{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T01:12:52Z","timestamp":1775524372943,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T00:00:00Z","timestamp":1753228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T00:00:00Z","timestamp":1753228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Scientific Research Deanship at the University of Ha\u2019il, Saudi Arabia","award":["RG-24 188"],"award-info":[{"award-number":["RG-24 188"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s44443-025-00140-0","type":"journal-article","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T14:40:44Z","timestamp":1753281644000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems"],"prefix":"10.1007","volume":"37","author":[{"given":"Zeyad Ghaleb","family":"Al-Mekhlaf","sequence":"first","affiliation":[]},{"given":"Murtaja Ali","family":"Saare","sequence":"additional","affiliation":[]},{"given":"Jalal Mohammed Hachim","family":"Altmemi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2358-3785","authenticated-orcid":false,"given":"Mahmood A.","family":"Al-Shareeda","sequence":"additional","affiliation":[]},{"given":"Badiea Abdulkarem","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Gharbi","family":"Alshammari","sequence":"additional","affiliation":[]},{"given":"Reem","family":"alrashdi","sequence":"additional","affiliation":[]},{"given":"Yasser A.","family":"Alkhabra","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Alreshidi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,23]]},"reference":[{"key":"140_CR1","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1049\/cit2.12070","volume":"7","author":"MA Abu-Hashem","year":"2021","unstructured":"Abu-Hashem MA, Gutub AA-A (2021) Efficient computation of hash hirschberg protein alignment utilizing hyper threading multi-core sharing technology. CAAI Trans Intell Technol 7:278\u2013291","journal-title":"CAAI Trans Intell Technol"},{"key":"140_CR2","doi-asserted-by":"crossref","unstructured":"Adeli M, Bagheri N, Maimani HR, Kumari S, Rodrigues JJ (2023) A post-quantum compliant authentication scheme for iot healthcare systems. IEEE Int Things J","DOI":"10.1109\/JIOT.2023.3309931"},{"key":"140_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad A, Jagatheswari S (2024) Lattice based three party authenticated key agreement scheme in medical iot for post-quantum environment. IEEE Access","DOI":"10.2139\/ssrn.4671916"},{"issue":"2","key":"140_CR4","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s13369-021-06165-7","volume":"47","author":"F Al-Shaarani","year":"2022","unstructured":"Al-Shaarani F, Gutub A (2022) Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arabian J Sci Eng 47(2):2455\u20132477","journal-title":"Arabian J Sci Eng"},{"issue":"9","key":"140_CR5","doi-asserted-by":"publisher","first-page":"6909","DOI":"10.1016\/j.jksuci.2021.09.009","volume":"34","author":"F Al-Shaarani","year":"2022","unstructured":"Al-Shaarani F, Gutub A (2022) Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud University-Comput Inf Sci 34(9):6909\u20136924","journal-title":"J King Saud University-Comput Inf Sci"},{"issue":"6","key":"140_CR6","first-page":"1","volume":"7","author":"MA Al-Shareeda","year":"2025","unstructured":"Al-Shareeda MA, Ghadban AAH, Glass AAH, Hadi EMA, Almaiah MA (2025) Efficient implementation of post-quantum digital signatures on raspberry pi. Discover Appl Sci 7(6):1\u201319","journal-title":"Discover Appl Sci"},{"key":"140_CR7","doi-asserted-by":"publisher","first-page":"10209","DOI":"10.1007\/s12652-020-02789-z","volume":"12","author":"S Altalhi","year":"2021","unstructured":"Altalhi S, Gutub AA-A (2021) A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J Ambient Intell Human Comput 12:10209\u201310221","journal-title":"J Ambient Intell Human Comput"},{"issue":"24","key":"140_CR8","doi-asserted-by":"publisher","first-page":"11784","DOI":"10.3390\/app112411784","volume":"11","author":"H Alyami","year":"2021","unstructured":"Alyami H, Nadeem M, Alharbi A, Alosaimi W, Ansari MTJ, Pandey D, Kumar R, Khan RA (2021) The evaluation of software security through quantum computing techniques: a durability perspective. Appl Sci 11(24):11784","journal-title":"Appl Sci"},{"key":"140_CR9","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, Drielsma PH, H\u00e9am P-C, Kouchnarenko O, Mantovani J et\u00a0al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005. Proceedings 17, Springer, pp 