{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:54:45Z","timestamp":1773932085137,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tnsm.2025.3602117","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:45:39Z","timestamp":1756154739000},"page":"5223-5238","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Security and Privacy of IoMT Data for Unconscious Patient With Blockchain"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4162-089X","authenticated-orcid":false,"given":"V.","family":"Maruthi","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, National Institute of Technology at Tiruchirappalli, Tiruchirappalli, India"}]},{"given":"Kunwar","family":"Singh","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, National Institute of Technology at Tiruchirappalli, Tiruchirappalli, India"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"California consumer privacy act","year":"2018"},{"issue":"1","key":"ref2","first-page":"294","article-title":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation)","volume":"59","year":"2016","journal-title":"Official J. Eur. Union"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref5","article-title":"Pre+: Dual of proxy re-encryption and its application","author":"Wang","year":"2013"},{"issue":"1","key":"ref6","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1504\/IJWGS.2018.088394","article-title":"Pre+: Dual of proxy re-encryption for secure cloud data sharing service","volume":"14","author":"Wang","year":"2018","journal-title":"Int. J. Web Grid Services"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_64"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39466-4_27"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref11","first-page":"103","article-title":"Non-interactive zero-knowledge and its applications","volume-title":"Proc. Symp. Theory Compu.","author":"Blum"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3036811"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/bf00196725"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246984"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02285-4"},{"issue":"2","key":"ref17","first-page":"28","article-title":"Smart contracts: Building blocks for digital markets","volume":"18","author":"Szabo","year":"2018","journal-title":"J. Transhumanist Thought"},{"key":"ref18","article-title":"Improving censorship-resistance, privacy, and scalability of the bitcoin ecosystem","author":"Nadahalli","year":"2023"},{"key":"ref19","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","author":"Ateniese","year":"2005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12000"},{"issue":"4","key":"ref22","first-page":"93","article-title":"Lattice based efficient threshold public key encryption scheme","volume":"4","author":"Singh","year":"2013","journal-title":"J. Wireless Mob. Netw. Ubiquitous Comput. Depend. Appl."},{"key":"ref23","first-page":"1","article-title":"PRE+: Dual of proxy re-encryption for secure cloud data sharing service","volume-title":"Proc. IEEE Int. Conf. Consum. Electron. (ICCE)","author":"Lee"},{"key":"ref24","first-page":"88","article-title":"Threshold proxy re-encryption and its application in blockchain","volume-title":"Proc. 4th Int. Conf. (ICCCS)","author":"Jiang"},{"key":"ref25","volume-title":"A review paper on raspberry pi and its applications","author":"Ghael","year":"2021"},{"key":"ref26","first-page":"456","article-title":"Unidirectional proxy re-encryption with fine-grained access control","volume":"14","author":"Xu","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/bloc.2019.8751336"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923525"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2019.8713188"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3038721"},{"issue":"19","key":"ref34","doi-asserted-by":"crossref","first-page":"2359","DOI":"10.3390\/electronics10192359","article-title":"A threshold proxy re-encryption scheme for secure IoT data sharing based on blockchain","volume":"10","author":"Chen","year":"2021","journal-title":"Electronics"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3308331"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3186006"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3393969"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3507912"},{"key":"ref39","first-page":"400","article-title":"Distributed threshold cryptography certification with no trusted dealer","volume-title":"Proc. Int. Conf. Security Cryptogr.","author":"Fournaris"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49162-7_9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.252"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2764082"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3042432"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3034232"},{"key":"ref45","first-page":"368","article-title":"CCA-secure proxy re-encryption without pairings","volume-title":"Proc. Int. Workshop Public Key Cryptogr.","author":"Shao"},{"issue":"14","key":"ref46","doi-asserted-by":"crossref","first-page":"6641","DOI":"10.3390\/s23146641","article-title":"Enabling trust and security in digital twin management: A blockchain-based approach with Ethereum and IPFs","volume":"23","author":"Onwubiko","year":"2023","journal-title":"Sensors"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIP47207.2019.8985677"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3077276"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03459-4"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11278396\/11137381.pdf?arnumber=11137381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:38:21Z","timestamp":1764959901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11137381\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":49,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3602117","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}