{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:08:03Z","timestamp":1774685283553,"version":"3.50.1"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T00:00:00Z","timestamp":1690416000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T00:00:00Z","timestamp":1690416000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05522-7","type":"journal-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:02:21Z","timestamp":1690477341000},"page":"2067-2127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems"],"prefix":"10.1007","volume":"80","author":[{"given":"Maryam","family":"Nasr Esfahani","sequence":"first","affiliation":[]},{"given":"Behrouz Shahgholi","family":"Ghahfarokhi","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Etemadi Borujeni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"issue":"2","key":"5522_CR1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao Z (2014) An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J Med Syst 38(2):13","journal-title":"J Med Syst"},{"issue":"9","key":"5522_CR2","doi-asserted-by":"crossref","first-page":"5340","DOI":"10.1109\/JSEN.2015.2441113","volume":"15","author":"P Gope","year":"2015","unstructured":"Gope P, Hwang T (2015) Untraceable sensor movement in distributed IoT infrastructure. IEEE Sens J 15(9):5340\u20135348","journal-title":"IEEE Sens J"},{"key":"5522_CR3","doi-asserted-by":"crossref","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD). IEEE, pp 25\u201330","DOI":"10.1109\/OBD.2016.11"},{"key":"5522_CR4","doi-asserted-by":"crossref","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017) MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757\u201314767","journal-title":"IEEE Access"},{"key":"5522_CR5","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.jbi.2017.05.012","volume":"71","author":"A Roehrs","year":"2017","unstructured":"Roehrs A, da Costa CA, da RosaRighi R (2017) OmniPHR: a distributed architecture model to integrate personal health records. J Biomed Inform 71:70\u201381","journal-title":"J Biomed Inform"},{"key":"5522_CR6","doi-asserted-by":"crossref","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239\u20139250","journal-title":"IEEE Access"},{"issue":"10","key":"5522_CR7","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40(10):218","journal-title":"J Med Syst"},{"issue":"1","key":"5522_CR8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/s23010014","volume":"23","author":"FNS Vanin","year":"2022","unstructured":"Vanin FNS et al (2022) A blockchain-based end-to-end data protection model for personal health records sharing: a fully homomorphic encryption approach. Sensors 23(1):14","journal-title":"Sensors"},{"key":"5522_CR9","first-page":"183","volume-title":"Security and privacy of electronic healthcare records: concepts, paradigms and solutions","author":"B Mahapatra","year":"2019","unstructured":"Mahapatra B, Krishnamurthi R, Nayyar A (2019) Healthcare models and algorithms for privacy and security in healthcare records. In: Tanwar S, Tyagi S, Kumar N (eds) Security and privacy of electronic healthcare records: concepts, paradigms and solutions. Institution of Engineering and Technology, Stevenage, p 183"},{"issue":"8","key":"5522_CR10","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J Med Syst 42(8):140","journal-title":"J Med Syst"},{"key":"5522_CR11","volume":"203","author":"G Zhang","year":"2022","unstructured":"Zhang G, Yang Z, Liu W (2022) Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Netw 203:108586","journal-title":"Comput Netw"},{"issue":"1","key":"5522_CR12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.18267\/j.aip.176","volume":"11","author":"I Boumezbeur","year":"2022","unstructured":"Boumezbeur I, Zarour K (2022) Privacy-preserving and access control for sharing electronic health record using blockchain technology. Acta Inform Pragensia 11(1):105\u2013122","journal-title":"Acta Inform Pragensia"},{"issue":"12","key":"5522_CR13","doi-asserted-by":"crossref","first-page":"418","DOI":"10.3390\/app6120418","volume":"6","author":"K-H Yeh","year":"2016","unstructured":"Yeh K-H (2016) BSNCare+: a robust IoT-oriented healthcare system with non-repudiation transactions. Appl Sci 6(12):418","journal-title":"Appl Sci"},{"issue":"5","key":"5522_CR14","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope P, Hwang T (2016) BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens