{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:00:41Z","timestamp":1778083241614,"version":"3.51.4"},"reference-count":68,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Ensuring data privacy and security in sensitive domains such as healthcare remains a critical challenge. Homomorphic Encryption (HE) offers a promising approach by enabling computations directly on encrypted data, but the diversity of available schemes requires careful evaluation before practical adoption. This work conducts a comparative study of six representative HE schemes: BGV, TFHE, Paillier, RSA without padding, BFV, and CKKS. It is adopted a five-step strategy, encompassing preprocessing, cryptographic setup, encryption, homomorphic execution, and decryption, applied to a healthcare dataset. Overall, the comparative analysis underscores that no single scheme is universally optimal. The choice of an HE scheme must be guided by the nature of the required operations, acceptable precision levels, and computational constraints of the target healthcare scenario.<\/jats:p>","DOI":"10.3390\/jcp5030074","type":"journal-article","created":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T07:07:18Z","timestamp":1758092838000},"page":"74","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating Homomorphic Encryption Schemes for Privacy and Security in Healthcare Data Management"],"prefix":"10.3390","volume":"5","author":[{"given":"Henrique","family":"Jorge","sequence":"first","affiliation":[{"name":"Department of Informatics, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8921-4747","authenticated-orcid":false,"given":"Cristina","family":"Wanzeller","sequence":"additional","affiliation":[{"name":"Department of Informatics, Polytechnic of Viseu, 3504-510 Viseu, Portugal"},{"name":"CISeD\u2014Research Centre in Digital Services, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-9511","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Henriques","sequence":"additional","affiliation":[{"name":"Department of Informatics, Polytechnic of Viseu, 3504-510 Viseu, Portugal"},{"name":"CISeD\u2014Research Centre in Digital Services, Polytechnic of Viseu, 3504-510 Viseu, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2454","DOI":"10.1109\/TIFS.2024.3350909","article-title":"Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption","volume":"19","author":"Wang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Proc. First Annu. ACM Symp. Theory Comput., 169\u2013178.","DOI":"10.1145\/1536414.1536440"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","article-title":"A systematic review of homomorphic encryption and its contributions in healthcare industry","volume":"9","author":"Munjal","year":"2022","journal-title":"Complex Intell. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Liu, Y., Yang, C., Liu, Q., Xu, M., Zhang, C., Cheng, L., and Wang, W. (2024). PDPHE: Personal Data Protection for Trans-Border Transmission Based on Homomorphic Encryption. Electronics, 13.","DOI":"10.3390\/electronics13101959"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3124441","article-title":"A Survey on Fully Homomorphic Encryption: An Engineering Perspective","volume":"50","author":"Martins","year":"2017","journal-title":"ACM Comput. Surv"},{"key":"ref_6","unstructured":"Daemen, J., and Rijmen, V. (2025, June 03). AES Proposal: Rijndael. ResearchGate, Available online: https:\/\/api.semanticscholar.org\/CorpusID:17885291."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_8","unstructured":"EUR-Lex (2024, December 10). General Data Protection Regulation (GDPR). Available online: https:\/\/eur-lex.europa.eu\/PT\/legal-content\/summary\/general-data-protection-regulation-gdpr.html."},{"key":"ref_9","unstructured":"EUR-Lex (2024, December 10). Cybersecurity of Network and Information Systems (2022). Available online: https:\/\/eur-lex.europa.eu\/EN\/legal-content\/summary\/cybersecurity-of-network-and-information-systems-2022.html."},{"key":"ref_10","first-page":"1","article-title":"Truly privacy-preserving federated analytics for precision medicine with multiparty homomorphic encryption","volume":"12","author":"Froelicher","year":"2021","journal-title":"Nat. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","article-title":"Survey on Fully Homomorphic Encryption, Theory, and Applications","volume":"110","author":"Marcolla","year":"2022","journal-title":"Proc. IEEE"},{"key":"ref_12","first-page":"102362","article-title":"A systematic review on the status and progress of homomorphic encryption technologies","volume":"48","author":"Alloghani","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Hamza, R., Hassan, A., Ali, A., Bashir, M.B., Alqhtani, S.M., Tawfeeg, T.M., and Yousif, A. (2022). Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. Entropy, 24.","DOI":"10.3390\/e24040519"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Thesis, Stanford University].","DOI":"10.1145\/1536414.1536440"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1016\/S1004-4132(08)60204-2","article-title":"New HB-weighted time delay estimation algorithm under impulsive noise environment","volume":"19","author":"Yongmei","year":"2008","journal-title":"J. Syst. Eng. Electron."},{"key":"ref_16","unstructured":"Takagi, T., and Peyrin, T. (2017). Homomorphic Encryption for Arithmetic of Approximate Numbers. Advances in Cryptology\u2014ASIACRYPT 2017, Springer."},{"key":"ref_17","first-page":"1","article-title":"Fully Homomorphic Encryption without Bootstrapping","volume":"6","author":"Brakerski","year":"2014","journal-title":"ACM Trans. Comput."},{"key":"ref_18","first-page":"831","article-title":"Efficient Fully Homomorphic Encryption from (Standard) LWE","volume":"4","author":"Brakerski","year":"2014","journal-title":"J. Comput."},{"key":"ref_19","unstructured":"Cheon, J.H., and Takagi, T. (2016). Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds. Advances in Cryptology\u2014ASIACRYPT 2016, Springer."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","article-title":"TFHE: Fast Fully Homomorphic Encryption Library over the Torus","volume":"33","author":"Chillotti","year":"2019","journal-title":"J. Cryptol."},{"key":"ref_21","unstructured":"Research, M. (2025, June 17). Microsoft SEAL: Simple Encrypted Arithmetic Library. Available online: https:\/\/github.com\/microsoft\/SEAL."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Garay, J.A., and Gennaro, R. (2014). Algorithms in HElib. Advances in Cryptology\u2014CRYPTO 2014, Springer.","DOI":"10.1007\/978-3-662-44371-2"},{"key":"ref_23","unstructured":"Halevi, S., and Shoup, V. (2025, June 03). HElib: An Implementation of Homomorphic Encryption. Available online: https:\/\/github.com\/homenc\/HElib."},{"key":"ref_24","unstructured":"Team, P.D. (2025, June 17). PALISADE: Lattice Cryptography Library. Available online: https:\/\/gitlab.com\/palisade\/palisade-release."},{"key":"ref_25","unstructured":"OpenMined (2025, June 03). TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption. Available online: https:\/\/pypi.org\/project\/tenseal\/."},{"key":"ref_26","unstructured":"OpenMined (2025, June 03). TenSEAL: A Library for Homomorphic Encryption on Tensor. Available online: https:\/\/github.com\/OpenMined\/TenSEAL."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Kilian, J. (2005). Universally Composable Privacy Amplification Against Quantum Adversaries. Theory of Cryptography, Springer.","DOI":"10.1007\/b106171"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","article-title":"Homomorphic Encryption-Based Privacy-Preserving Federated Learning in IoT-Enabled Healthcare System","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"10802","DOI":"10.1109\/TII.2024.3397343","article-title":"Privacy-Preserving Electronic Medical Record Sharing for IoT-Enabled Healthcare System Using Fully Homomorphic Encryption, IOTA, and Masked Authenticated Messaging","volume":"20","author":"Reddi","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ali, A., Al-rimy, B.A.S., Alsubaei, F.S., Almazroi, A.A., and Almazroi, A.A. (2023). HealthLock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications. Sensors, 23.","DOI":"10.3390\/s23156762"},{"key":"ref_31","unstructured":"Yao, Y., Cecil, J., Angyan, P., Bahroos, N., and Ravi, S. (2024). Feasibility of Privacy-Preserving Entity Resolution on Confidential Healthcare Datasets Using Homomorphic Encryption. arXiv."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"61656","DOI":"10.1109\/ACCESS.2019.2916503","article-title":"A Review of Secure and Privacy-Preserving Medical Data Sharing","volume":"7","author":"Jin","year":"2019","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Liu, J., Liang, T., Sun, R., Du, X., and Guizani, M. (2020, January 7\u201311). A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain. Proceedings of the GLOBECOM 2020\u20142020 IEEE Global Communications Conference, Taipei, Taiwa.","DOI":"10.1109\/GLOBECOM42002.2020.9348251"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"180161","DOI":"10.1038\/sdata.2018.161","article-title":"The HAM10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions","volume":"5","author":"Tschandl","year":"2018","journal-title":"Sci. Data"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Firdaus, M., and Rhee, K.H. (2024, January 29\u201331). Secure Federated Learning with Blockchain and Homomorphic Encryption for Healthcare Data Sharing. Proceedings of