{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:01Z","timestamp":1773615721511,"version":"3.50.1"},"reference-count":17,"publisher":"Allerton Press","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.3103\/s0146411625700087","type":"journal-article","created":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T12:23:41Z","timestamp":1750595021000},"page":"91-101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Effective Security Enhancement Scheme for Postquantum Cryptography Based Blockchain Networks in Cloud Computing"],"prefix":"10.3103","volume":"59","author":[{"family":"Sripriya Arunachalam","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"7819_CR1","doi-asserted-by":"publisher","first-page":"264","DOI":"10.3390\/info13050264","volume":"13","author":"J. Shi","year":"2022","unstructured":"Shi, J., Zeng, X., and Han, R., A blockchain-based decentralized public key infrastructure for information-centric networks, Information, 2022, vol. 13, no. 5, p. 264. https:\/\/doi.org\/10.3390\/info13050264","journal-title":"Information"},{"key":"7819_CR2","doi-asserted-by":"publisher","first-page":"442","DOI":"10.3390\/info13100442","volume":"13","author":"E.A. Adeniyi","year":"2022","unstructured":"Adeniyi, E.A., Falola, P.B., Maashi, M.S., Aljebreen, M., and Bharany, S., Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions, Information, 2022, vol. 13, no. 10, p. 442. https:\/\/doi.org\/10.3390\/info13100442","journal-title":"Information"},{"key":"7819_CR3","doi-asserted-by":"publisher","first-page":"108022","DOI":"10.1016\/j.compeleceng.2022.108022","volume":"101","author":"B.S.A. Alhayani","year":"2022","unstructured":"Alhayani, B.S.A., Hamid, N., Almukhtar, F.H., Alkawak, O.A., Mahajan, H.B., Kwekha-Rashid, A.S., \u0130lhan, H., Marhoon, H.A., Mohammed, H.J., Chaloob, I.Z., and Alkhayyat, A., Optimized video internet of things using elliptic curve cryptography based encryption and decryption, Comput. Electr. Eng., 2022, vol. 101, p. 108022. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108022","journal-title":"Comput. Electr. Eng."},{"key":"7819_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/msec.2022.3202589","volume":"20","author":"D. Moody","year":"2022","unstructured":"Moody, D. and Robinson, A., Cryptographic standards in the post-quantum era, IEEE Secur. Privacy, 2022, vol. 20, no. 6, pp. 66\u201372. https:\/\/doi.org\/10.1109\/msec.2022.3202589","journal-title":"IEEE Secur. Privacy"},{"key":"7819_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tsc.2021.3116896","volume":"16","author":"R. Saha","year":"2021","unstructured":"Saha, R., Kumar, G., Devgun, T., Buchanan, W., Thomas, R., Alazab, M., Kim, T.-H., and Rodrigues, J., A\u00a0blockchain framework in post-quantum decentralization, IEEE Trans. Services Comput., 2021, vol. 16, no. 1, pp. 1\u201312. https:\/\/doi.org\/10.1109\/tsc.2021.3116896","journal-title":"IEEE Trans. Services Comput."},{"key":"7819_CR6","doi-asserted-by":"publisher","first-page":"264","DOI":"10.3390\/drones6100264","volume":"6","author":"S. Javed","year":"2022","unstructured":"Javed, S., Khan, M.A., Abdullah, A.M., Alsirhani, A., Alomari, A., Noor, F., and Ullah, I., An efficient authentication scheme using blockchain as a certificate authority for the Internet of Drones, Drones, 2022, vol. 6, no. 10, p. 264. https:\/\/doi.org\/10.3390\/drones6100264","journal-title":"Drones"},{"key":"7819_CR7","doi-asserted-by":"publisher","first-page":"104828","DOI":"10.1016\/j.micpro.2023.104828","volume":"99","author":"D. Verchyk","year":"2023","unstructured":"Verchyk, D. and Sep\u00falveda, J., A practical study of post-quantum enhanced identity-based encryption, Microprocessors Microsyst., 2023, vol. 99, p. 104828. https:\/\/doi.org\/10.1016\/j.micpro.2023.104828","journal-title":"Microprocessors Microsyst."},{"key":"7819_CR8","doi-asserted-by":"publisher","first-page":"108226","DOI":"10.1016\/j.compeleceng.2022.108226","volume":"102","author":"G. Megala","year":"2022","unstructured":"Megala, G. and Swarnalatha, P., Efficient high-end video data privacy preservation with integrity verification in cloud storage, Comput. Electr. Eng., 2022, vol. 102, p. 108226. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108226","journal-title":"Comput. Electr. Eng."