{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:36:42Z","timestamp":1774719402352,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T00:00:00Z","timestamp":1752710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04163-2","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T16:45:54Z","timestamp":1752770754000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Quantum-Resilient Food Systems: Federated AI and Lightweight Lattice Hashing for Blockchain-Based Traceability"],"prefix":"10.1007","volume":"6","author":[{"given":"I. Mohammed Musthafa","family":"Sheriff","sequence":"first","affiliation":[]},{"given":"D. John","family":"Aravindhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,17]]},"reference":[{"issue":"3","key":"4163_CR1","doi-asserted-by":"publisher","first-page":"290","DOI":"10.3390\/pharmaceutics17030290","volume":"17","author":"R Kodumuru","year":"2025","unstructured":"Kodumuru R, Sarkar S, Parepally V, Chandarana J. Artificial Intelligence and Internet of Things Integration in Pharmaceutical Manufacturing: A Smart Synergy. Pharmaceutics. 2025;17(3):290.","journal-title":"Pharmaceutics"},{"key":"4163_CR2","doi-asserted-by":"crossref","unstructured":"Gbadebo MO. Integrating Post-Quantum Cryptography and Advanced Encryption Standards to Safeguard Sensitive Financial Records from Emerging Cyber Threats. 2025;SSRN 5168159.","DOI":"10.2139\/ssrn.5168159"},{"key":"4163_CR3","doi-asserted-by":"crossref","unstructured":"Feltovic M. Cryptographic foundations for blockchain security in decentralized networks. MEST J.2025;13(1).","DOI":"10.12709\/mest.13.13.01.05"},{"key":"4163_CR4","doi-asserted-by":"crossref","unstructured":"Olutimehin AT. Advancing cloud security in digital finance: AI-driven threat detection, cryptographic solutions, and privacy challenges. Cryptographic Solutions, and Privacy Challenges. 2025.","DOI":"10.2139\/ssrn.5139905"},{"issue":"3","key":"4163_CR5","doi-asserted-by":"publisher","first-page":"585","DOI":"10.3390\/electronics14030585","volume":"14","author":"R Wang","year":"2025","unstructured":"Wang R, Fan H, Liu K. A Blockchain Address Generation Method Based on the Improved SM9 Algorithm. Electronics. 2025;14(3):585.","journal-title":"Electronics"},{"key":"4163_CR6","unstructured":"Dwivedi K, Agrawal A, Bhatia A, Tiwari K. A novel classification of attacks on blockchain layers: Vulnerabilities, attacks, mitigations, and research directions. 2024; arXiv preprint arXiv:2404.18090."},{"key":"4163_CR7","unstructured":"Baseri Y, Hafid A, Shahsavari Y, Makrakis D, Khodaiemehr H. Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense. 2025; arXiv preprint arXiv:2501.11798."},{"key":"4163_CR8","doi-asserted-by":"crossref","unstructured":"Singh MP, Singh J, Ravi V, Gupta P, Alahmadi TJ, Singh P, Shivahare BD, Verma M. Impact and Implications of Quantum Computing on Blockchain-based Electronic Health Record Systems. Open Bioinform J.2024;17(1).","DOI":"10.2174\/0118750362316814240820051945"},{"key":"4163_CR9","unstructured":"Hossan MR, Nirob FA, Islam A, Rakin TM, Al-Amin M. A comprehensive analysis of blockchain technology and consensus protocols across multilayered framework. IEEE Access. 2024."},{"key":"4163_CR10","doi-asserted-by":"crossref","unstructured":"Olutimehin AT. Advancing cloud security in digital finance: AI-driven threat detection, cryptographic solutions, and privacy challenges. Cryptographic Solutions, and Privacy Challenges. 2025.","DOI":"10.2139\/ssrn.5139905"},{"key":"4163_CR11","doi-asserted-by":"crossref","unstructured":"Parry GM, Revolidis I, Ellul J, Pace G. Bottling Up Trust: A Review of Blockchain Adoption in Wine Supply Chain Traceability. IEEE Access. 