{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T04:16:36Z","timestamp":1776312996789,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07738-1","type":"journal-article","created":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T11:17:08Z","timestamp":1755515828000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Post-quantum secure fog-edge computing using federated learning with blockchain"],"prefix":"10.1007","volume":"81","author":[{"given":"Jagdeep","family":"Singh","sequence":"first","affiliation":[]},{"given":"Parminder","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Avinash","family":"Kaur","sequence":"additional","affiliation":[]},{"given":"Mustapha","family":"Hedabou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,18]]},"reference":[{"key":"7738_CR1","unstructured":"Abdel-Basset M, Hawash H, Moustafa N, Razzak I, Abd\u00a0Elfattah M. Privacy-preserved learning from non-iid data in fog-assisted IoT: A federated learning approach. Digital Communications and Networks. 2022;"},{"issue":"3","key":"7738_CR2","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JIOT.2020.3017377","volume":"8","author":"Y Zhao","year":"2021","unstructured":"Zhao Y, Zhao J, Jiang L, Tan R, Niyato D, Li Z et al (2021) Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J 8(3):1817\u20131829. https:\/\/doi.org\/10.1109\/JIOT.2020.3017377","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"7738_CR3","doi-asserted-by":"publisher","first-page":"8004","DOI":"10.1109\/TVT.2023.3242585","volume":"72","author":"J Singh","year":"2023","unstructured":"Singh J, Singh P, Hedabou M, Kumar N (2023) An efficient machine learning-based resource allocation scheme for SDN-enabled fog computing environment. IEEE Trans Veh Technol 72(6):8004\u20138017. https:\/\/doi.org\/10.1109\/TVT.2023.3242585","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"7738_CR4","doi-asserted-by":"publisher","first-page":"23553","DOI":"10.1038\/s41598-024-74377-6","volume":"14","author":"X Zhang","year":"2024","unstructured":"Zhang X, Deng H, Wu R, Ren J, Ren Y (2024) PQSF: post-quantum secure privacy-preserving federated learning. Sci Rep 14(1):23553","journal-title":"Sci Rep"},{"key":"7738_CR5","doi-asserted-by":"crossref","unstructured":"Yao A, Jiang F, Li X, Dong C, Xu J, Xu Y, et\u00a0al. A novel security framework for edge computing based uav delivery system. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE; 2021. p. 1031\u20131038","DOI":"10.1109\/TrustCom53373.2021.00142"},{"key":"7738_CR6","doi-asserted-by":"crossref","unstructured":"Adil M, Farouk A, Abulkasim H, Ali A, Song H, Jin Z. NG-ICPS: Next Generation Industrial-CPS, Security Threats in the Era of Artificial Intelligence, Open Challenges With Future Research Directions. IEEE Internet of Things Journal. 2024;","DOI":"10.1109\/JIOT.2024.3486659"},{"issue":"2","key":"7738_CR7","doi-asserted-by":"publisher","first-page":"572","DOI":"10.3390\/s22020572","volume":"22","author":"A Ali","year":"2022","unstructured":"Ali A, Almaiah MA, Hajjej F, Pasha MF, Fang OH, Khan R et al (2022) An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network. Sensors 22(2):572","journal-title":"Sensors"},{"issue":"4","key":"7738_CR8","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.3390\/s22041448","volume":"22","author":"MA Almaiah","year":"2022","unstructured":"Almaiah MA, Hajjej F, Ali A, Pasha MF, Almomani O (2022) A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors 22(4):1448","journal-title":"Sensors"},{"key":"7738_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/su141912951","author":"J Singh","year":"2022","unstructured":"Singh J, Singh P, Amhoud EM, Hedabou M (2022) Energy-efficient and secure load balancing technique for SDN-enabled fog computing. Sustainability. https:\/\/doi.org\/10.3390\/su141912951","journal-title":"Sustainability"},{"issue":"1","key":"7738_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06467-1","volume":"81","author":"U Kumar","year":"2025","unstructured":"Kumar