J 16(5):1368\u20131376","journal-title":"IEEE Sens J"},{"key":"5522_CR15","volume":"52","author":"M Shuai","year":"2020","unstructured":"Shuai M, Liu B, Yu N, Xiong L, Wang C (2020) Efficient and privacy-preserving authentication scheme for wireless body area networks. J Inf Secur Appl 52:102499","journal-title":"J Inf Secur Appl"},{"key":"5522_CR16","doi-asserted-by":"crossref","unstructured":"Soufiene BO, Bahattab AA, Trad A, Youssef H (2019) RESDA: robust and efficient secure data aggregation scheme in healthcare using the IoT. In: 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). IEEE, pp 209\u2013213","DOI":"10.1109\/IINTEC48298.2019.9112125"},{"key":"5522_CR17","doi-asserted-by":"crossref","first-page":"44536","DOI":"10.1109\/ACCESS.2019.2908664","volume":"7","author":"R Saha","year":"2019","unstructured":"Saha R, Kumar G, Rai MK, Thomas R, Lim S-J (2019) Privacy ensured ${e} $-healthcare for fog-enhanced IoT based applications. IEEE Access 7:44536\u201344543","journal-title":"IEEE Access"},{"key":"5522_CR18","doi-asserted-by":"crossref","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak BD, Al-Turjman F, Aloqaily M, Alfandi O (2019) An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 7:135632\u2013135649","journal-title":"IEEE Access"},{"issue":"5","key":"5522_CR19","doi-asserted-by":"crossref","first-page":"8714","DOI":"10.1109\/JIOT.2019.2923261","volume":"6","author":"W Tang","year":"2019","unstructured":"Tang W, Ren J, Deng K, Zhang Y (2019) Secure data aggregation of lightweight e-healthcare IoT devices with fair incentives. IEEE Internet Things J 6(5):8714\u20138726","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"5522_CR20","doi-asserted-by":"crossref","first-page":"116","DOI":"10.4018\/IJISP.2020040107","volume":"14","author":"SK Jain","year":"2020","unstructured":"Jain SK, Kesswani N (2020) IoTP an efficient privacy preserving scheme for Internet of Things environment. Int J Inf Secur Priv (IJISP) 14(2):116\u2013142","journal-title":"Int J Inf Secur Priv (IJISP)"},{"key":"5522_CR21","doi-asserted-by":"crossref","first-page":"14542","DOI":"10.1109\/JIOT.2021.3066427","volume":"9","author":"S Li","year":"2021","unstructured":"Li S, Zhao S, Min G, Qi L, Liu G (2021) Lightweight privacy-preserving scheme using homomorphic encryption in industrial Internet of Things. IEEE Internet Things J 9:14542\u201314550","journal-title":"IEEE Internet Things J"},{"key":"5522_CR22","doi-asserted-by":"publisher","DOI":"10.1177\/155014772171642","author":"S Rana","year":"2021","unstructured":"Rana S, Mishra D, Arora R (2021) Privacy-preserving key agreement protocol for fog computing supported Internet of Things environment. Wirel Pers Commun. https:\/\/doi.org\/10.1177\/155014772171642","journal-title":"Wirel Pers Commun"},{"issue":"7","key":"5522_CR23","doi-asserted-by":"crossref","first-page":"2171642","DOI":"10.1177\/155014772171642","volume":"12","author":"S Baek","year":"2016","unstructured":"Baek S, Seo S-H, Kim S (2016) Preserving patient\u2019s anonymity for mobile healthcare system in IoT environment. Int J Distrib Sens Netw 12(7):2171642","journal-title":"Int J Distrib Sens Netw"},{"key":"5522_CR24","doi-asserted-by":"crossref","first-page":"10288","DOI":"10.1109\/ACCESS.2016.2638038","volume":"4","author":"K-H Yeh","year":"2016","unstructured":"Yeh K-H (2016) A secure IoT-based healthcare system with body sensor networks. IEEE Access 4:10288\u201310299","journal-title":"IEEE Access"},{"key":"5522_CR25","doi-asserted-by":"crossref","first-page":"4009","DOI":"10.1007\/s11276-021-02652-9","volume":"27","author":"MN Esfahani","year":"2021","unstructured":"Esfahani MN, Ghahfarokhi BS, Borujeni SE (2021) End-to-end privacy preserving scheme for IoT-based healthcare systems. Wirel Netw 27:4009\u20134037","journal-title":"Wirel Netw"},{"key":"5522_CR26","unstructured":"Ekblaw A, Azaria A, Halamka JD, Lippman A (2016) A case study for blockchain in healthcare:\u201cMedRec\u201d prototype for electronic health records and medical research data. In: Proceedings of IEEE Open & Big Data Conference, vol 13, p 13"},{"key":"5522_CR27","unstructured":"Linn LA, Koo MB (2016) Blockchain for health data and its potential use in health it and health care related research. In: ONC\/NIST Use of Blockchain for Healthcare and Research Workshop. ONC\/NIST, Gaithersburg, Maryland, United