2024.","DOI":"10.2139\/ssrn.4593428"},{"key":"4163_CR12","doi-asserted-by":"crossref","unstructured":"Rajavat A, Bhardwaj V, Kaur N, Rawat R, Rawat A, Jadon GS. Sustainable Futures: Navigating Blockchain\u2019s Energy Dilemma. Online Soc Netw Bus Frameworks. 2024;85-112.","DOI":"10.1002\/9781394231126.ch5"},{"issue":"3","key":"4163_CR13","first-page":"302","volume":"3","author":"T Ali","year":"2025","unstructured":"Ali T, Iqbal R, Ansari NM, Tariq T, Rafique AA. AI-powered anomaly detection in software logs: a machine learning approach for proactive fault diagnosis and self-healing systems. Spectrum Eng Sci. 2025;3(3):302\u201322.","journal-title":"Spectrum Eng Sci"},{"issue":"1","key":"4163_CR14","first-page":"1","volume":"6","author":"M Raja","year":"2025","unstructured":"Raja M. The Rise of AI-Driven Network Intrusion Detection Systems: Innovations, Challenges, and Future Directions. Int J AI BigData Comput Manag Stud. 2025;6(1):1\u20139.","journal-title":"Int J AI BigData Comput Manag Stud"},{"key":"4163_CR15","first-page":"2276","volume":"2766","author":"J Ruvunangiza","year":"2024","unstructured":"Ruvunangiza J, Valderrama C. A Unified Framework for Secure Healthcare Data Sharing: Integrating Federated Learning, Blockchain, and Quantum Cryptography. J ISSN. 2024;2766:2276.","journal-title":"J ISSN"},{"key":"4163_CR16","unstructured":"Islam N, Zulkernine M. Privacy-preserving Machine Learning in Internet of Vehicle Applications: Fundamentals, Recent Advances, and Future Direction. 2025. arXiv:2503.01089."},{"key":"4163_CR17","doi-asserted-by":"crossref","unstructured":"Sravya G, Kumar PS, Padmavathy R (2024) Survey of Post-Quantum Lattice-based Ciphertext-Policy Attribute-based Encryption Schemes for Cloud Storage: Taxonomy, Open Issues, and Future Directions. IEEE Trans Serv Comput.","DOI":"10.1109\/TSC.2024.3479930"},{"key":"4163_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103685","volume":"139","author":"Z Rehman","year":"2024","unstructured":"Rehman Z, Gondal I, Ge M, Dong H, Gregory M, Tari Z. Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception. Comput Secur. 2024;139: 103685.","journal-title":"Comput Secur"},{"key":"4163_CR19","doi-asserted-by":"publisher","first-page":"21467","DOI":"10.1109\/JIOT.2023.3298196","volume":"10","author":"G Xu","year":"2023","unstructured":"Xu G, Zhou Z, Dong J, Zhang L, Song X. A blockchain-based federated learning scheme for data sharing in industrial internet of things. IEEE Internet Things J. 2023;10:21467\u201378.","journal-title":"IEEE Internet Things J"},{"key":"4163_CR20","doi-asserted-by":"publisher","first-page":"18452","DOI":"10.1109\/JIOT.2022.3233783","volume":"10","author":"R Singh","year":"2023","unstructured":"Singh R, Dwivedi AD, Srivastava G, Chatterjee P, Lin J. A privacy preserving Internet of things smart healthcare financial system. IEEE Internet Things J. 2023;10:18452\u201360.","journal-title":"IEEE Internet Things J"},{"key":"4163_CR21","doi-asserted-by":"publisher","first-page":"8448","DOI":"10.1109\/JIOT.2023.3318290","volume":"11","author":"X Zhang","year":"2023","unstructured":"Zhang X, Hao L, Gui G, Wang Y, Adebisi B, Sari H. An automatic and efficient malware traffic classification method for secure Internet of Things. IEEE Internet Things J. 2023;11:8448\u201358.","journal-title":"IEEE Internet Things J"},{"key":"4163_CR22","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1109\/TSC.2023.3262563","volume":"16","author":"T Li","year":"2023","unstructured":"Li T, Zhang J, Shen Y, Ma J. Hierarchical and multi-group data sharing for cloud-assisted industrial internet of things. IEEE Trans Serv Comput. 