{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:55:05Z","timestamp":1770224105661,"version":"3.49.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T00:00:00Z","timestamp":1623801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61977294 and 61932016"],"award-info":[{"award-number":["61977294 and 61932016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Opening Project of Guangdong Key Laboratory of Data Security and Privacy Protection","award":["2017B030301004"],"award-info":[{"award-number":["2017B030301004"]}]},{"name":"Researchers Supporting Project of King Saud University","award":["RSP-2019\/12"],"award-info":[{"award-number":["RSP-2019\/12"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,8,31]]},"abstract":"<jats:p>\n            As one of the essential applications of health information technology, the eHealth system plays a significant role in enabling various internet medicine service scenes, most of which primarily rely on service recommendation or an evaluation mechanism. To avoid privacy leakage, some privacy-preserving mechanisms must be adopted to protect raters\u2019 privacy and make evaluation trust reliable. To tackle this challenge, this article proposes an efficient service recommendation and evaluation scheme, called\n            <jats:italic>EPRT<\/jats:italic>\n            , which is based on a similarity calculation and trust discovery method. This scheme uses homomorphic encryption technology to encrypt the sensitive data and combines the threshold mechanism and double-trap mechanism to realize the secure computing on the encrypted data, so as to ensure that the plaintexts of the final calculation results (e.g., recommendation value and evaluation truth) are only obtained by the authorized subject. In addition, a detailed security analysis shows that the proposed EPRT scheme can achieve the expected security. In addition, performance comparison results are carried out, demonstrating its effectiveness and accuracy.\n          <\/jats:p>","DOI":"10.1145\/3397678","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:39:34Z","timestamp":1594125574000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9958-3255","authenticated-orcid":false,"given":"Cong","family":"Peng","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Wuhan University, China and Guangdong Key Laboratory of Data Security and Privacy Protection, Jinan University, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, China and Guangdong Key Laboratory of Data Security and Privacy Protection, Jinan University, Guangdong, China"}]},{"given":"Jianhua","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Thapar University, India and Department of Computer Science and Information Engineering, Asia University, China, School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, and Department of Computer Science and Information Engineering, King Abdul Aziz University, Jiddah, Saudi Arabia"}]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2021,6,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817416"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJoSE.2019070104"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJOCI.2016070105"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2753464"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2883080"},{"key":"e_1_2_1_7_1","first-page":"1","article-title":"Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme","volume":"1","author":"Feng Qi","year":"2020","unstructured":"Qi Feng , Debiao He , Zhe Liu , Ding Wang , and Kim-Kwang Raymond Choo . 2020 . Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme . IET Information Security 1 , 99 (2020), 1 \u2013 10 . Qi Feng, Debiao He, Zhe Liu, Ding Wang, and Kim-Kwang Raymond Choo. 2020. Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Information Security 1, 99 (2020), 1\u201310.","journal-title":"IET Information Security"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2720159"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0473-0"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0425-0"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2565001"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897870"},{"key":"e_1_2_1_14_1","first-page":"36","article-title":"A comprehensive review of an electronic health record system soon to assume market ascendancy","volume":"1","author":"Johnson R. J.","year":"2016","unstructured":"R. J. Johnson . 2016 . A comprehensive review of an electronic health record system soon to assume market ascendancy : EPIC. Journal of Healthcare Communications 1 , 4 (2016), 36 . R. J. Johnson. 2016. A comprehensive review of an electronic health record system soon to assume market ascendancy: EPIC. Journal of Healthcare Communications 1, 4 (2016), 36.","journal-title":"Journal of Healthcare Communications"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2764095"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1007-5"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.017"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010515"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2048-0"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1602"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2361-z"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.059"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535568.2448943"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2943118"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897350.2897352"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573770"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.060"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809719"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.14.24"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.03.013"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362034"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3145623"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389829"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2017.2721545"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_5"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904728"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949782"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.06.025"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190745"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.064"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:53Z","timestamp":1750199933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,16]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,8,31]]}},"alternative-id":["10.1145\/3397678"],"URL":"https:\/\/doi.org\/10.1145\/3397678","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,16]]},"assertion":[{"value":"2020-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}