281\u2013285","DOI":"10.1007\/11513988_27"},{"issue":"4","key":"140_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/cryptography6040056","volume":"6","author":"H Bandara","year":"2022","unstructured":"Bandara H, Herath Y, Weerasundara T, Alawatugoda J (2022) On advances of lattice-based cryptographic schemes and their implementations. Cryptography 6(4):56","journal-title":"Cryptography"},{"key":"140_CR11","doi-asserted-by":"crossref","unstructured":"Boujelben M, Abid M (2024) Post-quantum security design for hierarchical healthcare systems based on lattices. The Journal of Supercomputing, 1\u201322","DOI":"10.1007\/s11227-024-06143-4"},{"key":"140_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110672","volume":"254","author":"M Caleffi","year":"2024","unstructured":"Caleffi M, Amoretti M, Ferrari D, Illiano J, Manzalini A, Cacciapuoti AS (2024) Distributed quantum computing: a survey. Comput Netw 254:110672","journal-title":"Comput Netw"},{"key":"140_CR13","doi-asserted-by":"crossref","unstructured":"Chakraborty A, Guria P (2022) Lightweight cryptography in ioht: An analytical approach. In: Mobile computing and sustainable informatics: proceedings of ICMCSI 2022, pp. 665\u2013680. Springer, ???","DOI":"10.1007\/978-981-19-2069-1_46"},{"key":"140_CR14","unstructured":"Chango W, Olivares T, oDelicado F (2024) Topologies in the internet of medical things (iomt), literature review. arXiv:2404.02908"},{"issue":"4","key":"140_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2018.1700787","volume":"56","author":"R Chaudhary","year":"2018","unstructured":"Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N (2018) Lscsh: Lattice-based secure cryptosystem for smart healthcare in smart cities environment. IEEE Commun Mag 56(4):24\u201332","journal-title":"IEEE Commun Mag"},{"issue":"5\u20137","key":"140_CR16","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1002\/stvr.1531","volume":"25","author":"F Dadeau","year":"2015","unstructured":"Dadeau F, H\u00e9am P-C, Kheddam R, Maatoug G, Rusinowitch M (2015) Model-based mutation testing from security protocols in hlpsl. Softw Testing, Verification Reliability 25(5\u20137):684\u2013711","journal-title":"Softw Testing, Verification Reliability"},{"issue":"2","key":"140_CR17","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"140_CR18","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/s10462-024-11063-z","volume":"58","author":"SE El-deep","year":"2025","unstructured":"El-deep SE, Abohany AA, Sallam KM, El-Mageed AAA (2025) A comprehensive survey on impact of applying various technologies on the internet of medical things. Artif Intell Rev 58(3):86","journal-title":"Artif Intell Rev"},{"key":"140_CR19","doi-asserted-by":"publisher","first-page":"745","DOI":"10.37394\/23206.2021.20.79","volume":"20","author":"M Elhassani","year":"2021","unstructured":"Elhassani M, Chillali A, Mouhib A (2021) A heuristic method to approximate the closest vector problem. WSEAS Trans Math 20:745\u2013755","journal-title":"WSEAS Trans Math"},{"key":"140_CR20","doi-asserted-by":"crossref","unstructured":"El-Saleh AA, Sheikh AM, Albreem MA, Honnurvali MS (2024) The internet of medical things (iomt): opportunities and challenges. Wireless Netw 1\u201318","DOI":"10.1007\/s11276-024-03764-8"},{"key":"140_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.307071","volume":"16","author":"AA-A Gutub","year":"2022","unstructured":"Gutub AA-A (2022) Enhancing cryptography of grayscale images via resilience randomization flexibility. Int J Inf Secur Priv 16:1\u201328","journal-title":"Int J Inf Secur Priv"},{"key":"140_CR22","doi-asserted-by":"crossref","unstructured":"He E, Xu T, Wu M, Chen J, Yao S, Li P (2023) A survey of algorithms for addressing the shortest vector problem (svp). In: International conference on blockchain technology and emerging applications, Springer, pp 57\u201376","DOI":"10.1007\/978-3-031-60037-1_4"},{"key":"140_CR23","doi-asserted-by":"crossref","unstructured":"Howe J, P\u00f6ppelmann T, O\u2019neill M, O\u2019sullivan E, G\u00fcneysu T (2015) Practical lattice-based digital signature schemes. ACM Trans Embedded Comput Syst (TECS) 14(3):1\u201324","DOI":"10.1145\/2724713"},{"issue":"4","key":"140_CR24","first-page":"111","volume":"11","author":"MN John","year":"2023","unstructured":"John MN, Udoaka OG, Udoakpan IU (2023) Group theory in lattice-based cryptography. Int J Math Appl 11(4):111\u2013125","journal-title":"Int J Math