2023;16:3425\u201338.","journal-title":"IEEE Trans Serv Comput"},{"key":"4163_CR23","doi-asserted-by":"publisher","first-page":"8658","DOI":"10.1109\/JIOT.2023.3245153","volume":"10","author":"M Malik","year":"2023","unstructured":"Malik M, Dutta M. Feature engineering and machine learning framework for DDoS attack detection in the standardized Internet of things. IEEE Internet Things J. 2023;10:8658\u201369.","journal-title":"IEEE Internet Things J"},{"key":"4163_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119330","volume":"215","author":"SA Khanday","year":"2023","unstructured":"Khanday SA, Fatima H, Rakesh N. Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks. Expert Syst Appl. 2023;215: 119330.","journal-title":"Expert Syst Appl"},{"key":"4163_CR25","doi-asserted-by":"publisher","first-page":"46561","DOI":"10.1109\/ACCESS.2023.3273895","volume":"11","author":"M Mehmood","year":"2023","unstructured":"Mehmood M, Amin R, Muslam MM, Xie J, Aldabbas H. Privilege escalation attack detection and mitigation in cloud using machine learning. IEEE Access. 2023;11:46561\u201376.","journal-title":"IEEE Access"},{"key":"4163_CR26","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TCSS.2022.3232173","volume":"10","author":"H Liu","year":"2023","unstructured":"Liu H, Han D, Cui M, Li KC, Souri A, Shojafar M. IdenMultiSig: Identity-based decentralized multi-signature in Internet of things. IEEE Trans Comput Soc Syst. 2023;10:1711\u201321.","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"4163_CR27","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.adhoc.2018.01.001","volume":"71","author":"X Jia","year":"2018","unstructured":"Jia X, He D, Liu Q, Choo K. An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Netw. 2018;71:78\u201387.","journal-title":"Ad Hoc Netw"},{"key":"4163_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102074","volume":"100","author":"H Du","year":"2020","unstructured":"Du H, Wen Q, Zhang S, Gao M. A new provably secure certificateless signature scheme for Internet of Things. Ad Hoc Netw. 2020;100: 102074.","journal-title":"Ad Hoc Netw"},{"key":"4163_CR29","doi-asserted-by":"publisher","first-page":"8387","DOI":"10.1109\/JIOT.2020.3045451","volume":"8","author":"T Li","year":"2020","unstructured":"Li T, Wang H, He D, Yu J. Permissioned blockchain-based anonymous and traceable aggregate signature scheme for industrial internet of things. IEEE Internet Things J. 2020;8:8387\u201398.","journal-title":"IEEE Internet Things J"},{"key":"4163_CR30","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/TII.2022.3206798","volume":"19","author":"Z Bao","year":"2022","unstructured":"Bao Z, He D, Khan MK, Luo M, Xie Q. PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans Ind Inform. 2022;19:1524\u201334.","journal-title":"IEEE Trans Ind Inform"},{"key":"4163_CR31","first-page":"116","volume":"55","author":"C Cheng","year":"2017","unstructured":"Cheng C, Lu R, Petzoldt A, Takagi T. Securing the Internet of things in a quantum world. IEEE Commun Mag. 2017;55:116\u201320.","journal-title":"IEEE Commun Mag"},{"key":"4163_CR32","first-page":"3","volume":"15","author":"V Garikipati","year":"2018","unstructured":"Garikipati V, Palanisamy P. Quantum-resistant cyber defence in nation-state warfare: Mitigating threats with post-quantum cryptography. Indo-Am J Life Sci Biotechnol. 2018;15:3.","journal-title":"Indo-Am. J. Life Sci. Biotechnol."},{"key":"4163_CR33","doi-asserted-by":"publisher","first-page":"9853","DOI":"10.1109\/TVT.2022.3176755","volume":"71","author":"V Srivastava","year":"2022","unstructured":"Srivastava V, Debnath SK, Bera B, Das AK, Park Y, Lorenz P. Blockchain-envisioned provably secure multivariate identity-based multi-signature scheme for Internet of Vehicles environment. IEEE Trans Veh Technol. 