{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:53:04Z","timestamp":1775976784834,"version":"3.50.1"},"reference-count":35,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:00Z","timestamp":1755907200000},"content-version":"vor","delay-in-days":234,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Quantum Communication"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Traditional encryption methods face significant challenges due to the rapid advancement of quantum computing, necessitating the use of quantum\u2010resistant solutions. Cryptographic hash functions are used by Sphincs+, a stateless hash\u2010based digital signature technique, to provide robust protection against quantum attacks. This research investigates the application of Sphincs+, alongside Dilithium and Falcon, to enhance the security of medical images, which are critical for diagnostic and therapeutic processes in healthcare. By utilising digital signatures for authentication and integrity verification, Sphincs+ mitigates risks associated with unauthorised tampering and data manipulation. The integration of Sphincs+ into medical imaging frameworks strengthens data security, ensuring long\u2010term resilience against quantum\u2010enabled threats while maintaining the reliability of healthcare records.<\/jats:p>","DOI":"10.1049\/qtc2.70006","type":"journal-article","created":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:35:22Z","timestamp":1755974122000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Post\u2010Quantum Digital Signatures for Enhanced Medical Image Security"],"prefix":"10.1049","volume":"6","author":[{"given":"Kumar Sekhar","family":"Roy","sequence":"first","affiliation":[{"name":"School of Computer Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8094-2289","authenticated-orcid":false,"given":"Shweta","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Electronics &amp; Communication Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Preethi","family":"Srivathsa","sequence":"additional","affiliation":[{"name":"School of Computer Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruhul Amin","family":"Hazarika","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica (DIMES) University of Calabria  Cosenza Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sk Mahmudul","family":"Hassan","sequence":"additional","affiliation":[{"name":"School of Computer Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K. Susheel","family":"Kumar","sequence":"additional","affiliation":[{"name":"School of Computer Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"265","published-online":{"date-parts":[[2025,8,23]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1142\/s0219749908003256"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETSIS61505.2024.10459380"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1142\/s0219749917300017"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2023.105511"},{"issue":"2","key":"e_1_2_9_6_1","article-title":"Utilizing Machine Learning as a Potent Instrument in the Biomedical Care and Health Informatics Fields","volume":"54","author":"Jana S.","journal-title":"Sirjana Journal"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036\u2010023\u201002158\u2010y"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.15.10.747-754"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1108\/aci\u201002\u20102021\u20100036"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3486649"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIRVED56496.2022.9965491"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.54254\/2755\u20102721\/15\/20230814"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24040538"},{"key":"e_1_2_9_14_1","unstructured":"A. A.Yavuz S.Darzi andS. E.Nouma \u201cLightweight and Scalable Post\u2010Quantum Authentication for Medical Internet of Things \u201d arXiv preprint arXiv:2311.18674 (2023)."},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.24294\/irr.v6i1.3852"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.47974\/jdmsc\u20101837"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.28945\/4008"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"e_1_2_9_19_1","first-page":"1435","volume-title":"2023 IEEE Symposium on Security and Privacy (SP)","author":"Kudinov M. A.","year":"2023"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD51259.2020.00046"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/a16110518"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3350775"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3374629"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2022.3215913"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3653459"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/tvlsi.2022.3156479"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569456"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/technologies12120241"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/tcsii.2023.3304416"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3374645"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3327400"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3355222"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i2.80\u2010114"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD51259.2020.00046"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00046"}],"container-title":["IET Quantum Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/qtc2.70006","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/qtc2.70006","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/qtc2.70006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:30:05Z","timestamp":1775975405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/qtc2.70006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/qtc2.70006"],"URL":"https:\/\/doi.org\/10.1049\/qtc2.70006","archive":["Portico"],"relation":{},"ISSN":["2632-8925","2632-8925"],"issn-type":[{"value":"2632-8925","type":"print"},{"value":"2632-8925","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-03-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-06","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70006"}}