the 2024 International Conference on Cyberworlds (CW), Kofu, Japan.","DOI":"10.1109\/CW64301.2024.00036"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sathishkumar, P., Pugalarasan, K., Ponnparamaguru, C., and Vasanthkumar, M. (2024, January 18\u201319). Improving Healthcare Data Security Using Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption. Proceedings of the 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), Chikkaballapur, India.","DOI":"10.1109\/ICKECS61492.2024.10616691"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3233\/JHS-222016","article-title":"A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT","volume":"29","author":"Su","year":"2023","journal-title":"J. High Speed Netw."},{"key":"ref_38","unstructured":"Dileep070 (2025, June 17). Logistic Regression To Predict Heart Disease. Available online: https:\/\/www.kaggle.com\/datasets\/dileep070\/heart-disease-prediction-using-logistic-regression."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1186\/s42400-024-00232-w","article-title":"FedSHE: Privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption","volume":"7","author":"Pan","year":"2024","journal-title":"Cybersecurity"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Agull\u00f3-Domingo, C., Vera-L\u00f3pez, \u00d3., Guzelhan, S., Daksha, L., El Jerari, A., Shivdikar, K., Agrawal, R., Kaeli, D., Joshi, A., and Abell\u00e1n, J.L. (2025). FIDESlib: A Fully-Fledged Open-Source FHE Library for Efficient CKKS on GPUs. arXiv.","DOI":"10.1109\/ISPASS64960.2025.00045"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kumar, V.V., and Pabitha, P. (2024, January 18\u201319). Privacy-Preserving Brakerski-Gentry-Vaikuntanathan (BGV) Homomorphic Encryption for IoMT Data Security. Proceedings of the 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS), Chikkaballapur, India.","DOI":"10.1109\/ICKECS61492.2024.10617001"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1109\/TVLSI.2019.2943127","article-title":"Design and Implementation of Encryption\/Decryption Architectures for BFV Homomorphic Encryption Scheme","volume":"28","author":"Mert","year":"2020","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TETC.2019.2902799","article-title":"Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme","volume":"9","author":"Polyakov","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Halevi, S., Polyakov, Y., and Shoup, V. (2018). An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. Topics in Cryptology\u2014CT-RSA 2019, Springer.","DOI":"10.1007\/978-3-030-12612-4_5"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bajard, J.C., Eynard, J., Hasan, A., and Zucca, V. (2016). A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes. International Conference on Selected Areas in Cryptography, Springer International Publishing.","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"e460","DOI":"10.1002\/spy2.460","article-title":"Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics","volume":"8","author":"Gandhi","year":"2024","journal-title":"Secur. Priv."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Jyothi, V., and Srinivasarao, B. (2025, January 11\u201313). Survey on Privacy-Preserving Medical Image Analysis with Big Data and Blockchain using ML and DL. Proceedings of the 2025 International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India.","DOI":"10.1109\/ICEARS64219.2025.10940761"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Muthalakshmi, M., Jeyapal, K., Vinoth, M., P S, D., Murugan, N.S., and Sheela, K. (2024, January 7\u20139). Federated Learning for Secure and Privacy-Preserving Medical Image Analysis in Decentralized Healthcare Systems. Proceedings of the 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.","DOI":"10.1109\/ICESC60852.2024.10690003"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Du Pont, D., Bertels, J., Turan, F., Van Beirendonck, M., and Verbauwhede, I. (2024, January 10\u201312). Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption. Proceedings of the 2024 IEEE 31st Symposium on Computer Arithmetic (ARITH), M\u00e1laga, Spain.","DOI":"10.1109\/ARITH61463.2024.00011"},{"key":"ref_50","first-page":"2857","article-title":"ReMCA: A Reconfigurable Multi-Core Architecture for Full RNS Variant of BFV Homomorphic Evaluation","volume":"69","author":"Su","year":"2022","journal-title":"IEEE Trans. Circuits Syst. I: Regul. Pap."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"32","DOI":"10.46586\/tches.v2023.i4.32-57","article-title":"BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption","volume":"2023","author":"Geelen","year":"2023","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"T\u00fcrko\u011flu, E.R., \u00d6zcan, A.