{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:29:47Z","timestamp":1736573387785,"version":"3.32.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T00:00:00Z","timestamp":1728864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T00:00:00Z","timestamp":1728864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04688-w","type":"journal-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T15:02:30Z","timestamp":1728918150000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum-safe blockchain-assisted data encryption protocol for internet of things networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Sunil","family":"Prajapat","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rifaqat","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,14]]},"reference":[{"issue":"7","key":"4688_CR1","first-page":"97","volume":"22","author":"Kevin Ashton","year":"2009","unstructured":"Ashton, Kevin, et al.: That \u2018internet of things\u2019 thing. RFID J. 22(7), 97\u2013114 (2009)","journal-title":"RFID J."},{"key":"4688_CR2","doi-asserted-by":"crossref","unstructured":"Rana, Aryan, Prajapat, Sunil, Kumar, Pankaj, Gautam, Deepika, Chen, Chien-Ming: Designing a security framework based on hybrid communication in the internet of nano things. IEEE Internet of Things Journal, (2023)","DOI":"10.1109\/JIOT.2023.3315712"},{"issue":"1","key":"4688_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MPRV.2006.2","volume":"5","author":"Roy Want","year":"2006","unstructured":"Want, Roy: An introduction to rfid technology. IEEE Pervasive comput. 5(1), 25\u201333 (2006)","journal-title":"IEEE Pervasive comput."},{"issue":"12","key":"4688_CR4","first-page":"2292","volume":"52","author":"Jennifer Yick","year":"2008","unstructured":"Yick, Jennifer, Mukherjee, Biswanath, Ghosal, Dipak: Wireless sensor network survey. Comput. Net. (12), 2292\u20132330 (2008)","journal-title":"Wireless sensor network survey. Computer networks"},{"issue":"3","key":"4688_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MWC.2017.1600404","volume":"24","author":"Athar Ali Khan","year":"2017","unstructured":"Khan, Athar Ali, Rehmani, Mubashir Husain, Rachedi, Abderrezak: Cognitive-radio-based internet of things: applications, architectures, spectrum related functionalities, and future research directions. IEEE Wireless Commun. 24(3), 17\u201325 (2017)","journal-title":"IEEE Wireless Commun."},{"issue":"4","key":"4688_CR6","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"Ian F Akyildiz","year":"2002","unstructured":"Akyildiz, Ian F., Su, Weilian, Sankarasubramaniam, Yogesh, Cayirci, Erdal: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393\u2013422 (2002)","journal-title":"Comput. Netw."},{"issue":"4","key":"4688_CR7","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2011.5741148","volume":"49","author":"Shao-Yu Lien","year":"2011","unstructured":"Lien, Shao-Yu., Chen, Kwang-Cheng., Lin, Yonghua: Toward ubiquitous massive accesses in 3g pp machine-to-machine communications. IEEE Commun. Magazine 49(4), 66\u201374 (2011)","journal-title":"IEEE Commun. Magazine"},{"key":"4688_CR8","doi-asserted-by":"crossref","unstructured":"Rajkumar, Ragunathan, Lee, Insup, Sha, Lui, Stankovic, John: Cyber-physical systems: the next computing revolution. In Proceedings of the 47th design automation conference, pages 731\u2013736, (2010)","DOI":"10.1145\/1837274.1837461"},{"issue":"5","key":"4688_CR9","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","volume":"15","author":"Derui Ding","year":"2019","unstructured":"Ding, Derui, Han, Qing-Long., Wang, Zidong, Ge, Xiaohua: A survey on model-based distributed control and filtering for industrial cyber-physical systems. IEEE Trans. Ind. Inform. 