{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T23:20:50Z","timestamp":1777591250002,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T00:00:00Z","timestamp":1579564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T00:00:00Z","timestamp":1579564800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s12652-020-01710-y","type":"journal-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T07:02:50Z","timestamp":1579590170000},"page":"4613-4641","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":140,"title":["MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption"],"prefix":"10.1007","volume":"11","author":[{"given":"Seyed Morteza","family":"Pournaghi","sequence":"first","affiliation":[]},{"given":"Majid","family":"Bayat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1908-8826","authenticated-orcid":false,"given":"Yaghoub","family":"Farjami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,21]]},"reference":[{"issue":"5","key":"1710_CR1","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"NZ Aitzhan","year":"2016","unstructured":"Aitzhan NZ, Svetinovic D (2016) Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans Depend Secur Comput 15(5):840\u2013852","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"1710_CR2","doi-asserted-by":"crossref","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big data (OBD). IEEE, New York, pp 25\u201330","DOI":"10.1109\/OBD.2016.11"},{"issue":"3","key":"1710_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","volume":"4","author":"M Banerjee","year":"2018","unstructured":"Banerjee M, Lee J, Choo KKR (2018) A blockchain future for internet of things security: a position paper. Digit Commun Netw 4(3):149\u2013160","journal-title":"Digit Commun Netw"},{"key":"1710_CR4","doi-asserted-by":"publisher","DOI":"10.1080\/15472450.2019.1625042","author":"M Bayat","year":"2019","unstructured":"Bayat M, Barmshoory M, Pournaghi SM, Rahimi M, Farjami Y, Aref MR (2019a) A new and efficient authentication scheme for vehicular ad hoc networks. J Intell Transp Syst. https:\/\/doi.org\/10.1080\/15472450.2019.1625042","journal-title":"J Intell Transp Syst"},{"key":"1710_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02039-x","author":"M Bayat","year":"2019","unstructured":"Bayat M, Pournaghi M, Rahimi M, Barmshoory M (2019b) Nera: a new and efficient RSU based authentication scheme for VANETs. Wireless Netw. https:\/\/doi.org\/10.1007\/s11276-019-02039-x","journal-title":"Wireless Netw"},{"issue":"3","key":"1710_CR6","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1137\/S0036144502417715","volume":"46","author":"JP Berrut","year":"2004","unstructured":"Berrut JP, Trefethen LN (2004) Barycentric lagrange interpolation. SIAM Rev 46(3):501\u2013517","journal-title":"SIAM Rev"},{"key":"1710_CR7","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP\u201907). IEEE, New York, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"1710_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, New York, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"3","key":"1710_CR9","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D, Franklin M (2003) Identity-based encryption from the Weil pairing. SIAM J Comput 32(3):586\u2013615","journal-title":"SIAM J Comput"},{"issue":"1871","key":"1710_CR10","first-page":"233","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233\u2013271","journal-title":"Proc R Soc Lond Math Phys Sci"},{"key":"1710_CR11","unstructured":"Cachin C (2016) Architecture of the hyper ledger blockchain fabric. In: Workshop on distributed cryptocurrencies and consensus ledgers, vol 310, p\u00a04"},{"key":"1710_CR12","doi-asserted-by":"crossref","unstructured":"Cao C, Zuo Y, Zhang F (2018) Research on comprehensive performance simulation of communication IP network based on OPNET. In: 2018 international conference on intelligent transportation big data and smart city (ICITBS). IEEE, New York, pp 195\u2013197","DOI":"10.1109\/ICITBS.2018.00057"},{"key":"1710_CR13","first-page":"207","volume":"19","author":"L Cartwright Smith","year":"2016","unstructured":"Cartwright Smith L, Gray E, Thorpe JH (2016) Health information ownership: legal theories and policy implications. Vanderbilt J Entertain Technol Law 19:207","journal-title":"Vanderbilt J Entertain Technol Law"},{"key":"1710_CR14","first-page":"173","volume":"99","author":"M Castro","year":"1999","unstructured":"Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OSDI 99:173\u2013186","journal-title":"OSDI"},{"key":"1710_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.scs.2018.02.014","volume":"39","author":"GG Dagher","year":"2018","unstructured":"Dagher GG, Mohler J, Milojkovic M, Marella PB (2018) Ancile: privacy preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 39:283\u2013297","journal-title":"Sustain Cities Soc"},{"key":"1710_CR16","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H