States, pp 1\u201310"},{"key":"5522_CR28","unstructured":"Ivan D (2016) Moving toward a blockchain-based method for the secure storage of patient records. In: ONC\/NIST Use of Blockchain for Healthcare and Research Workshop. ONC\/NIST, Gaithersburg, Maryland, United States, pp 1\u201311"},{"key":"5522_CR29","unstructured":"Brodersen C et al (2016) Blockchain: securing a new health interoperability experience. Accenture LLP, pp 1\u201311"},{"key":"5522_CR30","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283\u2013297","journal-title":"Sustain Cities Soc"},{"key":"5522_CR31","doi-asserted-by":"crossref","first-page":"11676","DOI":"10.1109\/ACCESS.2018.2801266","volume":"6","author":"R Guo","year":"2018","unstructured":"Guo R, Shi H, Zhao Q, Zheng D (2018) Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6:11676\u201311686","journal-title":"IEEE Access"},{"issue":"8","key":"5522_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-018-0994-6","volume":"42","author":"H Wang","year":"2018","unstructured":"Wang H, Song Y (2018) Secure cloud-based EHR system using attribute-based cryptosystem and blockchain. J Med Syst 42(8):1\u20139","journal-title":"J Med Syst"},{"key":"5522_CR33","doi-asserted-by":"crossref","unstructured":"Sun Y, Zhang R, Wang X, Gao K, Liu L (2018) A decentralizing attribute-based signature for healthcare blockchain. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE, pp 1\u20139","DOI":"10.1109\/ICCCN.2018.8487349"},{"key":"5522_CR34","doi-asserted-by":"crossref","unstructured":"Lee CH, Kim K-H (2018) Implementation of IoT system using block chain with authentication and data protection. In: 2018 International Conference on Information Networking (ICOIN). IEEE, pp 936\u2013940","DOI":"10.1109\/ICOIN.2018.8343261"},{"key":"5522_CR35","doi-asserted-by":"crossref","unstructured":"Rahulamathavan Y, Phan RC-W, Rajarajan M, Misra S, Kondoz A (2017) Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1\u20136","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"5522_CR36","first-page":"105","volume":"254","author":"MA Uddin","year":"2018","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2018) A patient agent to manage blockchains for remote patient monitoring. Stud Health Technol Inform 254:105\u2013115","journal-title":"Stud Health Technol Inform"},{"key":"5522_CR37","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for IoT. In: 2017 IEEE\/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, pp 173\u2013178","DOI":"10.1145\/3054977.3055003"},{"key":"5522_CR38","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100159","volume":"9","author":"MA Uddin","year":"2020","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2020) Blockchain leveraged decentralized IoT eHealth framework. Internet Things 9:100159","journal-title":"Internet Things"},{"key":"5522_CR39","doi-asserted-by":"crossref","first-page":"32700","DOI":"10.1109\/ACCESS.2018.2846779","volume":"6","author":"MA Uddin","year":"2018","unstructured":"Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2018) Continuous patient monitoring with a patient centric agent: a block architecture. IEEE Access 6:32700\u201332726","journal-title":"IEEE Access"},{"key":"5522_CR40","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.csbj.2018.06.003","volume":"16","author":"WJ Gordon","year":"2018","unstructured":"Gordon WJ, Catalini C (2018) Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput Struct Biotechnol J 16:224\u2013230","journal-title":"Comput Struct Biotechnol J"},{"issue":"2","key":"5522_CR41","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2):326","journal-title":"Sensors"},{"key":"5522_CR42","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.future.2019.09.049","volume":"110","author":"J Wang","year":"2020","unstructured":"Wang J et al (2020) A blockchain-based eHealthcare system interoperating with WBANs. Futur Gener Comput Syst 110:675\u2013685","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"5522_CR43","first-page":"1","volume":"42","author":"K Fan","year":"2018","unstructured":"Fan K, Wang S, Ren Y, Li H, Yang Y (2018) Medblock: efficient and secure medical data sharing via blockchain. J Med Syst 42(8):1\u201311","journal-title":"J Med Syst"},{"key":"5522_CR44","doi-asserted-by":"crossref","unstructured":"Hossein KM, Esmaeili ME, Dargahi T (2019) Blockchain-based privacy-preserving