{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:46Z","timestamp":1755993766142,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T00:00:00Z","timestamp":1721779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,24]]},"DOI":"10.1145\/3688574.3688579","type":"proceedings-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:21:55Z","timestamp":1726230115000},"page":"33-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-Quantum Attribute-Based Authenticated Key Agreement Protocol for Smart Healthcare"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0236-830X","authenticated-orcid":false,"given":"Liang","family":"Ni","sequence":"first","affiliation":[{"name":"Zhongyuan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2093-8254","authenticated-orcid":false,"given":"Bingke","family":"Gu","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7171-617X","authenticated-orcid":false,"given":"Xiaoyan","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9405-530X","authenticated-orcid":false,"given":"Hengsheng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406699"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Mahmood Z Huansheng N Ata Ullah Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT [J]. Applied Sciences 2017 (7): 1069.","DOI":"10.3390\/app7101069"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Fitri N A Rasyid M U H A Sudarsono A .Secure Attribute-Based Encryption with Access Control to Data Medical Records[C]\/\/2018 International Electronics Symposium on Knowledge Creation and Intelligent Computing(IES-KCIC).2018.DOI:10.1109\/KCIC.2018.8628525.","DOI":"10.1109\/KCIC.2018.8628525"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIoT47925.2019.00006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMCIS51567.2020.9354297"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9441836"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10115-x"},{"issue":"78","key":"e_1_3_2_1_8_1","first-page":"5903","volume":"2022","author":"Roy P. K.","unstructured":"Roy P. K. , Bhattacharya A. A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment [J] Supercomputing, 2022 (78): 5903\u20135930.","journal-title":"Supercomputing"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2019.8784488"},{"issue":"17","key":"e_1_3_2_1_10_1","first-page":"1","volume":"2021","author":"Amiya Kumar S","unstructured":"Amiya Kumar S, Suraj S, Deepak P. Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service [J]. ACM Trans. on Multimedia Computing Communications and Applications, 2021 (17) , pp: 1-20.","journal-title":"Trans. on Multimedia Computing Communications and Applications"},{"key":"e_1_3_2_1_11_1","first-page":"257","volume-title":"Gao","author":"Zhao J.","unstructured":"Zhao, J., Gao, H.: LSSS matrix-based attribute-based encryption on lattices. [J]In: International Conference on Computational Intelligence and Security, Hong Kong, China, pp. 253\u2013257. IEEE (2018)"},{"volume-title":"The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques","year":"2005","key":"e_1_3_2_1_12_1","unstructured":"SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457\u2013473. doi: 10.1007\/ 11426639_27."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933576"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50594-2_21"},{"key":"e_1_3_2_1_15_1","volume-title":"Schaffner","author":"Don J.","year":"2022","unstructured":"Don, J., Fehr, S., Majenz, C., Schaffner, C.: Online-extractability in the quantum random-oracle model. [C]In: EUROCRYPT 2022. https:\/\/doi.org\/10.1007\/ 978-3-031-07082-2_24"},{"issue":"25","key":"e_1_3_2_1_16_1","first-page":"4737","volume":"2019","author":"Jia Xiaoying","unstructured":"Jia Xiaoying, He Debiao, Kumar Neeraj Authenticated key agreement scheme for fog-driven IoT healthcare system [J]. Wireless Networks, 2019 (25): 4737\u20134750.","journal-title":"Wireless Networks"},{"key":"e_1_3_2_1_17_1","first-page":"16","volume":"2021","author":"Tsu-Yang Wu","year":"2021","unstructured":"Tsu-Yang Wu, Tao Wang, Lee Yu-Qi, Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System [J]. Security and Communication Networks, 2021 (2021): 16.","journal-title":"Security and Communication Networks"},{"issue":"149","key":"e_1_3_2_1_18_1","first-page":"29","volume":"2019","author":"Gupta","unstructured":"Gupta, Anqur, Meenakshi Tripathi A lightweight anonymous user authentication and key establishment scheme for wearable devices [J]. Computer Networks, 2019 (149): 29-42","journal-title":"Computer Networks"},{"key":"e_1_3_2_1_19_1","volume-title":"Computer Networks","author":"Hajian R","year":"2020","unstructured":"Hajian R, ZakeriKia S, Erfani S H, , SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement [J]. Computer Networks, 2020 (183): Article ID 107567."},{"issue":"4","key":"e_1_3_2_1_20_1","first-page":"778","volume":"23","author":"Zhu W.","year":"2014","unstructured":"Zhu, W., Yu, J., Wang, T., Zhang, P., Xie, W.: Efficient attribute-based encryption from r-lwe. Chin. [J]. Electron 23(4), 778\u2013782 (2014)","journal-title":"Electron"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973256"},{"issue":"453","key":"e_1_3_2_1_22_1","first-page":"186","volume":"2018","author":"Shen Jian","unstructured":"Shen Jian. , Wang Chen. , Li Tong Secure data uploading scheme for a smart home system [J]. Information Sciences, 2018 (453): 186\u2013197","journal-title":"Information Sciences"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102787"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.05.001"}],"event":{"name":"BDE 2024: 2024 6th International Conference on Big Data Engineering","acronym":"BDE 2024","location":"Xining China"},"container-title":["Proceedings of the 2024 6th International Conference on Big Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688574.3688579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:14:37Z","timestamp":1755915277000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,24]]},"references-count":24,"alternative-id":["10.1145\/3688574.3688579","10.1145\/3688574"],"URL":"https:\/\/doi.org\/10.1145\/3688574.3688579","relation":{},"subject":[],"published":{"date-parts":[[2024,7,24]]},"assertion":[{"value":"2024-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}