Appl"},{"key":"140_CR25","unstructured":"Kan K, Une M et\u00a0al (2021) Recent trends on research and development of quantum computers and standardization of post-quantum cryptography"},{"key":"140_CR26","doi-asserted-by":"crossref","unstructured":"Kazi KSL (2025) Healthcare monitoring system driven by machine learning and internet of medical things (mliomt). In: Convergence of Internet of Medical Things (IoMT) and Generative AI, IGI Global Scientific Publishing, ???, pp 385\u2013416","DOI":"10.4018\/979-8-3693-6180-1.ch016"},{"key":"140_CR27","unstructured":"Kheshaifaty N, Gutub A (2023) Engineering graphical captcha and aes crypto hash functions for secure online authentication. J Eng Res 11(3)"},{"key":"140_CR28","doi-asserted-by":"crossref","unstructured":"Lo CKM, Tan SF, Chung GC (2024) Enhanced authentication protocol for securing internet of medical things with lightweight post-quantum cryptography. In: 2024 IEEE International conference on artificial intelligence in engineering and technology (IICAIET), IEEE, pp 625\u2013630","DOI":"10.1109\/IICAIET62352.2024.10730752"},{"key":"140_CR29","doi-asserted-by":"crossref","unstructured":"Mansoor K, Afzal M, Iqbal W, Abbas Y, Mussiraliyeva S, Chehri A (2024) Pqcaie: Post quantum cryptographic authentication scheme for iot-based e-health systems. Int Things 27:101228","DOI":"10.1016\/j.iot.2024.101228"},{"issue":"10","key":"140_CR30","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","volume":"110","author":"C Marcolla","year":"2022","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek FH, Aaraj N (2022) Survey on fully homomorphic encryption, theory, and applications. Proceed IEEE 110(10):1572\u20131609","journal-title":"Proceed IEEE"},{"key":"140_CR31","doi-asserted-by":"crossref","unstructured":"Micciancio D, Regev O (2009) Lattice-based cryptography. In: Post-quantum Cryptography, pp 147\u2013191. Springer, ???","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"140_CR32","doi-asserted-by":"crossref","unstructured":"Mishra P, Singh G (2023) Internet of medical things healthcare for sustainable smart cities: Current status and future prospects. Appl Sci","DOI":"10.3390\/app13158869"},{"key":"140_CR33","doi-asserted-by":"crossref","unstructured":"Muthupandian S, Kumar DM (2024) Enhancing security in lightweight healthcare wireless body area networks: Lattice-based cryptography framework. In: 2024 15th International conference on computing communication and networking technologies (ICCCNT), IEEE, pp 1\u20136","DOI":"10.1109\/ICCCNT61001.2024.10723974"},{"key":"140_CR34","doi-asserted-by":"crossref","unstructured":"Nezhad MZ, Bojnordi AJJ, Mehraeen M, Bagheri R, Rezazadeh J (2024) Securing the future of iot-healthcare systems: A meta-synthesis of mandatory security requirements. Int J Med Inf 185:105379","DOI":"10.1016\/j.ijmedinf.2024.105379"},{"issue":"1","key":"140_CR35","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10586-024-04743-6","volume":"28","author":"S Prajapat","year":"2025","unstructured":"Prajapat S, Kumar D, Kumar P (2025) Quantum image encryption protocol for secure communication in healthcare networks. Cluster Comput 28(1):3","journal-title":"Cluster Comput"},{"key":"140_CR36","doi-asserted-by":"crossref","unstructured":"Prayesi KP, Kumari S, Anand A et\u00a0al. (2025) Implementation of lattice-based cryptography cyberforensic system. In: Next generation mechanisms for data encryption, pp 193\u2013208. CRC Press, ???","DOI":"10.1201\/9781003508632-13"},{"issue":"7","key":"140_CR37","first-page":"4167","volume":"16","author":"P Sarkar","year":"2024","unstructured":"Sarkar P, Nag A (2024) Lattice-based device-to-device authentication and key exchange protocol for iot system. Int J Inf Technol 16(7):4167\u20134179","journal-title":"Int J Inf Technol"},{"key":"140_CR38","unstructured":"Shambour MKY, Gutub AA-A (2021) Personal privacy evaluation of smart devices applications serving hajj and umrah rituals. J Eng Res"},{"key":"140_CR39","doi-asserted-by":"crossref","unstructured":"Singh AK, Satapathy SC, Roy A, Gutub AA-A (2022) Ai-based mobile edge computing for iot: Applications, challenges, and future scope. Arabian J Sci Eng 47:9801\u20139831","DOI":"10.1007\/s13369-021-06348-2"},{"key":"140_CR40","unstructured":"Sonya A, Kavitha G (2021) Advanced cryptography & block chain based cloud environment for secured e-health