15(5), 2483\u20132499 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4688_CR10","unstructured":"Burhanuddin, M.A., Mohammed, Ali Abdul-Jabbar, Ismail, Ronizam, Hameed, Mustafa\u00a0Emad, Kareem, Ali Noori, Basiron, Halizah, 2018 A review on security challenges and features in wireless sensor networks: Iot perspective. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-7): 17-21"},{"key":"4688_CR11","doi-asserted-by":"crossref","unstructured":"Shi, Wei, Ma, Chenguang, Kulshrestha, Srishti, Bose, Ranjan, Okada, Yoshihiro: A framework for automatically generating iot security quizzes in a virtual 3d environment based on linked data. In Advances in Internet, Data and Web Technologies: The 7th International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2019), pages 103\u2013113. Springer, (2019)","DOI":"10.1007\/978-3-030-12839-5_9"},{"issue":"3","key":"4688_CR12","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/JSYST.2015.2456878","volume":"11","author":"Yuichi Kawamoto","year":"2015","unstructured":"Kawamoto, Yuichi, Nishiyama, Hiroki, Kato, Nei, Shimizu, Yoshitaka, Takahara, Atsushi, Jiang, Tingting: Effectively collecting data for the location-based authentication in internet of things. IEEE Syst. J. 11(3), 1403\u20131411 (2015)","journal-title":"IEEE Syst. J."},{"issue":"7","key":"4688_CR13","first-page":"1","volume":"111","author":"Farooq Muhammad","year":"2015","unstructured":"Muhammad, Farooq, Anjum, Waseem, Mazhar, Khairi Sadia: A critical analysis on the security concerns of internet of things (iot). Int. J. Comput. Appl. 111(7), 1\u20136 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"7","key":"4688_CR14","first-page":"1","volume":"111","author":"Anjum Khairi","year":"2015","unstructured":"Khairi, Anjum, Farooq, M., Waseem, M., Mazhar, S.: A critical analysis on the security concerns of internet of things (iot). Perception 111(7), 1\u20136 (2015)","journal-title":"Perception"},{"issue":"4","key":"4688_CR15","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/COMST.2014.2320093","volume":"16","author":"Nikos Komninos","year":"2014","unstructured":"Komninos, Nikos, Philippou, Eleni, Pitsillides, Andreas: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16(4), 1933\u20131954 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4688_CR16","unstructured":"Nakamoto, Satoshi: Bitcoin: A peer-to-peer electronic cash system. Decentralized business review, (2008)"},{"key":"4688_CR17","doi-asserted-by":"crossref","unstructured":"Zyskind, Guy, Nathan, Oz, et\u00a0al.: Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE security and privacy workshops, pages 180\u2013184. IEEE, (2015)","DOI":"10.1109\/SPW.2015.27"},{"issue":"2","key":"4688_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1002\/jcaf.22421","volume":"31","author":"Marc Hamilton","year":"2020","unstructured":"Hamilton, Marc: Blockchain distributed ledger technology: an introduction and focus on smart contracts. J. Corp. Account. Financ. 31(2), 7\u201312 (2020)","journal-title":"J. Corp. Account. Financ."},{"issue":"6","key":"4688_CR19","doi-asserted-by":"publisher","first-page":"3680","DOI":"10.1109\/TII.2019.2903342","volume":"15","author":"Junqin Huang","year":"2019","unstructured":"Huang, Junqin, Kong, Linghe, Chen, Guihai, Min-You, Wu., Liu, Xue, Zeng, Peng: Towards secure industrial iot: blockchain system with credit-based consensus mechanism. IEEE Transact. Ind. Inf. 15(6), 3680\u20133689 (2019)","journal-title":"IEEE Transact. Ind. Inf."