\u015e., Ayduman, C., Mert, A.C., \u00d6zt\u00fcrk, E., and Sava\u015f, E. (June, January 27). An Accelerated GPU Library for Homomorphic Encryption Operations of BFV Scheme. Proceedings of the 2022 IEEE International Symposium on Circuits and Systems (ISCAS), Austin, TX, USA.","DOI":"10.1109\/ISCAS48785.2022.9937503"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Yao, Y., Ghai, T., Ravi, S., and Szekely, P. (2021, January 1\u20135). AMPPERE. Proceedings of the CIKM\u201921: The 30th ACM International Conference on Information and Knowledge Management, Virtual.","DOI":"10.1145\/3459637.3482318"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s10586-024-04928-z","article-title":"PriCollabAnalysis: Privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation","volume":"28","author":"Tawfik","year":"2025","journal-title":"Clust. Comput."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1109\/TNSE.2023.3285070","article-title":"A Novel Homomorphic Encryption and Consortium Blockchain-Based Hybrid Deep Learning Model for Industrial Internet of Medical Things","volume":"10","author":"Ali","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Dang, B.T.H., Luan, P.H., Ngan, V.D.T., Trong, N.T., Duy, P.T., and Pham, V.H. (2023, January 19\u201321). TrustFedHealth: Federated Learning with Homomorphic Encryption and Blockchain for Heart Disease Prediction in the Smart Healthcare. Proceedings of the 2023 International Conference on Advanced Technologies for Communications (ATC), Da Nang, Vietnam.","DOI":"10.1109\/ATC58710.2023.10318944"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Patel, C.N. (2024, January 15\u201318). Privacy-Preserving Big Data Analytics Using Homomorphic Encryption: A Comprehensive Evaluation in Healthcare Applications. Proceedings of the 2024 IEEE International Conference on Big Data (BigData), Washington, DC, USA.","DOI":"10.1109\/BigData62323.2024.10825923"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Erregui, S., Mouaatamid, O.E., and Loualid, E.M. (2024, January 4\u20136). Securing Healthcare Data in IoT: A Study on Homomorphic Encryption. Proceedings of the 2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet), Rabat, Morocco.","DOI":"10.1109\/CommNet63022.2024.10793287"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Odeyomi, O.T., Karnati, H., and Smith, A. (2024, January 29\u201331). Preserving Medical Data with Renyi Differential Privacy. Proceedings of the 2024 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA.","DOI":"10.1109\/AIIoT61789.2024.10578985"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Borkakoty, S., Islam, A.U., and Bora, K.C. (2024, January 7\u20139). Privacy-Preserving Data Anonymization Tool for Medical Data. Proceedings of the II Southern Science Conference (SSCON)\u20142024-Virtual Conference and In-Person Edition, Mendoza, Argentina.","DOI":"10.48141\/SSCON_06_2024.pdf"},{"key":"ref_61","unstructured":"Patil, P. (2025, March 10). Healthcare Dataset. Available online: https:\/\/www.kaggle.com\/datasets\/prasad22\/healthcare-dataset."},{"key":"ref_62","unstructured":"Kaggle (2025, March 10). Kaggle: Your Machine Learning and Data Science Community. Available online: https:\/\/www.kaggle.com."},{"key":"ref_63","unstructured":"Patil, P. (2025, March 10). Kaggle Profile: Prasad22. Available online: https:\/\/www.kaggle.com\/prasad22."},{"key":"ref_64","unstructured":"McKinney, W. (July, January 28). Data Structures for Statistical Computing in Python. Proceedings of the 9th Python in Science Conference, Austin, TX, USA."},{"key":"ref_65","unstructured":"CSIRO\u2019s Data61 (2025, June 03). Python Paillier: A library for Partially Homomorphic Encryption in Python. Available online: https:\/\/python-paillier.readthedocs.io\/en\/develop\/."},{"key":"ref_66","unstructured":"CSIRO\u2019s Data61 (2025, June 03). Python Paillier Library. Available online: https:\/\/github.com\/data61\/python-paillier."},{"key":"ref_67","unstructured":"Legrandin (2025, June 03). PyCryptodome on PyPI. Available online: https:\/\/pypi.org\/project\/pycryptodome\/."},{"key":"ref_68","unstructured":"Legrandin (2025, June 03). PyCryptodome: A Self-Contained Python Package of Low-Level Cryptographic Primitives. Available online: https:\/\/github.com\/Legrandin\/pycryptodome."}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/74\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:46:48Z","timestamp":1760035608000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/5\/3\/74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":68,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["jcp5030074"],"URL":"https:\/\/doi.org\/10.3390\/jcp5030074","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,17]]}}}