Deng","year":"2014","unstructured":"Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370\u2013384","journal-title":"Inf Sci"},{"key":"1710_CR17","unstructured":"Dubovitskaya A, Xu Z, Ryu S, Schumacher M, Wang F (2017) Secure and trustable electronic medical records sharing using blockchain. In: AMIA annual symposium proceedings, American Medical Informatics Association, p 650"},{"issue":"3","key":"1710_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fernndez-Alemn","year":"2013","unstructured":"Fernndez-Alemn JL, Seor IC, Lozoya PO, Toval A (2013) Security and privacy in electronic health records: a systematic literature review. J Biomed Inform 46(3):541\u2013562","journal-title":"J Biomed Inform"},{"key":"1710_CR19","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, New York, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"1710_CR20","first-page":"17","volume":"28","author":"R Hamza","year":"2019","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy preserving cryptosystem for IoT ehealthcare. Inf Sci 28:17\u201328","journal-title":"Inf Sci"},{"key":"1710_CR21","volume-title":"Guide to elliptic curve cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York"},{"key":"1710_CR22","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.future.2016.09.021","volume":"72","author":"Q Huang","year":"2017","unstructured":"Huang Q, Yang Y, Shen M (2017) Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener Comput Syst 72:239\u2013249","journal-title":"Future Gener Comput Syst"},{"key":"1710_CR23","doi-asserted-by":"crossref","unstructured":"Karafiloski E, Mishev A (2017) Blockchain solutions for big data challenges: a literature review. In: IEEE EUROCON 2017\u201417th international conference on smart technologies. IEEE, New York, pp 763\u2013768","DOI":"10.1109\/EUROCON.2017.8011213"},{"issue":"8","key":"1710_CR24","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s10916-018-1007-5","volume":"42","author":"H Kaur","year":"2018","unstructured":"Kaur H, Alam MA, Jameel R, Mourya AK, Chang V (2018) A proposed solution and future direction for blockchain-based heterogeneous medicare data in cloud environment. J Med Syst 42(8):156","journal-title":"J Med Syst"},{"key":"1710_CR25","doi-asserted-by":"crossref","unstructured":"Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: the blockchain model of cryptography and privacy preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP). IEEE, New York, pp 839\u2013858","DOI":"10.1109\/SP.2016.55"},{"issue":"10","key":"1710_CR26","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri N (2017) Blockchain roles in strengthening cybersecurity and protecting privacy. Telecommun Policy 41(10):1027\u20131038","journal-title":"Telecommun Policy"},{"issue":"3","key":"1710_CR27","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM Trans Program Lang Syst (TOPLAS) 4(3):382\u2013401","journal-title":"ACM Trans Program Lang Syst (TOPLAS)"},{"key":"1710_CR28","unstructured":"Nakamoto S (2019) Bitcoin: A peer-to-peer electronic cash system. Technical report, Manubot"},{"key":"1710_CR29","first-page":"1","volume":"1","author":"K Peterson","year":"2016","unstructured":"Peterson K, Deeduvanu R, Kanjamala P, Boles K (2016) A blockchain-based approach to health information exchange networks. Proc NIST Workshop Blockchain Healthc 1:1\u201310","journal-title":"Proc NIST Workshop Blockchain Healthc"},{"key":"1710_CR30","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.comnet.2018.01.015","volume":"134","author":"SM Pournaghi","year":"2018","unstructured":"Pournaghi SM, Zahednejad B, Bayat M, Farjami Y (2018) NECPPA: a novel and efficient conditional privacy preserving authentication scheme for vanet. Comput Netw 134:78\u201392","journal-title":"Comput Netw"},{"key":"1710_CR31","doi-asserted-by":"publisher","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad K, Hamza R, Yan H (2019) Sensitive and energetic iot access control for managing cloud electronic health records. IEEE Access 7:86384\u201386393","journal-title":"IEEE Access"},{"key":"1710_CR32","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, New York, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"issue":"4","key":"1710_CR33","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.jnca.2007.01.001","volume":"31","author":"K Salah","year":"2008","unstructured":"Salah K, Calyam P, Buhari M (2008) Assessing readiness of IP networks to support desktop video conferencing using OPNET. J Netw Comput Appl 31(4):921\u2013943","journal-title":"J Netw Comput Appl"},{"key":"1710_CR34","first-page":"8","volume":"5","author":"D Schwartz","year":"2014","unstructured":"Schwartz D, Youngs N, Britto A et al (2014) The ripple protocol consensus algorithm. Ripple Labs Inc White Pap 5:8","journal-title":"Ripple Labs Inc White Pap"},{"key":"1710_CR35","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, New York, pp 47\u201353"},{"key":"1710_CR36","doi-asserted-by":"crossref","unstructured":"Sukhwani