},{"key":"7819_CR9","doi-asserted-by":"publisher","first-page":"99990","DOI":"10.1109\/ACCESS.2023.3313098","volume":"11","author":"V. Yousefipoor","year":"2023","unstructured":"Yousefipoor, V. and Eghlidos, T., An efficient post-quantum attribute-based encryption scheme based on rank metric codes for cloud computing, IEEE Access, 2023, vol. 11, pp. 99990\u2013100000. https:\/\/doi.org\/10.1109\/ACCESS.2023.3313098","journal-title":"IEEE Access"},{"key":"7819_CR10","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/j.future.2022.11.034","volume":"141","author":"J. Liu","year":"2023","unstructured":"Liu, J., Wen, J., Zhang, B., Dong, Sh., Tang, B., and Yu, Yo., A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things, Future Gener. Comput. Syst., 2023, vol. 141, pp.\u00a0663\u2013676. https:\/\/doi.org\/10.1016\/j.future.2022.11.034","journal-title":"Future Gener. Comput. Syst."},{"key":"7819_CR11","doi-asserted-by":"publisher","first-page":"10393","DOI":"10.1109\/tvt.2023.3260579","volume":"72","author":"P. Bagchi","year":"2023","unstructured":"Bagchi, P., Maheshwari, R., Bera, B., Das, A.K., Park, Yo., Lorenz, P., and Yau, D.K.Y., Public blockchain-envisioned security scheme using post quantum lattice-based aggregate signature for Internet of Drones applications, IEEE Trans. Veh. Technol., 2023, vol. 72, no. 8, pp. 10393\u201310408. https:\/\/doi.org\/10.1109\/tvt.2023.3260579","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7819_CR12","doi-asserted-by":"publisher","first-page":"110039","DOI":"10.1016\/j.comnet.2023.110039","volume":"236","author":"J. Garc\u00eda-Rodr\u00edguez","year":"2023","unstructured":"Garc\u00eda-Rodr\u00edguez, J. and Skarmeta, A., A privacy-preserving attribute-based framework for IoT identity lifecycle management, Comput. Networks, 2023, vol. 236, p. 110039. https:\/\/doi.org\/10.1016\/j.comnet.2023.110039","journal-title":"Comput. Networks"},{"key":"7819_CR13","doi-asserted-by":"publisher","first-page":"416","DOI":"10.3390\/jcp3030021","volume":"3","author":"J. Samandari","year":"2023","unstructured":"Samandari, J. and Gritti, C., Post-quantum authentication in the MQTT protocol, J. Cybersecurity Privacy, 2023, vol. 3, no. 3, pp. 416\u2013434. https:\/\/doi.org\/10.3390\/jcp3030021","journal-title":"J. Cybersecurity Privacy"},{"key":"7819_CR14","doi-asserted-by":"publisher","first-page":"e7700","DOI":"10.1002\/cpe.7700","volume":"35","author":"G. Verma","year":"2023","unstructured":"Verma, G. and Kumar, A., Novel quantum key distribution and attribute based encryption for cloud data security, Concurrency Comput.: Pract. Exper., 2023, vol. 35, no. 21, p. e7700. https:\/\/doi.org\/10.1002\/cpe.7700","journal-title":"Concurrency Comput.: Pract. Exper."},{"key":"7819_CR15","doi-asserted-by":"publisher","first-page":"7765","DOI":"10.3390\/app13137765","volume":"13","author":"T. Chen","year":"2023","unstructured":"Chen, T., Ren, Zh., Yu, Yi., Zhu, J., and Zhao, J., Lattices-inspired CP-ABE from LWE scheme for data access and sharing based on blockchain, Appl. Sci., 2023, vol. 13, no. 13, p. 7765. https:\/\/doi.org\/10.3390\/app13137765","journal-title":"Appl. Sci."},{"key":"7819_CR16","doi-asserted-by":"publisher","first-page":"4970","DOI":"10.1109\/tifs.2023.3301740","volume":"18","author":"F. Luo","year":"2023","unstructured":"Luo, F., Wang, H., Lin, Ch., and Yan, X., ABAEKS: Attribute-based authenticated encryption with keyword search over outsourced encrypted data, IEEE Trans. Inf. Forensics Secur., 2023, vol. 18, pp. 4970\u20134983. https:\/\/doi.org\/10.1109\/tifs.2023.3301740","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7819_CR17","doi-asserted-by":"publisher","unstructured":"Chen, Ya., DualMS: Efficient lattice-based two-round multi-signature with trapdoor-free simulation, Advances in Cryptology\u2013CRYPTO 2023, Handschuh, H. and Lysyanskaya, A., Eds., Lecture Notes in Computer Science, vol. 14085, Cham: Springer, 2023, pp. 716\u2013747. https:\/\/doi.org\/10.1007\/978-3-031-38554-4_23","DOI":"10.1007\/978-3-031-38554-4_23"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700087.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700087","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700087.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:42Z","timestamp":1773612222000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700087"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["7819"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700087","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"11 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}