U, Garg M, Chaudhary D (2025) Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device. J Supercomput 81(1):1\u201328","journal-title":"J Supercomput"},{"key":"7738_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107706","volume":"166","author":"A Yao","year":"2025","unstructured":"Yao A, Pal S, Li G, Li X, Zhang Z, Jiang F et al (2025) FedShufde: a privacy preserving framework of federated learning for edge-based smart UAV delivery system. Futur Gener Comput Syst 166:107706","journal-title":"Futur Gener Comput Syst"},{"key":"7738_CR12","doi-asserted-by":"crossref","unstructured":"Ding H, Tang H, Jia C, Wang Y. Post-Quantum Privacy-Preserving Federated Learning via Anti-Gradients Leakage Based on Secure Multi-party Computation Techniques. In: Proceedings of the 4th International Conference on Blockchain Technology and Information Security; 2024. p. 239\u2013242","DOI":"10.1109\/ICBCTIS64495.2024.00045"},{"key":"7738_CR13","unstructured":"Almaiah MA, Ali A, Alkhdour T, Lutfi A. Security Risk and Breach Detection Approach Based Blockchain for Medical Applications. IEEE Access. 2024;"},{"key":"7738_CR14","doi-asserted-by":"crossref","unstructured":"Yao A, Pal S, Dong C, Li X, Liu X. A framework for user biometric privacy protection in UAV delivery systems with edge computing. In: 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops). IEEE; 2024. p. 631\u2013636","DOI":"10.1109\/PerComWorkshops59983.2024.10502849"},{"issue":"1","key":"7738_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TCSS.2021.3100258","volume":"9","author":"Z Qin","year":"2021","unstructured":"Qin Z, Ye J, Meng J, Lu B, Wang L (2021) Privacy-preserving blockchain-based federated learning for marine Internet of Things. IEEE Trans Comput Soc Syst 9(1):159\u2013173","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"2","key":"7738_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.200","volume":"5","author":"A Kumar","year":"2022","unstructured":"Kumar A, Ottaviani C, Gill SS, Buyya R (2022) Securing the future internet of things with post-quantum cryptography. Secur Privacy 5(2):e200","journal-title":"Secur Privacy"},{"key":"7738_CR17","doi-asserted-by":"publisher","first-page":"3338","DOI":"10.1109\/ACCESS.2023.3234816","volume":"11","author":"K Koleci","year":"2023","unstructured":"Koleci K, Mazzetti P, Martina M, Masera G (2023) A flexible NTT-based multiplier for post-quantum cryptography. IEEE Access 11:3338\u20133351","journal-title":"IEEE Access"},{"key":"7738_CR18","unstructured":"Kumari S, Singh M, Singh R, Tewari H. To secure the communication in powerful internet of things using innovative post-quantum cryptographic method. Arabian Journal for Science and Engineering. 2022;p. 1\u201316"},{"key":"7738_CR19","unstructured":"Singh G, Singh J. Prevention of Blackhole Attack in Wireless Sensor Network using IPSec Protocol. International Journal of Advanced Research in Computer Science. 2013;4(11)"},{"issue":"2","key":"7738_CR20","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1049\/ise2.12081","volume":"17","author":"JF Biasse","year":"2023","unstructured":"Biasse JF, Bonnetain X, Kirshanova E, Schrottenloher A, Song F (2023) Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. IET Inf Secur 17(2):171\u2013209","journal-title":"IET Inf Secur"},{"key":"7738_CR21","doi-asserted-by":"crossref","unstructured":"Septien-Hernandez JA, Arellano-Vazquez M, Contreras-Cruz MA, Ramirez-Paredes JP. A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. Sensors. 2022;22(2). 