2022;71:9853\u201367.","journal-title":"IEEE Trans Veh Technol"},{"key":"4163_CR34","doi-asserted-by":"publisher","first-page":"9939","DOI":"10.1007\/s12652-021-03661-4","volume":"14","author":"L Wang","year":"2023","unstructured":"Wang L, Huang C, Cheng H. Novel proxy signature from lattice for the post-quantum Internet of Things. J Ambient Intell Human Comput. 2023;14:9939\u201346.","journal-title":"J Ambient Intell Human Comput"},{"key":"4163_CR35","doi-asserted-by":"publisher","first-page":"454","DOI":"10.3390\/e25030454","volume":"25","author":"F Wu","year":"2023","unstructured":"Wu F, Zhou B, Zhang X. Identity-based proxy signature with message recovery over NTRU lattice. Entropy. 2023;25:454.","journal-title":"Entropy"},{"key":"4163_CR36","doi-asserted-by":"crossref","unstructured":"Prajapat S, Gautam D, Kumar P, Jangirala S, Das AK, Park Y, Lorenz P. Secure lattice-based aggregate signature scheme for vehicular Ad Hoc networks. IEEE Trans Veh Technol. 2024.","DOI":"10.1109\/TVT.2024.3383967"},{"key":"4163_CR37","first-page":"4","volume":"11","author":"V Gollavilli","year":"2023","unstructured":"Gollavilli V, Gattupalli K, Nagarajan H, Alagarsundaram P, Sitaraman SR, Pushpakumar R. Post-quantum and lightweight cryptographic solutions for mobile data security in cloud systems. Int J Mod Electron Commun Eng. 2023;11:4.","journal-title":"Int. J. Mod. Electron. Commun. Eng."},{"key":"4163_CR38","doi-asserted-by":"crossref","unstructured":"Sun L, Wang Y, Ren Y, Xia F. Path signature-based xai-enabled network time series classification. Sci China Inf Sci. 2024;1-15.","DOI":"10.1007\/s11432-023-3978-y"},{"key":"4163_CR39","first-page":"34","volume":"13","author":"RL Gudivaka","year":"2023","unstructured":"Gudivaka RL, Gudivaka BR, Gudivaka RK, Basani D, Grandhi SH, Murugesan S, Kamruzzaman MM. Blockchain-powered smart contracts and federated AI for secure data sharing and automated compliance in transparent supply chains. Int J Manag Res Rev. 2023;13:34\u201349.","journal-title":"Int. J. Manag. Res. Rev."},{"key":"4163_CR40","doi-asserted-by":"crossref","unstructured":"Morchid A, Alblushi IGM, Khalid HM, El Alami R, Sitaramanan SR, Muyeen SM. High-technology agriculture system to enhance food security: A concept of smart irrigation system using Internet of Things and cloud computing. J. Saudi Soc. Agric. Sci. 2024.","DOI":"10.1016\/j.jssas.2024.02.001"},{"key":"4163_CR41","unstructured":"National Institute of Standards and Technology (NIST), Post-Quantum Cryptography Standardization Project: Round 3 Finalists, U.S. Department of Commerce, 2022."},{"key":"4163_CR42","doi-asserted-by":"publisher","first-page":"24116","DOI":"10.1109\/ACCESS.2024.3361756","volume":"12","author":"I Ahmed","year":"2024","unstructured":"Ahmed I, Alkahtani M, Khalid QS, Alqahtani FM. Improved commodity supply chain performance through AI and computer vision techniques. IEEE Access. 2024;12:24116\u201332.","journal-title":"IEEE Access"},{"issue":"5","key":"4163_CR43","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1002\/asmb.2723","volume":"40","author":"DS Kurian","year":"2024","unstructured":"Kurian DS, Pillai VM, Raut A, Gautham J. Deep reinforcement learning-based ordering mechanism for performance optimization in multi-echelon supply chains. Appl Stoch Models Bus Ind. 2024;40(5):1433\u201354.","journal-title":"Appl Stoch Models Bus Ind"},{"key":"4163_CR44","doi-asserted-by":"crossref","unstructured":"Xu J, Bo L. Enhancing Supply Chain Efficiency Resilience Using Predictive Analytics and Computational Intelligence Techniques. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3523470"},{"key":"4163_CR45","doi-asserted-by":"crossref","unstructured":"Esmailizade S, Ebrahimi A, Soltani H, Sam A, Rahimi M. Machine Learning Approaches for Retail Forecasting: A Study on XGBoost and Time-Series Models. Authorea Preprints. 