{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:36:56Z","timestamp":1767065816834,"version":"3.28.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s12083-024-01805-9","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:23:26Z","timestamp":1726125806000},"page":"4049-4069","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Homomorphic multi-party computation for Internet of Medical Things"],"prefix":"10.1007","volume":"17","author":[{"given":"Amin","family":"Hosseingholizadeh","sequence":"first","affiliation":[]},{"given":"Farhad","family":"Rahmati","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"issue":"4","key":"1805_CR1","first-page":"240","volume":"12","author":"GJ Joyia","year":"2017","unstructured":"Joyia GJ, Liaqat RM, Farooq A, Rehman S (2017) Internet of medical things (iomt): applications, benefits and future challenges in healthcare domain. J Commun 12(4):240\u2013247","journal-title":"J Commun"},{"issue":"5","key":"1805_CR2","doi-asserted-by":"publisher","first-page":"3810","DOI":"10.1109\/JIOT.2018.2849014","volume":"5","author":"A Gatouillat","year":"2018","unstructured":"Gatouillat A, Badr Y, Massot B, Sejdi\u0107 E (2018) Internet of medical things: a review of recent contributions dealing with cyber-physical systems in medicine. IEEE Internet Things J 5(5):3810\u20133822","journal-title":"IEEE Internet Things J"},{"key":"1805_CR3","doi-asserted-by":"publisher","first-page":"4648","DOI":"10.1109\/TIFS.2021.3111747","volume":"16","author":"B Li","year":"2021","unstructured":"Li B, He Q, Chen F, Dai H, Jin H, Xiang Y, Yang Y (2021) Cooperative assurance of cache data integrity for mobile edge computing. IEEE Trans Inf Forensics Secur 16:4648\u20134662","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"14","key":"1805_CR4","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP (2021) Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J 8(14):11717\u201311731","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"1805_CR5","doi-asserted-by":"publisher","first-page":"8091","DOI":"10.1109\/JIOT.2021.3138104","volume":"9","author":"G Wu","year":"2021","unstructured":"Wu G, Wang S, Ning Z et al (2021) Blockchain-enabled privacy-preserving access control for data publishing and sharing in the internet of medical things. IEEE Internet Things J 9(11):8091\u20138104","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1805_CR6","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1007\/s12083-022-01313-8","volume":"15","author":"M Ali","year":"2022","unstructured":"Ali M, Liu X (2022) Lightweight verifiable data management system for cloud-assisted wireless body area networks. Peer-to-Peer Netw Appl 15(4):1792\u20131816","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1805_CR7","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Annual cryptology conference, pp 505\u2013524, Springer","DOI":"10.1007\/978-3-642-22792-9_29"},{"issue":"6","key":"1805_CR8","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1137\/14100124X","volume":"46","author":"A L\u00f3pez-Alt","year":"2017","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V (2017) Multikey fully homomorphic encryption and applications. SIAM J Comput 46(6):1827\u20131892","journal-title":"SIAM J Comput"},{"issue":"1","key":"1805_CR9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1515\/jmc-2015-0052","volume":"14","author":"Y Dor\u00f6z","year":"2020","unstructured":"Dor\u00f6z Y, Sunar B (2020) Flattening ntru for evaluation key free homomorphic encryption. J Math Crypt 14(1):66\u201383","journal-title":"J Math Crypt"},{"key":"1805_CR10","doi-asserted-by":"crossref","unstructured":"Goldwasser S, Kalai Y, Popa RA, Vaikuntanathan V, Zeldovich N (2013) Reusable garbled circuits and succinct functional encryption. In: Proceedings of the forty-fifth annual ACM symposium on theory of computing, pp 555\u2013564","DOI":"10.1145\/2488608.2488678"},{"key":"1805_CR11","doi-asserted-by":"crossref","unstructured":"Agrawal S (2017) Stronger security for reusable garbled circuits, general definitions and attacks. In: Advances in cryptology\u2013CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20\u201324, 2017, Proceedings, Part I 37, pp 3\u201335, Springer","DOI":"10.1007\/978-3-319-63688-7_1"},{"key":"1805_CR12","doi-asserted-by":"crossref","unstructured":"Ali M, Sadeghi M-R, Liu X, Vasilakos AV (2022) Anonymous aggregate fine-grained cloud data verification system for smart health. IEEE Trans Cloud Comput","DOI":"10.1109\/TCC.2022.3229269"},{"issue":"4","key":"1805_CR13","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.3390\/s20041088","volume":"20","author":"M Ali","year":"2020","unstructured":"Ali M, Sadeghi M-R, Liu X (2020) Lightweight fine-grained access control for wireless body area networks. Sensors 20(4):1088","journal-title":"Sensors"},{"key":"1805_CR14","doi-asserted-by":"crossref","unstructured":"Li S, Zhao S, Min G, Qi L, Liu G (2021) Lightweight privacy-preserving scheme using