{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:28:47Z","timestamp":1775179727587,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T00:00:00Z","timestamp":1530489600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502048"],"award-info":[{"award-number":["61502048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10916-018-0996-4","type":"journal-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T02:34:07Z","timestamp":1530498847000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":190,"title":["MIStore: a Blockchain-Based Medical Insurance Storage System"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7792-2669","authenticated-orcid":false,"given":"Lijing","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yiru","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,2]]},"reference":[{"key":"996_CR1","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, Available: \n                    http:\/\/bitcoin.org\/bitcoin.pdf\n                    \n                  , 2008"},{"key":"996_CR2","unstructured":"Litecoin. \n                    https:\/\/litecoin.org"},{"key":"996_CR3","unstructured":"Schwartz, D., Youngs, N., and Britto, A.: The Ripple Protocol Consensus Algorithm. Technical Report. \n                    https:\/\/ripple.com\/files\/ripple_consensus_whitepaper.pdf\n                    \n                  , 2014"},{"key":"996_CR4","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., Ethereum: A secure decentralised generalised transaction ledger[J]. Ethereum project yellow paper 151:1\u201332, 2014.","journal-title":"Ethereum project yellow paper"},{"key":"996_CR5","unstructured":"Dwork, C., and Naor, M.: Pricing via processing or combatting junk mail[C]. In: Annual International Cryptology Conference, pp. 139\u2013147. Springer, Berlin, 1992."},{"key":"996_CR6","unstructured":"King, S., and Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake[J]. Self-published paper, August, 2012, 19"},{"key":"996_CR7","unstructured":"Kwon, J.: Tendermint: Consensus without mining. 2014[J]. \n                    https:\/\/tendermint.com\/static\/docs\/tendermint.pdf\n                    \n                  , 2014"},{"key":"996_CR8","unstructured":"Dziembowski, S., Faust, S., Kolmogorov, V., et al.: Proofs of space[C]. In: Annual Cryptology Conference, pp. 585\u2013605. Springer, Berlin, Heidelberg, 2015."},{"key":"996_CR9","unstructured":"Bentov, I., Lee, C., Mizrahi, A., and Rosenfeld, M.: Proof of activity Extending bitcoin\u2019s proof of work via proof of stake. In: Proceedings of the ACM SIGMETRICS 2014 Workshop on Economics of Networked Systems, NetEcon. 2, 2014."},{"key":"996_CR10","unstructured":"Blocki, J., and Zhou, H. S.: Designing proof of human-work puzzles for cryptocurrency and beyond[C]. In: Theory of Cryptography Conference, pp. 517\u2013546. Springer, Berlin, 2016."},{"key":"996_CR11","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro, M., and Liskov, B., Practical Byzantine fault tolerance[C]. OSDI 99:173\u2013186, 1999.","journal-title":"OSDI"},{"key":"996_CR12","unstructured":"King, S., and Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. \n                    https:\/\/peercoin.net\/assets\/paper\/peercoin-paper.pdf\n                    \n                  , 2012"},{"key":"996_CR13","unstructured":"CryptoManiac: Proof of stake. NovaCoin wiki. \n                    https:\/\/github.com\/novacoin-project\/novacoin\/wiki\/Proof-of-stake\n                    \n                  , 2014"},{"issue":"3","key":"996_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2695533.2695545","volume":"42","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Lee, C., Mizrahi, A., and Rosenfeld, M., Proof of activity Extending bitcoin\u2019s proof of work via proof of stake [extended abstract]. SIGMETRICS Perform. Eval. Rev. 42(3):34\u201337, 2014.","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"996_CR15","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform, 2014[J] \n                    https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper\n                    \n                   (visited on 10\/09\/2016), 2014"},{"key":"996_CR16","unstructured":"Dwork, C., and Naor, M.: Pricing via processing or combatting junk mail. In: CRYPTO\u201992, pp. 139\u2013147, 1992."},{"key":"996_CR17","first-page":"359","volume":"58","author":"M Abramaowicz","year":"2016","unstructured":"Abramaowicz, M., Cryptocurrency-based Law[J]. Ariz. L. Rev. 58:359, 2016.","journal-title":"Ariz. L. Rev."},{"issue":"10","key":"996_CR18","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue, X., Wang, H., Jin, D., Li, M., and Jiang, W., Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10):218, 2016.","journal-title":"J. Med. Syst."