record. https:\/\/api.semanticscholar.org\/CorpusID:237777960"},{"issue":"10","key":"140_CR41","doi-asserted-by":"publisher","first-page":"14131","DOI":"10.1007\/s10586-024-04611-3","volume":"27","author":"R Sourav Ali","year":"2024","unstructured":"Sourav Ali R (2024) Lattice-based ring signcryption scheme for smart healthcare management. Cluster Comput 27(10):14131\u201314148","journal-title":"Cluster Comput"},{"key":"140_CR42","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1007\/s13369-022-07250-1","volume":"48","author":"FK Sufi","year":"2022","unstructured":"Sufi FK, Alsulami M, Gutub A (2022) Automating global threat-maps generation via advancements of news sensors and ai. Arabian J Sci Eng 48:2455\u20132472","journal-title":"Arabian J Sci Eng"},{"key":"140_CR43","doi-asserted-by":"crossref","unstructured":"Tariq MU (2024) Enhancing cybersecurity protocols in modern healthcare systems: Strategies and best practices. In: Transformative approaches to patient literacy and healthcare innovation, pp 223\u2013241. IGI Global, ???","DOI":"10.4018\/979-8-3693-3661-8.ch011"},{"key":"140_CR44","doi-asserted-by":"crossref","unstructured":"Tripathy T, Mishra A, Khan R (2024) A comparison analysis of cryptographic methods in sustainable healthcare. In: Healthcare analytics and advanced computational intelligence, CRC Press, ??? pp 56\u201377","DOI":"10.1201\/9781032624891-5"},{"key":"140_CR45","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigano","year":"2006","unstructured":"Vigano L (2006) Automated security protocol analysis with the avispa tool. Electron Notes Theor Comput Sci 155:61\u201386","journal-title":"Electron Notes Theor Comput Sci"},{"key":"140_CR46","doi-asserted-by":"publisher","unstructured":"Widodo AM, Pappachan P, Sekti BA, Anwar N, Widayanti R, Rahaman M, Bansal R (2025) Quantum-resistant cryptography. In: Gupta BB, Kalia D, Almomani A (eds.) Innovations in Modern Cryptography, pp. 1\u201332. IGI Global, Hershey, Pennsylvania (2024) Chap. 5. Forthcoming, available. https:\/\/doi.org\/10.4018\/978-9-3693-5330-1.ch005","DOI":"10.4018\/978-9-3693-5330-1.ch005"},{"issue":"3","key":"140_CR47","doi-asserted-by":"publisher","first-page":"104","DOI":"10.36676\/urr.2023-v10i3-014","volume":"10","author":"S Yadav","year":"2023","unstructured":"Yadav S (2023) An extensive study on lattice-based cryptography and its applications for rlwe-based problems. Universal Res Reports 10(3):104\u2013110","journal-title":"Universal Res Reports"},{"key":"140_CR48","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.tcs.2022.02.032","volume":"915","author":"S Yang","year":"2022","unstructured":"Yang S, Huang X (2022) Universal product learning with errors: A new variant of lwe for lattice-based cryptography. Theoretical Comput Sci 915:90\u2013100","journal-title":"Theoretical Comput Sci"},{"issue":"2","key":"140_CR49","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/COMST.2023.3254481","volume":"25","author":"Z Yang","year":"2023","unstructured":"Yang Z, Zolanvari M, Jain R (2023) A survey of important issues in quantum computing and communications. IEEE Commun Surv Tutorials 25(2):1059\u20131094","journal-title":"IEEE Commun Surv Tutorials"},{"key":"140_CR50","doi-asserted-by":"crossref","unstructured":"Zhukabayeva T, Rehman A, Tariq N, Benkhelifa E (2024) Hyperledger fabric based post quantum cryptography healthcare application using discrete event simulation. IEEE Access","DOI":"10.1109\/ACCESS.2024.3513153"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00140-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00140-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00140-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T12:19:43Z","timestamp":1760530783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00140-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,23]]},"references-count":50,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["140"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00140-0","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,23]]},"assertion":[{"value":"20 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: In this article the affiliation details for Author A were incorrectly given as \u2018Department of Education Technology, College of Education, University of Ha\u2019il, Ha\u2019il, Ha\u2019il 81481, Saudi Arabia\u2019 but should have been \u2018Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Ha\u2019il, Ha\u2019il, Ha\u2019il 81481, Saudi Arabia\u2019.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"126"}}