H, Martnez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of PBFT consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th symposium on reliable distributed systems (SRDS). IEEE, New York, pp 253\u2013255","DOI":"10.1109\/SRDS.2017.36"},{"key":"1710_CR37","first-page":"2","volume":"18","author":"N Szabo","year":"1996","unstructured":"Szabo N (1996) Smart contracts: building blocks for digital markets. EXTROPY J Transhumanist Thought (6) 18:2","journal-title":"EXTROPY J Transhumanist Thought (6)"},{"issue":"2","key":"1710_CR38","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00145-008-9027-9","volume":"22","author":"T Tassa","year":"2009","unstructured":"Tassa T, Dyn N (2009) Multipartite secret sharing by bivariate interpolation. J Cryptol 22(2):227\u2013258","journal-title":"J Cryptol"},{"key":"1710_CR39","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.comnet.2017.08.025","volume":"129","author":"E Vahedi","year":"2017","unstructured":"Vahedi E, Bayat M, Pakravan MR, Aref MR (2017) A secure ECC based privacy preserving data aggregation scheme for smart grids. Comput Netw 129:28\u201336","journal-title":"Comput Netw"},{"issue":"6","key":"1710_CR40","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"1710_CR41","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MCE.2018.2816306","volume":"7","author":"HT Wu","year":"2018","unstructured":"Wu HT, Tsai CW (2018) Toward blockchains for health care systems: applying the bilinear pairing technology to ensure privacy protection and accuracy in data sharing. IEEE Consum Electron Mag 7(4):65\u201371","journal-title":"IEEE Consum Electron Mag"},{"issue":"2","key":"1710_CR42","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/info8020044","volume":"8","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah E, Smahi A, Amofa S, Zhang X (2017a) BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information 8(2):44","journal-title":"Information"},{"key":"1710_CR43","doi-asserted-by":"publisher","first-page":"14757","DOI":"10.1109\/ACCESS.2017.2730843","volume":"5","author":"Q Xia","year":"2017","unstructured":"Xia Q, Sifah EB, Asamoah KO, Gao J, Du X, Guizani M (2017b) Medshare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5:14757\u201314767","journal-title":"IEEE Access"},{"issue":"4","key":"1710_CR44","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","volume":"11","author":"Y Yang","year":"2015","unstructured":"Yang Y, Ma M (2015) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forensics Secur 11(4):746\u2013759","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"1710_CR45","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/s10916-016-0574-6","volume":"40","author":"X Yue","year":"2016","unstructured":"Yue X, Wang H, Jin D, Li M, Jiang W (2016) Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst 40(10):218","journal-title":"J Med Syst"},{"issue":"8","key":"1710_CR46","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang A, Lin X (2018) Towards secure and privacy preserving data sharing in e-health systems via consortium blockchain. J Med Syst 42(8):140","journal-title":"J Med Syst"},{"key":"1710_CR47","doi-asserted-by":"publisher","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang J, Xue N, Huang X (2016) A secure system for pervasive social network-based healthcare. IEEE Access 4:9239\u20139250","journal-title":"IEEE Access"},{"key":"1710_CR48","unstructured":"Zheng Y (2011) Privacy-preserving personal health record system using attribute-based encryption. PhD thesis, Worcester Polytechnic Institute"},{"issue":"1","key":"1710_CR49","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","volume":"22","author":"H Zhong","year":"2018","unstructured":"Zhong H, Zhu W, Xu Y, Cui J (2018) Multi authority attribute based encryption access control scheme with policy hidden for cloud storage. Soft Comput 22(1):243\u2013251","journal-title":"Soft Comput"},{"issue":"6","key":"1710_CR50","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/MCOM.2002.1007422","volume":"40","author":"C Zhu","year":"2002","unstructured":"Zhu C, Yang OW, Aweya J, Ouellette M, Montuno DY (2002) A comparison of active queue management algorithms using the OPNET modeler. IEEE Commun Mag 40(6):158\u2013167","journal-title":"IEEE Commun Mag"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01710-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-020-01710-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01710-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T11:38:46Z","timestamp":1695641926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-020-01710-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,21]]},"references-count":50,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["1710"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-01710-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,21]]},"assertion":[{"value":"24 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}