homomorphic encryption in industrial internet of things. IEEE Internet Things J 9(16):14542\u201314550","DOI":"10.1109\/JIOT.2021.3066427"},{"issue":"9","key":"1805_CR15","doi-asserted-by":"publisher","first-page":"8700","DOI":"10.1109\/JIOT.2020.2998109","volume":"7","author":"S Ramesh","year":"2020","unstructured":"Ramesh S, Govindarasu M (2020) An efficient framework for privacy-preserving computations on encrypted iot data. IEEE Internet Things J 7(9):8700\u20138708","journal-title":"IEEE Internet Things J"},{"key":"1805_CR16","doi-asserted-by":"publisher","first-page":"5239","DOI":"10.1109\/TIFS.2021.3127023","volume":"16","author":"Y Chen","year":"2021","unstructured":"Chen Y, Dong S, Li T, Wang Y, Zhou H (2021) Dynamic multi-key fhe in asymmetric key setting from lwe. IEEE Trans Inf Forensics Secur 16:5239\u20135249","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1805_CR17","unstructured":"Gentry C et\u00a0al (2009) A fully homomorphic encryption scheme, vol 20. Stanford university Stanford"},{"key":"1805_CR18","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the forty-first annual ACM symposium on theory of computing, pp 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"1805_CR19","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S, Smart NP (2012) Better bootstrapping in fully homomorphic encryption. In: International workshop on public key cryptography, pp 1\u201316, Springer","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"1805_CR20","doi-asserted-by":"crossref","unstructured":"Van Dijk M, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Annual international conference on the theory and applications of cryptographic techniques, pp 24\u201343, Springer","DOI":"10.1007\/978-3-642-13190-5_2"},{"issue":"3","key":"1805_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):1\u201336","journal-title":"ACM Trans Comput Theory (TOCT)"},{"key":"1805_CR22","unstructured":"Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive"},{"key":"1805_CR23","doi-asserted-by":"crossref","unstructured":"Brakerski Z (2012) Fully homomorphic encryption without modulus switching from classical gapsvp. In: Annual cryptology conference, pp 868\u2013886, Springer","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"1805_CR24","doi-asserted-by":"crossref","unstructured":"Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Annual cryptology conference, pp 75\u201392, Springer","DOI":"10.1007\/978-3-642-40041-4_5"},{"issue":"6","key":"1805_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM (JACM) 56(6):1\u201340","journal-title":"J ACM (JACM)"},{"key":"1805_CR26","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Advances in cryptology\u2013EUROCRYPT 2010: 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings 29, pp 1\u201323, Springer","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"1805_CR27","unstructured":"Goldwasser S, Kalai YT, Peikert C, Vaikuntanathan V (2010) Robustness of the learning with errors assumption"},{"issue":"7","key":"1805_CR28","first-page":"2189","volume":"20","author":"Z Min","year":"2019","unstructured":"Min Z, Yang G, Wang J, Kim G-J (2019) A privacy-preserving bgn-type parallel homomorphic encryption algorithm based on lwe. J Int Technol 20(7):2189\u20132200","journal-title":"J Int Technol"},{"key":"1805_CR29","doi-asserted-by":"publisher","first-page":"50588","DOI":"10.1109\/ACCESS.2019.2909286","volume":"7","author":"X Song","year":"2019","unstructured":"Song X, Chen Z, Chen L (2019) A multi-bit fully homomorphic encryption with shorter public key from lwe. IEEE Access 7:50588\u201350594","journal-title":"IEEE Access"},{"key":"1805_CR30","doi-asserted-by":"publisher","first-page":"168008","DOI":"10.1109\/ACCESS.2020.3023255","volume":"8","author":"Y Su","year":"2020","unstructured":"Su Y, Yang B, Yang C, Tian L (2020) Fpga-based hardware accelerator for leveled ring-lwe fully homomorphic encryption. IEEE Access 8:168008\u2013168025","journal-title":"IEEE Access"},{"key":"1805_CR31","doi-asserted-by":"crossref","unstructured":"Asharov G, Jain A, L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V, Wichs D (2012) Multiparty computation with low communication, computation and interaction via threshold fhe. In: Advances in Cryptology\u2013EUROCRYPT 2012: 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15-19, 2012. Proceedings 31, pp 483\u2013501, Springer","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"1805_CR32","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the forty-fourth annual ACM symposium on theory of computing, pp 1219\u20131234","DOI":"10.1145\/2213977.2214086"},{"key":"1805_CR33","doi-asserted-by":"crossref","unstructured":"Clear M, McGoldrick C (2015) Multi-identity and multi-key leveled fhe from learning with errors. In: Advances in cryptology\u2013CRYPTO 2015: 35th annual cryptology conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II 35, pp 