10.3390\/s22020489","DOI":"10.3390\/s22020489"},{"key":"7738_CR22","doi-asserted-by":"crossref","unstructured":"Singh J, Warraich J, Singh P. A Survey on Load Balancing Techniques in Fog Computing. In: 2021 International Conference on Computing Sciences (ICCS); 2021. p. 47\u201352","DOI":"10.1109\/ICCS54944.2021.00018"},{"key":"7738_CR23","doi-asserted-by":"publisher","first-page":"21848","DOI":"10.1109\/ACCESS.2023.3252504","volume":"11","author":"D Putranto","year":"2023","unstructured":"Putranto D, Wardhani RW, Larasati HT, Kim H (2023) Space and time-efficient quantum multiplier in post quantum cryptography era. IEEE Access 11:21848\u201321862. https:\/\/doi.org\/10.1109\/ACCESS.2023.3252504","journal-title":"IEEE Access"},{"issue":"9","key":"7738_CR24","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11128-022-03676-6","volume":"21","author":"F Ye","year":"2022","unstructured":"Ye F, Zhou Z, Li Y (2022) Quantum-assisted blockchain for IoT based on quantum signature. Quantum Inf Process 21(9):327","journal-title":"Quantum Inf Process"},{"key":"7738_CR25","doi-asserted-by":"crossref","unstructured":"Xu G, Xu S, Cao Y, Yun F, Cui Y, Yu Y, et\u00a0al. PPSEB: a postquantum public-key searchable encryption scheme on blockchain for E-healthcare scenarios. Security and Communication Networks. 2022;2022","DOI":"10.1155\/2022\/3368819"},{"key":"7738_CR26","first-page":"143","volume-title":"Sustainable Development Through Engineering Innovations","author":"J Singh","year":"2021","unstructured":"Singh J, Singh P (2021) A Sustainable Resource Allocation Techniques for Fog Computing. In: Singh H, Singh Cheema PP, Garg P (eds) Sustainable Development Through Engineering Innovations. Springer Singapore, Singapore, pp 143\u2013151"},{"issue":"3","key":"7738_CR27","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2022.3144785","volume":"71","author":"DS Gupta","year":"2022","unstructured":"Gupta DS, Karati A, Saad W, da Costa DB (2022) Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles. IEEE Trans Veh Technol 71(3):3255\u20133266","journal-title":"IEEE Trans Veh Technol"},{"key":"7738_CR28","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/j.future.2022.11.034","volume":"141","author":"J Liu","year":"2023","unstructured":"Liu J, Wen J, Zhang B, Dong S, Tang B, Yu Y (2023) A post quantum secure multi-party collaborative signature with deterability in the industrial Internet of Things. Futur Gener Comput Syst 141:663\u2013676","journal-title":"Futur Gener Comput Syst"},{"key":"7738_CR29","doi-asserted-by":"publisher","first-page":"129520","DOI":"10.1109\/ACCESS.2022.3228823","volume":"10","author":"E Zeydan","year":"2022","unstructured":"Zeydan E, Baranda J, Mangues-Bafalluy J (2022) Post-quantum blockchain-based secure service orchestration in multi-cloud networks. IEEE Access 10:129520\u2013129530","journal-title":"IEEE Access"},{"key":"7738_CR30","doi-asserted-by":"crossref","unstructured":"Xu C, Qu Y, Eklund PW, Xiang Y, Gao L. BAFL: An Efficient Blockchain-Based Asynchronous Federated Learning Framework. In: 2021 IEEE Symposium on Computers and Communications (ISCC); 2021. p. 1\u20136","DOI":"10.1109\/ISCC53001.2021.9631405"},{"issue":"2","key":"7738_CR31","doi-asserted-by":"publisher","first-page":"21279","DOI":"10.48084\/etasr.9155","volume":"15","author":"N Ayub","year":"2025","unstructured":"Ayub N, Sarwar N, Ali A, Khan H, Din I, Alqahtani AM et al (2025) Forecasting multi-level deep learning autoencoder architecture (MDLAA) for parametric prediction based on convolutional neural networks. Eng Technol Appl Sci Res 15(2):21279\u201321283","journal-title":"Eng Technol Appl Sci Res"},{"issue":"1","key":"7738_CR32","first-page":"38","volume":"2024","author":"A Davarasan","year":"2024","unstructured":"Davarasan A, Samual J, Palansundram K, Ali A (2024) A comprehensive review of machine learning approaches for android malware detection. J Cyber Secur Risk Auditing 2024(1):38\u201360","journal-title":"J Cyber Secur Risk Auditing"},{"issue":"5","key":"7738_CR33","doi-asserted-by":"publisher","first-page":"2256","DOI":"10.1007\/s12083-023-01531-8","volume":"16","author":"I Ullah","year":"2023","unstructured":"Ullah I, Deng X, Pei X, Jiang P, Mushtaq H (2023) A verifiable and privacy-preserving blockchain-based federated learning approach. Peer Peer Netw Appl 16(5):2256\u20132270","journal-title":"Peer Peer Netw Appl"},{"key":"7738_CR34","first-page":"5","volume":"102","author":"MA