2024.","DOI":"10.36227\/techrxiv.172952620.01866729\/v1"},{"issue":"3","key":"4163_CR46","doi-asserted-by":"publisher","first-page":"4839","DOI":"10.48047\/4sdny979","volume":"54","author":"PM Sinthuja","year":"2025","unstructured":"Sinthuja PM, Canessane RA. Optimized Hybrid CNN-LSTM Model for Agriculture Supply-chain Management System. Cuestiones Fisioterapia. 2025;54(3):4839\u201368.","journal-title":"Cuestiones Fisioterapia"},{"key":"4163_CR47","doi-asserted-by":"publisher","first-page":"463","DOI":"10.52783\/jes.5138","volume":"20","author":"R Hasan","year":"2024","unstructured":"Hasan R, Islam Z, Alam M. Predictive analytics and machine learning applications in the USA for sustainable supply chain operations and carbon footprint reduction. J Electr Syst. 2024;20:463\u201371.","journal-title":"J Electr Syst"},{"key":"4163_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100045","volume":"2","author":"M Rahaman","year":"2024","unstructured":"Rahaman M, Tabassum F, Arya V, Bansal R. Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology. Cyber Secur Appl. 2024;2: 100045.","journal-title":"Cyber Secur Appl"},{"key":"4163_CR49","doi-asserted-by":"crossref","unstructured":"Sayma MH, Hasan MR, Khatun M, Rajee A, Begum A. Detecting the provenance of price hike in agri-food supply chain using private Ethereum blockchain network. Heliyon. 2024;10(11).","DOI":"10.1016\/j.heliyon.2024.e30972"},{"key":"4163_CR50","doi-asserted-by":"crossref","unstructured":"Patil K, Ingawale P, Suryavanshi O, Kanekar P, Trivedi M. TrackTrust: Revolutionizing Supply Chain Management Through Blockchain Integration. In: 2024 2nd Int Conf Self Sustainable Artif Intell Syst (ICSSAS), pp 1226-1231. IEEE. 2024.","DOI":"10.1109\/ICSSAS64001.2024.10760294"},{"key":"4163_CR51","doi-asserted-by":"crossref","unstructured":"Urtecho RLP, Rodr\u00edguez-Molina J, Mart\u00ednez-N\u00fa\u00f1ez M, Garbajosa J. Enhancing agriculture through IoT and blockchain: a VeChain-enhanced sustainable development approach for small-scale agricultural exploitations. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3506510"},{"key":"4163_CR52","doi-asserted-by":"crossref","unstructured":"Musthafa Sheriff IM, Aravindhar D. Blockchain-based Secure Supply Chain management using Identical Deep Multilingual Convolutional Neural Networks (IDMCNN). IEEE Access. 2023.","DOI":"10.1109\/ICSCAN58655.2023.10394899"},{"key":"4163_CR53","doi-asserted-by":"crossref","unstructured":"Musthafa Sheriff IM, Aravindhar DJ. Blockchain Integration for Enhanced Agri-Food Supply Chain Security and Efficiency. IEEE Access. 2024.","DOI":"10.1109\/ICRTAC59277.2023.10480814"},{"key":"4163_CR54","doi-asserted-by":"crossref","unstructured":"Musthafa Sheriff IM, Aravindhar DJ. Integrated Blockchain-Based Agri-Food Traceability and Deep Learning for Profit-Optimized Supply Chain Management in Agri-Food Supply Chains. IEEE Access. 2023.","DOI":"10.1109\/ICAECT60202.2024.10469024"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04163-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04163-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04163-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T13:14:21Z","timestamp":1757250861000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04163-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,17]]},"references-count":54,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4163"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04163-2","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,17]]},"assertion":[{"value":"7 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors do not have any conflicts.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"659"}}