healthcare architecture. In: 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE). IEEE, pp 1\u20134","DOI":"10.1109\/CCECE.2019.8861857"},{"key":"5522_CR45","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","volume":"95","author":"A AlOmar","year":"2019","unstructured":"AlOmar A, Bhuiyan MZA, Basu A, Kiyomoto S, Rahman MS (2019) Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Futur Gener Comput Syst 95:511\u2013521","journal-title":"Futur Gener Comput Syst"},{"key":"5522_CR46","doi-asserted-by":"crossref","first-page":"55739","DOI":"10.1109\/ACCESS.2022.3177211","volume":"10","author":"DA Luong","year":"2022","unstructured":"Luong DA, Park JH (2022) Privacy-preserving blockchain-based healthcare system for IoT devices using zk-SNARK. IEEE Access 10:55739\u201355752","journal-title":"IEEE Access"},{"key":"5522_CR47","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.comcom.2021.08.011","volume":"180","author":"KM Hossein","year":"2021","unstructured":"Hossein KM, Esmaeili ME, Dargahi T, Khonsari A, Conti M (2021) BCHealth: a novel blockchain-based privacy-preserving architecture for IoT healthcare applications. Comput Commun 180:31\u201347","journal-title":"Comput Commun"},{"issue":"10","key":"5522_CR48","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/s10916-018-1050-2","volume":"42","author":"P Sharavanan","year":"2018","unstructured":"Sharavanan P, Sridharan D, Kumar R (2018) A privacy preservation secure cross layer protocol design for IoT based wireless body area networks using ECDSA framework. J Med Syst 42(10):196","journal-title":"J Med Syst"},{"issue":"5","key":"5522_CR49","first-page":"2798","volume":"13","author":"MSS Babu","year":"2018","unstructured":"Babu MSS, Balasubadra K (2018) Chronic privacy protection from source to sink in sensor network routing. Int J Appl Eng Res 13(5):2798\u20132808","journal-title":"Int J Appl Eng Res"},{"key":"5522_CR50","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.comcom.2020.02.058","volume":"154","author":"A Farouk","year":"2020","unstructured":"Farouk A, Alahmadi A, Ghose S, Mashatan A (2020) Blockchain platform for industrial healthcare: vision and future opportunities. Comput Commun 154:223\u2013235","journal-title":"Comput Commun"},{"key":"5522_CR51","unstructured":"Simi\u0107 M, Sladi\u0107 G, Milosavljevi\u0107 B (2017) A case study IoT and blockchain powered healthcare. In: Proceedings of ICET, pp 1\u20134"},{"key":"5522_CR52","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.csbj.2018.06.004","volume":"16","author":"J Brogan","year":"2018","unstructured":"Brogan J, Baskaran I, Ramachandran N (2018) Authenticating health activity data using distributed ledger technologies. Comput Struct Biotechnol J 16:257\u2013266","journal-title":"Comput Struct Biotechnol J"},{"issue":"1","key":"5522_CR53","doi-asserted-by":"crossref","DOI":"10.1016\/j.hjdsi.2019.100391","volume":"8","author":"G Tripathi","year":"2020","unstructured":"Tripathi G, Ahad MA, Paiva S (2020) S2HS-A blockchain based approach for smart healthcare system. Healthcare 8(1):100391","journal-title":"Healthcare"},{"key":"5522_CR54","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur Gener Comput Syst 97:512\u2013529","journal-title":"Futur Gener Comput Syst"},{"key":"5522_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-023-02115-9","author":"J Escorcia-Gutierrez","year":"2023","unstructured":"Escorcia-Gutierrez J et al (2023) Privacy Preserving blockchain with energy aware clustering scheme for IoT healthcare systems. Mobile Netw Appl. https:\/\/doi.org\/10.1007\/s11036-023-02115-9","journal-title":"Mobile Netw Appl"},{"key":"5522_CR56","doi-asserted-by":"crossref","unstructured":"Rais K, Derdour M, Amroune M (2022) A blockchain-based model for efficient, privacy-preserving online medical diagnoses. In: 2022 4th International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE, pp 1\u20135","DOI":"10.1109\/PAIS56586.2022.9946870"},{"key":"5522_CR57","doi-asserted-by":"crossref","unstructured":"Jakhar AK, Singh M, Sharma R, Sharma A (2022) A blockchain-based privacy-preserving and access-control framework for electronic health records management","DOI":"10.21203\/rs.3.rs-2048551\/v1"},{"key":"5522_CR58","volume":"50","author":"S Tanwar","year":"2020","unstructured":"Tanwar S, Parekh K, Evans R (2020) Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J Inf Secur Appl 50:102407","journal-title":"J Inf Secur Appl"},{"key":"5522_CR59","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2759787","author":"D Zhang","year":"2022","unstructured":"Zhang D, Wang S, Zhang Y, Zhang Q, Zhang Y (2022) A secure and privacy-preserving medical data sharing via consortium blockchain. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/2759787","journal-title":"Secur Commun Netw"},{"key":"5522_CR60","doi-asserted-by":"crossref","unstructured":"Qu Y, Chen S, Gao L, Cui L, Sood K, Yu S (2022) Personalized privacy-preserving medical data sharing for blockchain-based smart healthcare networks. In: ICC 2022-IEEE International Conference on Communications. IEEE, pp 4229\u20134234","DOI":"10.1109\/ICC45855.2022.9839288"},{"key":"5522_CR61","doi-asserted-by":"crossref","unstructured":"Al Omar A, Rahman MS, Basu A, Kiyomoto S (2017) Medibchain: a blockchain based privacy preserving platform for healthcare data. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. Springer, pp 534\u2013543","DOI":"10.1007\/978-3-319-72395-2_49"},{"key":"5522_CR62","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.jnca.2019.02.027","volume":"135","author":"T McGhin","year":"2019","unstructured":"McGhin T, Choo K-KR, Liu CZ, He D (2019) Blockchain in healthcare applications: research challenges and opportunities. J Netw Comput Appl 135:62\u201375","journal-title":"J Netw Comput Appl"},{"key":"5522_CR63","doi-asserted-by":"crossref","unstructured":"Liang X, Zhao J, Shetty S, Liu J, Li D (2017) Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). IEEE, pp 1\u20135","DOI":"10.1109\/PIMRC.2017.8292361"},{"issue":"5","key":"5522_CR64","doi-asserted-by":"crossref","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","volume":"6","author":"J Xu","year":"2019","unstructured":"Xu J et al (2019) Healthchain: a blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J 6(5):8770\u20138781","journal-title":"IEEE Internet Things J"},{"key":"5522_CR65","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops. IEEE, pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"issue":"7","key":"5522_CR66","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.3390\/s20071898","volume":"20","author":"J Fu","year":"2020","unstructured":"Fu J, Wang N, Cai Y (2020) Privacy-preserving in healthcare blockchain systems based on lightweight message sharing. Sensors 20(7):1898","journal-title":"Sensors"},{"issue":"3","key":"5522_CR67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3577926","volume":"19","author":"P Sharma","year":"2023","unstructured":"Sharma P, Namasudra S, Chilamkurti N, Kim B-G, GonzalezCrespo R (2023) Blockchain-based privacy preservation for IoT-enabled healthcare system. ACM Trans Sens Netw 19(3):1\u201317","journal-title":"ACM Trans Sens Netw"},{"issue":"03","key":"5522_CR68","doi-asserted-by":"crossref","first-page":"154","DOI":"10.36548\/jismac.2020.3.003","volume":"2","author":"H Wang","year":"2020","unstructured":"Wang H (2020) IoT based clinical sensor data management and transfer using blockchain technology. J ISMAC 2(03):154\u2013159","journal-title":"J ISMAC"},{"key":"5522_CR69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3186945","author":"K Azbeg","year":"2022","unstructured":"Azbeg K, Ouchetto O, Andaloussi SJ (2022) Access control and privacy-preserving blockchain-based system for diseases management. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2022.3186945","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"9","key":"5522_CR70","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.1002\/spe.3114","volume":"52","author":"S Chen","year":"2022","unstructured":"Chen S, Fu X, Si H, Wang Y, Gao S, Wang C (2022) Blockchain for health IoT: a privacy-preserving data sharing system. Softw Pract Exp 52(9):2026\u20132044","journal-title":"Softw Pract Exp"},{"key":"5522_CR71","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.procs.2018.10.162","volume":"141","author":"S Badr","year":"2018","unstructured":"Badr S, Gomaa I, Abd-Elrahman E (2018) Multi-tier blockchain framework for IoT-EHRs systems. Proc Comput Sci 141:159\u2013166","journal-title":"Proc Comput Sci"},{"key":"5522_CR72","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2022.101683","volume":"86","author":"ND Sarier","year":"2022","unstructured":"Sarier ND (2022) Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervas Mob Comput 86:101683","journal-title":"Pervas Mob Comput"},{"key":"5522_CR73","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8293716","author":"X Nie","year":"2022","unstructured":"Nie X, Zhang A, Chen J, Qu Y, Yu S (2022) Blockchain-empowered secure and privacy-preserving health data sharing in edge-based IoMT. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/8293716","journal-title":"Secur Commun Netw"},{"key":"5522_CR74","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.procs.2015.05.013","volume":"52","author":"SR Moosavi","year":"2015","unstructured":"Moosavi SR et al (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452\u2013459","journal-title":"Procedia Comput Sci"},{"key":"5522_CR75","doi-asserted-by":"crossref","unstructured":"Moosavi SR et al (2015) Session resumption-based end-to-end security for healthcare internet-of-things. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM). IEEE, pp 581\u2013588","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.83"},{"key":"5522_CR76","doi-asserted-by":"crossref","unstructured":"Chen M, Chen S (2015) An efficient anonymous authentication protocol for RFID systems using dynamic tokens. In: 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp 756\u2013757","DOI":"10.1109\/ICDCS.2015.94"},{"key":"5522_CR77","unstructured":"Nakamoto S, Bitcoin A (2008) A peer-to-peer electronic cash system. Bitcoin. https:\/\/bitcoin.org\/bitcoin.pdf, vol 4"},{"key":"5522_CR78","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijmedinf.2019.104040","volume":"134","author":"A Hasselgren","year":"2020","unstructured":"Hasselgren A, Kralevska K, Gligoroski D, Pedersen SA, Faxvaag A (2020) Blockchain in healthcare and health sciences\u2014a scoping review. Int J Med Inform 134:104040","journal-title":"Int J Med Inform"},{"key":"5522_CR79","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.future.2019.05.023","volume":"100","author":"S Moin","year":"2019","unstructured":"Moin S, Karim A, Safdar Z, Safdar K, Ahmed E, Imran M (2019) Securing IoTs in distributed blockchain: analysis, requirements and open issues. Futur Gener Comput Syst 100:325\u2013343","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"5522_CR80","doi-asserted-by":"crossref","first-page":"1742","DOI":"10.1109\/TNSM.2020.3002957","volume":"17","author":"M Dammak","year":"2020","unstructured":"Dammak M, Senouci S-M, Messous MA, Elhdhili MH, Gransart C (2020) Decentralized lightweight group key management for dynamic access control in IoT environments. IEEE Trans Netw Serv Manag 17(3):1742\u20131757","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"1","key":"5522_CR81","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3390\/s16010075","volume":"16","author":"F Mart\u00edn-Fern\u00e1ndez","year":"2016","unstructured":"Mart\u00edn-Fern\u00e1ndez F, Caballero-Gil P, Caballero-Gil C (2016) Authentication based on non-interactive zero-knowledge proofs for the internet of things. Sensors 16(1):75","journal-title":"Sensors"},{"issue":"7","key":"5522_CR82","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.3390\/app9071370","volume":"9","author":"J Yang","year":"2019","unstructured":"Yang J, Onik MMH, Lee N-Y, Ahmed M, Kim C-S (2019) Proof-of-familiarity: a privacy-preserved blockchain scheme for collaborative medical decision-making. Appl Sci 9(7):1370","journal-title":"Appl Sci"},{"issue":"6","key":"5522_CR83","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.3390\/app9061207","volume":"9","author":"B Shen","year":"2019","unstructured":"Shen B, Guo J, Yang Y (2019) MedChain: efficient healthcare data sharing via blockchain. Appl Sci 9(6):1207","journal-title":"Appl Sci"},{"key":"5522_CR84","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2 L (2006) Automated security protocol analysis with the AVISPA tool. Electron Not Theor Comput Sci 155:61\u201386","journal-title":"Electron Not Theor Comput Sci"},{"issue":"2","key":"5522_CR85","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"issue":"5","key":"5522_CR86","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1016\/j.csi.2005.01.006","volume":"27","author":"W Mao","year":"2005","unstructured":"Mao W (2005) A structured operational semantic modelling of the Dolev\u2013Yao threat environment and its composition with cryptographic protocols. Comput Stand Interfaces 27(5):479\u2013488","journal-title":"Comput