Almaiah","year":"2024","unstructured":"Almaiah MA, Ali A, Shishakly R, Alkhdour T, Lutfi A, ALRAWAD M (2024) A novel federated-learning based adversarial framework for audio-visual speech enhancement. J Theor Appl Inf Technol 102:5","journal-title":"J Theor Appl Inf Technol"},{"issue":"16","key":"7738_CR35","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.3390\/electronics10162034","volume":"10","author":"A Ali","year":"2021","unstructured":"Ali A, Rahim HA, Pasha MF, Dowsley R, Masud M, Ali J et al (2021) Security, privacy, and reliability in digital healthcare systems using blockchain. Electronics 10(16):2034","journal-title":"Electronics"},{"issue":"4","key":"7738_CR36","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/s10586-024-04943-0","volume":"28","author":"I Ullah","year":"2025","unstructured":"Ullah I, Deng X, Pei X, Mushtaq H, Khan Z (2025) Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection. Clust Comput 28(4):256","journal-title":"Clust Comput"},{"key":"7738_CR37","first-page":"9","volume":"102","author":"T Alkhdour","year":"2024","unstructured":"Alkhdour T, Almaiah MA, Ali A, Lutfi A, Alrawad M, Tin T (2024) Revolutionizing healthcare: unleashing blockchain brilliance through fuzzy logic authentication. J Theor Appl Inf Technol 102:9","journal-title":"J Theor Appl Inf Technol"},{"issue":"11","key":"7738_CR38","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324. https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc IEEE"},{"key":"7738_CR39","unstructured":"Xu R, Pokhrel SR, Lan Q, Li G. Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing. arXiv preprint arXiv:2302.13258. 2023;"},{"key":"7738_CR40","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y\u00a0Arcas BA. Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR; 2017. p. 1273\u20131282"},{"key":"7738_CR41","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2020) Federated optimization in heterogeneous networks. Proc Mach Learn Syst 2:429\u2013450","journal-title":"Proc Mach Learn Syst"},{"issue":"8","key":"7738_CR42","doi-asserted-by":"publisher","first-page":"4734","DOI":"10.1109\/TCOMM.2020.2990686","volume":"68","author":"SR Pokhrel","year":"2020","unstructured":"Pokhrel SR, Choi J (2020) Federated learning with blockchain for autonomous vehicles: analysis and design challenges. IEEE Trans Commun 68(8):4734\u20134746","journal-title":"IEEE Trans Commun"},{"key":"7738_CR43","doi-asserted-by":"crossref","unstructured":"Farooq MU, Kumar R, Khan A, Singh J, Anwar S, Verma A, et\u00a0al. Sustainable machining of Inconel 718 using minimum quantity lubrication: Artificial intelligence-based process modelling. Heliyon. 2024;10(15)","DOI":"10.1016\/j.heliyon.2024.e34836"},{"key":"7738_CR44","doi-asserted-by":"crossref","unstructured":"Ahmad W, Almaiah MA, Ali A, Al-Shareeda MA. Deep learning based network intrusion detection for unmanned aerial vehicle (uav). In: 2024 7th World Conference on Computing and Communication Technologies (WCCCT). IEEE; 2024. p. 31\u201336","DOI":"10.1109\/WCCCT60665.2024.10541665"},{"key":"7738_CR45","doi-asserted-by":"crossref","unstructured":"Nasr M, Shokri R, Houmansadr A, Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In, (2019) IEEE symposium on security and privacy (SP). IEEE 2019:739\u2013753","DOI":"10.1109\/SP.2019.00065"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07738-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07738-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07738-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T01:46:22Z","timestamp":1757468782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07738-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,18]]},"references-count":45,"journal-issue":{"issue":"13","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["7738"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07738-1","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,18]]},"assertion":[{"value":"31 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1249"}}