genomics. J. Biomed. Inform. 46(5):774\u2013781, 2013. \n                    https:\/\/doi.org\/10.1016\/j.jbi.2013.07.001\n                    \n                  .","journal-title":"J. Biomed. Inform."},{"key":"993_CR9","unstructured":"The Economist Intelligence Unit of IBM Institute for Business Value. Healthcare rallies for Blockchains: Keeping patients at the center. Healthcare and Blockchain Executive Report. 2017. Available: \n                    http:\/\/www.ibm.biz\/blockchainhealth\n                    \n                  ."},{"key":"993_CR10","doi-asserted-by":"publisher","unstructured":"Fan, K., Ren, Y., Wang, Y., Li, H., and Yang, Y., Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G. IET Commun. 12(5):527\u2013532, 2018. \n                    https:\/\/doi.org\/10.1049\/iet-com.2017.0619\n                    \n                  .","DOI":"10.1049\/iet-com.2017.0619"},{"issue":"3","key":"993_CR11","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/JSEN.2016.2634018","volume":"17","author":"Z Shen","year":"2016","unstructured":"Shen, Z., Shu, J., and Xue, W., Keyword search with access control over encrypted cloud data. IEEE Sensors J. 17(3):858\u2013868, 2016. \n                    https:\/\/doi.org\/10.1109\/JSEN.2016.2634018\n                    \n                  .","journal-title":"IEEE Sensors J."},{"key":"993_CR12","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.future.2017.02.024","volume":"78","author":"Z Liu","year":"2017","unstructured":"Liu, Z., Li, T. et al., Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78:778\u2013788, 2017. \n                    https:\/\/doi.org\/10.1016\/j.future.2017.02.024\n                    \n                  .","journal-title":"Futur. Gener. Comput. Syst."},{"key":"993_CR13","doi-asserted-by":"publisher","unstructured":"Kim, K., and Zhang, F., ID-based blind signature and ring signature from pairings. International Conference on the Theory & Application., 2002. \n                    https:\/\/doi.org\/10.1007\/3-540-36178-2_33\n                    \n                  .","DOI":"10.1007\/3-540-36178-2_33"},{"key":"993_CR14","doi-asserted-by":"publisher","unstructured":"Salazar, J. L., Tornos, J. L., and Piles, J. J., Efficient ways of prime number generation for ring signatures. Information Security, IET. 10, 2016. \n                    https:\/\/doi.org\/10.1049\/iet-ifs.2014.0547\n                    \n                  .","DOI":"10.1049\/iet-ifs.2014.0547"},{"key":"993_CR15","doi-asserted-by":"crossref","unstructured":"Hardjono, T., and Smith, N., Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proc. 2nd ACM Int. WorkshopIoT Privacy, Trust, Secur. (IoTPTS), pp. 29\u201336, 2016. 10.1145\/2899007.2899012","DOI":"10.1145\/2899007.2899012"},{"key":"993_CR16","doi-asserted-by":"publisher","unstructured":"Zyskind, G., Nathan, O., and Pentland, A., Decentralizing privacy: Using blockchain to protect personal data. Proceedings of IEEE Security and Privacy Workshops:180\u2013184, 2015. \n                    https:\/\/doi.org\/10.1109\/SPW.2015.27\n                    \n                  .","DOI":"10.1109\/SPW.2015.27"},{"key":"993_CR17","unstructured":"Lippman, A., Vieira, T., Ekblaw, A., Azaria, A., et al., MedRec: Using blockchain for medical data. Presented at International Conference on Open & Big Data. 2016. Available: \n                    http:\/\/ieeexplore.ieee.org\/document\/7573685\/"},{"key":"993_CR18","doi-asserted-by":"publisher","unstructured":"Xia, Q., Sifah, E. B. et al., MeDShare: Trust-Less Medical Data Sharing via Blockchain. IEEE Access. 5, 2017. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2017.2730843\n                    \n                  .","DOI":"10.1109\/ACCESS.2017.2730843"},{"issue":"1","key":"993_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MCC.2018.011791712","volume":"5","author":"C Esposito","year":"2018","unstructured":"Esposito, C., Santis, A. D. et al., Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Computing. 5(1):31\u201337, 2018. \n                    https:\/\/doi.org\/10.1109\/MCC.2018.011791712\n                    \n                  .","journal-title":"IEEE Cloud Computing."},{"issue":"1","key":"993_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., and Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel & Distributed Systems 24(1):131\u2013143, 2013. \n                    https:\/\/doi.org\/10.1109\/TPDS.2012.97\n                    \n                  .","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"key":"993_CR21","doi-asserted-by":"publisher","unstructured":"Li, W.-M., Li, X.-L. et al., Flexible CP-ABE Based Access Controlin in Hybrid Cloud System. J. Comput. Sci. Technol. 32, 2017. \n                    https:\/\/doi.org\/10.1007\/s11390-017-1776-1\n                    \n                  .","DOI":"10.1007\/s11390-017-1776-1"},{"key":"993_CR22","doi-asserted-by":"publisher","unstructured":"Goyal, V., Pandey, O. et al., Attribute-based encryption for fine grained access control of encrypted data. In: Proc. 13th ACM conf. on Computer and communications security. pp. 89\u201398, 2006. \n                    https:\/\/doi.org\/10.1145\/1180405.1180418\n                    \n                  .","DOI":"10.1145\/1180405.1180418"},{"issue":"5","key":"993_CR23","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/s00236-016-0270-5","volume":"54","author":"K Gu","year":"2017","unstructured":"Gu, K., Jia, W., Wang, G., and Wen, S., Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5):521\u2013541, 2017. Springer Berlin Heidelberg. \n                    https:\/\/doi.org\/10.1007\/s00236-016-0270-5\n                    \n                  .","journal-title":"Acta Informatica"},{"key":"993_CR24","doi-asserted-by":"publisher","unstructured":"Guo, R., Shi, H., Zhao, Q., and Zheng, D., Secure attribute-based signature scheme with multiple authorities for Blockchain in electronic health records systems. \n                    IEEE\n                    \n                  , 2018. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2018.2801266\n                    \n                  .","DOI":"10.1109\/ACCESS.2018.2801266"},{"key":"993_CR25","doi-asserted-by":"publisher","unstructured":"Ferdous, S., Margheri, A., Paci, F., and Sassone, V., Decentralized runtime monitoring for access control systems in cloud federations. Proc. IEEE Int. Conf. Distrib. Comput.:1\u201311, 2017. \n                    https:\/\/doi.org\/10.1109\/ICDCS.2017.178\n                    \n                  .","DOI":"10.1109\/ICDCS.2017.178"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-0993-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0993-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0993-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:44:16Z","timestamp":1568940256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-0993-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,21]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["993"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-0993-7","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,21]]},"assertion":[{"value":"27 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"Kai Fan declares that he has no conflict of interest. Shangyang Wang declares that he has no conflict of interest. Yanhui Ren declares that he has no conflict of interest. Hui Li declares that he has no conflict of interest. Yintang Yang declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"136"}}