},{"key":"996_CR19","unstructured":"Ferrer, E. C.: The blockchain: A new framework for robotic swarm systems. arXiv:\n                    1608.00695\n                    \n                  , 2016"},{"key":"996_CR20","unstructured":"Brambilla, G., Amoretti, M., and Zanichelli, F.: Using block chain for peer-to-peer proof-of-location. arXiv:\n                    1607.00174\n                    \n                  , 2016"},{"key":"996_CR21","doi-asserted-by":"publisher","first-page":"612,613","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A., How to share a secret. ACM 22:612,613, 1979.","journal-title":"ACM"},{"key":"996_CR22","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A Joux","year":"2004","unstructured":"Joux, A., A one round protocol for tripartite Die-Hellman. J. Cryptol. 17:263\u2013276, 2004.","journal-title":"J. Cryptol."},{"key":"996_CR23","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","volume":"16","author":"A Joux","year":"2003","unstructured":"Joux, A., and Nguyen, K., Separating decision Die-Hellman from computational Die-Hellman in cryptographic groups. J. Cryptol. 16:239\u2013247, 2003.","journal-title":"J. Cryptol."},{"key":"996_CR24","unstructured":"Bellare, M., and Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols[C]. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM, 1993."},{"key":"996_CR25","unstructured":"Barreto, P. S. L. M., and Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Selected Areas in Cryptography (SAC), 2006."},{"key":"996_CR26","unstructured":"Bernstein, D. J., and Lange, T.: Safecurves: Choosing safe curves for elliptic-curve cryptography. \n                    http:\/\/safecurves.cr.yo.to\n                    \n                  , 2013"},{"issue":"1","key":"996_CR27","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., and Vanstone, S., The elliptic curve digital signature algorithm (ECDSA)[J]. Int. J. Inf. Secur. 1(1):36\u201363, 2001.","journal-title":"Int. J. Inf. Secur."},{"key":"996_CR28","unstructured":"Smart, N. P.: The exact security of ECIES in the generic group model[C]. In: IMA International Conference on Cryptography and Coding, pp. 73\u201384. Springer, Berlin, 2001."},{"key":"996_CR29","unstructured":"Ekblaw, A., Azaria, A., Halamka, J. D., et al.: A Case Study for Blockchain in Healthcare: \u201cMedRec\u201d prototype for electronic health records and medical research data[C]. In: Proceedings of IEEE Open and Big Data Conference, Vol. 13, p. 13, 2016."},{"key":"996_CR30","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia, Q., Sifah, E. B., Asamoah, K. O., et al., MeDShare: Trust-less medical data sharing among cloud service providers via blockchain[J]. IEEE Access 5:14757\u201314767, 2017.","journal-title":"IEEE Access"},{"issue":"2","key":"996_CR31","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TSC.2015.2449314","volume":"9","author":"X Liu","year":"2016","unstructured":"Liu, X., Dong, M., Ota, K., Hung, P., and Liu, A., Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans. Serv. Comput. 9(2):186\u2013198, 2016.","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"7","key":"996_CR32","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/TVT.2015.2466651","volume":"65","author":"S Chang","year":"2016","unstructured":"Chang, S., Zhu, H., Dong, M., Ota, K., Liu, X., and Shen, X., Private and flexible urban message delivery. IEEE Trans. Veh. Technol. 65(7):4900\u20134910, 2016.","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"18","key":"996_CR33","doi-asserted-by":"publisher","first-page":"3751","DOI":"10.1002\/sec.1297","volume":"8","author":"J Yan","year":"2015","unstructured":"Yan, J., Wang, L., Dong, M., Yang, Y., and Yao, W., Identity-based signcryption from lattices. Security and Communication Networks 8(18):3751\u20133770, 2015.","journal-title":"Security and Communication Networks"},{"key":"996_CR34","unstructured":"Parno, B., Howell, J., Gentry, C., et al.: Pinocchio: Nearly practical verifiable computation[C]. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 238\u2013252. IEEE, 2013."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-0996-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0996-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0996-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T17:40:42Z","timestamp":1569260442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-0996-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,2]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["996"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-0996-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,2]]},"assertion":[{"value":"1 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"Lijing Zhou declares that he has no conflict of interest. Licheng Wang declares that he has no conflict of interest. Yiru Sun declares that she has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}],"article-number":"149"}}