Stand Interfaces"},{"issue":"12","key":"5522_CR87","doi-asserted-by":"crossref","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"S Kumari","year":"2018","unstructured":"Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428\u20136453","journal-title":"J Supercomput"},{"key":"5522_CR88","unstructured":"Lincoln NK. Hyperledger fabric 1.4.0 performance information report. https:\/\/hyperledger.github.io\/caliper-benchmarks\/fabric\/resources\/pdf\/Fabric_1.4.0_javascript_node.pdf,  vol 1.0"},{"issue":"5","key":"5522_CR89","doi-asserted-by":"crossref","DOI":"10.1002\/nem.2099","volume":"30","author":"C Gorenflo","year":"2020","unstructured":"Gorenflo C, Lee S, Golab L, Keshav S (2020) FastFabric: scaling hyperledger fabric to 20000 transactions per second. Int J Netw Manag 30(5):E2099","journal-title":"Int J Netw Manag"},{"issue":"3","key":"5522_CR90","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TR.2018.2850966","volume":"67","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood D, Nikooghadam M (2018) Efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire. IEEE Trans Reliab 67(3):1328\u20131339","journal-title":"IEEE Trans Reliab"},{"issue":"4","key":"5522_CR91","first-page":"309","volume":"1","author":"PN Mahalle","year":"2013","unstructured":"Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2013) Identity authentication and capability based access control (IACAC) for the internet of things. J Cyber Secur Mobil 1(4):309\u2013348","journal-title":"J Cyber Secur Mobil"},{"issue":"6","key":"5522_CR92","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1109\/JCN.2009.6388413","volume":"11","author":"XH Le","year":"2009","unstructured":"Le XH et al (2009) An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. J Commun Netw 11(6):599\u2013606","journal-title":"J Commun Netw"},{"key":"5522_CR93","volume-title":"Healthcare sensor networks: challenges toward practical implementation","author":"DTH Lai","year":"2011","unstructured":"Lai DTH, Palaniswami M, Begg R (2011) Healthcare sensor networks: challenges toward practical implementation. CRC Press, Boca Raton"},{"issue":"9","key":"5522_CR94","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1002\/sec.1140","volume":"8","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee S, Das AK (2015) An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur Commun Netw 8(9):1752\u20131771","journal-title":"Secur Commun Netw"},{"key":"5522_CR95","doi-asserted-by":"crossref","unstructured":"Wander AS, Gura N, Eberle H (2005) Energy analysis of public-key cryptography on small wireless devices. In: Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications. IEEE Computer Society Press, California, pp 324\u2013328","DOI":"10.1109\/PERCOM.2005.18"},{"key":"5522_CR96","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.future.2016.02.020","volume":"64","author":"SR Moosavi","year":"2016","unstructured":"Moosavi SR et al (2016) End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur Gener Comput Syst 64:108\u2013124","journal-title":"Futur Gener Comput Syst"},{"key":"5522_CR97","doi-asserted-by":"crossref","unstructured":"Calle M, Kabara J (2006) Measuring energy consumption in wireless sensor networks using GSP. In: 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, pp 1\u20135","DOI":"10.1109\/PIMRC.2006.254184"},{"issue":"1","key":"5522_CR98","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/JSAIT.2021.3054598","volume":"2","author":"A Cohen","year":"2021","unstructured":"Cohen A, D\u2019Oliveira RG, Salamatian S, M\u00e9dard M (2021) Network coding-based post-quantum cryptography. IEEE J Sel Areas Inf Theory 2(1):49\u201364","journal-title":"IEEE J Sel Areas Inf Theory"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05522-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05522-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05522-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T09:27:54Z","timestamp":1705310874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05522-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,27]]},"references-count":98,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5522"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05522-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,27]]},"assertion":[{"value":"25 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}