630\u2013656, Springer","DOI":"10.1007\/978-3-662-48000-7_31"},{"issue":"5","key":"1805_CR34","doi-asserted-by":"publisher","first-page":"564","DOI":"10.26599\/TST.2019.9010076","volume":"25","author":"X Che","year":"2020","unstructured":"Che X, Zhou T, Li N, Zhou H, Chen Z, Yang X (2020) Modified multi-key fully homomorphic encryption based on ntru cryptosystem without key-switching. Tsinghua Sci Technol 25(5):564\u2013578","journal-title":"Tsinghua Sci Technol"},{"key":"1805_CR35","doi-asserted-by":"publisher","first-page":"56724","DOI":"10.1109\/ACCESS.2019.2913943","volume":"7","author":"N Li","year":"2019","unstructured":"Li N, Zhou T, Yang X, Han Y, Liu W, Tu G (2019) Efficient multi-key fhe with short extended ciphertexts and directed decryption protocol. IEEE Access 7:56724\u201356732","journal-title":"IEEE Access"},{"key":"1805_CR36","unstructured":"Collberg C, Thomborson C, Low D (1997) A taxonomy of obfuscating transformations. Technical Report, Department of Computer Science, The University of Auckland, New Zealand"},{"key":"#cr-split#-1805_CR37.1","unstructured":"Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K (2001) On the"},{"key":"#cr-split#-1805_CR37.2","unstructured":"(im) possibility of obfuscating programs. In: Advances in cryptology?CRYPTO 2001: 21st annual international cryptology conference, Santa Barbara, California, USA, August 19-23, 2001 Proceedings, pp 1-18, Springer"},{"key":"1805_CR38","unstructured":"Goldwasser S, Kalai YT (2005) On the impossibility of obfuscation with auxiliary input. In: 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201905), pp 553\u2013562, IEEE"},{"issue":"2","key":"1805_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2160158.2160159","volume":"59","author":"B Barak","year":"2012","unstructured":"Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K (2012) On the (im) possibility of obfuscating programs. J ACM (JACM) 59(2):1\u201348","journal-title":"J ACM (JACM)"},{"issue":"3","key":"1805_CR40","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1137\/14095772X","volume":"45","author":"S Garg","year":"2016","unstructured":"Garg S, Gentry C, Halevi S, Raykova M, Sahai A, Waters B (2016) Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM J Comput 45(3):882\u2013929","journal-title":"SIAM J Comput"},{"key":"1805_CR41","doi-asserted-by":"crossref","unstructured":"Jain A, Lin H, Sahai A (2021) Indistinguishability obfuscation from well-founded assumptions. In: Proceedings of the 53rd annual ACM SIGACT symposium on theory of computing, pp 60\u201373","DOI":"10.1145\/3406325.3451093"},{"key":"1805_CR42","doi-asserted-by":"crossref","unstructured":"Yao AC-C (1986) How to generate and exchange secrets. In: 27th annual symposium on foundations of computer science (Sfcs 1986), pp 162\u2013167, IEEE","DOI":"10.1109\/SFCS.1986.25"},{"key":"1805_CR43","doi-asserted-by":"crossref","unstructured":"Boneh D, Sahai A, Waters B (2011) Functional encryption: definitions and challenges. In: Theory of cryptography: 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings 8, pp 253\u2013273. Springer","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"1805_CR44","doi-asserted-by":"publisher","first-page":"23951","DOI":"10.1109\/ACCESS.2020.2969957","volume":"8","author":"M Ali","year":"2020","unstructured":"Ali M, Sadeghi M-R, Liu X (2020) Lightweight revocable hierarchical attribute-based encryption for internet of things. IEEE Access 8:23951\u201323964","journal-title":"IEEE Access"},{"issue":"5","key":"1805_CR45","doi-asserted-by":"publisher","first-page":"e3905","DOI":"10.1002\/ett.3905","volume":"32","author":"M Ali","year":"2021","unstructured":"Ali M, Sadeghi M-R (2021) Provable secure lightweight attribute-based keyword search for cloud-based internet of things networks. Trans Emerg Telecommun Technol 32(5):e3905","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1805_CR46","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Cash D, Tsabary R, Wee H (2016) Targeted homomorphic attribute-based encryption. In: Theory of cryptography: 14th international conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016. Proceedings, Part II vol 14 pp 330\u2013360","DOI":"10.1007\/978-3-662-53644-5_13"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01805-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01805-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01805-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T15:30:35Z","timestamp":1731425435000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01805-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":47,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["1805"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01805-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"7 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"We confirm the corresponding author has read the journal policies and submit this manuscript in accordance with those policies.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}]}}