},{"key":"4688_CR20","doi-asserted-by":"crossref","unstructured":"Abidi, Abdessalem, Bouallegue, Belgacem, Kahri, Fatma: Implementation of elliptic curve digital signature algorithm (ecdsa). In 2014 Global Summit on Computer & Information Technology (GSCIT), pages 1\u20136. IEEE, (2014)","DOI":"10.1109\/GSCIT.2014.6970118"},{"issue":"6","key":"4688_CR21","doi-asserted-by":"publisher","first-page":"3661","DOI":"10.1109\/TII.2019.2897364","volume":"15","author":"Zhenni Li","year":"2019","unstructured":"Li, Zhenni, Yang, Zuyuan, Xie, Shengli: Computing resource trading for edge-cloud-assisted internet of things. IEEE Transact. Ind. Inf. 15(6), 3661\u20133669 (2019)","journal-title":"IEEE Transact. Ind. Inf."},{"issue":"2","key":"4688_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1365815.1365816","volume":"26","author":"Fay Chang","year":"2008","unstructured":"Chang, Fay, Dean, Jeffrey, Ghemawat, Sanjay, Hsieh, Wilson C., Wallach, Deborah A., Burrows, Mike, Chandra, Tushar, Fikes, Andrew, Gruber, Robert, E.: Bigtable,: A distributed storage system for structured data. ACM Transact. Comput. Syst. (TOCS) 26(2), 1\u201326 (2008)","journal-title":"ACM Transact. Comput. Syst. (TOCS)"},{"key":"4688_CR23","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"Konstantinos Christidis","year":"2016","unstructured":"Christidis, Konstantinos, Devetsikiotis, Michael: Blockchains and smart contracts for the internet of things. Ieee Access 4, 2292\u20132303 (2016)","journal-title":"Ieee Access"},{"key":"4688_CR24","doi-asserted-by":"crossref","unstructured":"Li, Cheng, Zhang, Liang-Jie: A blockchain based new secure multi-layer network model for internet of things. In 2017 IEEE international congress on internet of things (ICIOT), pages 33\u201341. IEEE, (2017)","DOI":"10.1109\/IEEE.ICIOT.2017.34"},{"key":"4688_CR25","doi-asserted-by":"crossref","unstructured":"Li, Chaoyang, Jiang, Bohao, Dong, Mianxiong, Chen, Yuling, Zhang, Zhifeng, Xin, Xiangjun, Ota, Kaoru: Efficient designated verifier signature for secure cross-chain health data sharing in biomt. IEEE Internet of Things Journal, (2024)","DOI":"10.1109\/JIOT.2024.3370708"},{"issue":"4","key":"4688_CR26","doi-asserted-by":"publisher","first-page":"5521","DOI":"10.1109\/JSYST.2022.3173538","volume":"16","author":"Chaoyang Li","year":"2022","unstructured":"Li, Chaoyang, Dong, Mianxiong, Li, Jian, Gang, Xu., Chen, Xiu-Bo., Liu, Wen, Ota, Kaoru: Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst. J. 16(4), 5521\u20135532 (2022)","journal-title":"IEEE Syst. J."},{"key":"4688_CR27","doi-asserted-by":"crossref","unstructured":"Huh, Seyoung, Cho, Sangrae, Kim, Soohyung: Managing iot devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT), pages 464\u2013467. IEEE, (2017)","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"4688_CR28","doi-asserted-by":"crossref","unstructured":"Shor, Peter\u00a0W.: Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science, pages 124\u2013134. Ieee, (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"4688_CR29","doi-asserted-by":"publisher","first-page":"109253","DOI":"10.1016\/j.compeleceng.2024.109253","volume":"117","author":"Sunil Prajapat","year":"2024","unstructured":"Prajapat, Sunil, Rana, Aryan, Kumar, Pankaj, Das, Ashok Kumar: Quantum safe lightweight encryption scheme for secure data sharing in internet of nano things. Comput. Electric. Eng. 117, 109253 (2024)","journal-title":"Comput. Electric. Eng."},{"key":"4688_CR30","doi-asserted-by":"crossref","unstructured":"Agrawal, Shweta, Boyen, Xavier, Vaikuntanathan, Vinod, Voulgaris, Panagiotis, Wee, Hoeteck: Functional encryption for threshold functions (or fuzzy ibe) from lattices. In Public Key Cryptography\u2013PKC 2012: 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 15, pages 280\u2013297. Springer, (2012)","DOI":"10.1007\/978-3-642-30057-8_17"},{"key":"4688_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, Jiang, Zhang, Zhenfeng, Ge, Aijun: Ciphertext policy attribute-based encryption from lattices. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pages 16\u201317, (2012)","DOI":"10.1145\/2414456.2414464"},{"key":"4688_CR32","doi-asserted-by":"crossref","unstructured":"Boyen, Xavier: Attribute-based functional encryption on lattices. in Theory of cryptography conference, pages 122\u2013142. Springer, (2013)","DOI":"10.1007\/978-3-642-36594-2_8"},{"key":"4688_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Guoyan, Qin, Jing, Qazi, Shams: Multi-authority attribute-based encryption scheme from lattices. (2015)","DOI":"10.1109\/ICCCN.2015.7288431"},{"key":"4688_CR34","doi-asserted-by":"publisher","first-page":"3665","DOI":"10.1109\/ACCESS.2018.2888850","volume":"7","author":"Yuan Liu","year":"2018","unstructured":"Liu, Yuan, Wang, Licheng, Li, Lixiang, Yan, Xixi: Secure and efficient multi-authority attribute-based encryption scheme from lattices. IEEE Access 7, 3665\u20133674 (2018)","journal-title":"IEEE Access"},{"key":"4688_CR35","doi-asserted-by":"crossref","unstructured":"Datta, Pratish, Komargodski, Ilan, Waters, Brent: Decentralized multi-authority abe for dnfs from lwe. In Annual International conference on the Theory and Applications of Cryptographic Techniques, pages 177\u2013209. Springer, (2021)","DOI":"10.1007\/978-3-030-77870-5_7"},{"key":"4688_CR36","unstructured":"Regev, Oded: Lattices in computer science. Lecture notes of a course given in Tel Aviv University, (2004)"},{"key":"4688_CR37","doi-asserted-by":"crossref","unstructured":"Ajtai, Mikl\u00f3s: Generating hard instances of the short basis problem. In Automata, Languages and Programming: 26th International Colloquium, ICALP\u201999 Prague, Czech Republic, July 11\u201315, 1999 Proceedings 26, pages 1\u20139. Springer, (1999)","DOI":"10.1007\/3-540-48523-6_1"},{"key":"4688_CR38","doi-asserted-by":"publisher","first-page":"9851","DOI":"10.1109\/ACCESS.2023.3240304","volume":"11","author":"Xufeng Tao","year":"2023","unstructured":"Tao, Xufeng, Qiang, Yan, Wang, Peng, Wang, Yingsen: Lmibe: lattice-based matchmaking identity-based encryption for internet of things. IEEE Access 11, 9851\u20139858 (2023)","journal-title":"IEEE Access"},{"key":"4688_CR39","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s00224-010-9278-3","volume":"48","author":"Jo\u00ebl Alwen","year":"2011","unstructured":"Alwen, Jo\u00ebl., Peikert, Chris: Generating shorter bases for hard random lattices. Theory Comput. Syst. 48, 535\u2013553 (2011)","journal-title":"Theory Comput. Syst."},{"issue":"2","key":"4688_CR40","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MCE.2021.3066793","volume":"11","author":"Hu Bowen","year":"2022","unstructured":"Bowen, Hu., Chen, Yingwen, Hujie, Yu., Meng, Linghang, Duan, Zhimin: Blockchain-enabled data-sharing scheme for consumer iot applications. IEEE Consum. Electronic. Mag. 11(2), 77\u201387 (2022)","journal-title":"IEEE Consum. Electronic. Mag."},{"key":"4688_CR41","doi-asserted-by":"publisher","first-page":"9851","DOI":"10.1109\/ACCESS.2023.3240304","volume":"11","author":"Xufeng Tao","year":"2023","unstructured":"Tao, Xufeng, Qiang, Yan, Wang, Peng, Wang, Yingsen: Lmibe: lattice-based matchmaking identity-based encryption for internet of things. IEEE Access 11, 9851\u20139858 (2023)","journal-title":"IEEE Access"},{"issue":"6","key":"4688_CR42","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1145\/1039488.1039490","volume":"51","author":"Oded Regev","year":"2004","unstructured":"Regev, Oded: New lattice-based cryptographic constructions. J. ACM (JACM) 51(6), 899\u2013942 (2004)","journal-title":"J. ACM (JACM)"},{"key":"4688_CR43","doi-asserted-by":"crossref","unstructured":"Meier, Simon, Schmidt, Benedikt, Cremers, Cas, Basin, David: The tamarin prover for the symbolic analysis of security protocols. In Computer Aided Verification: 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings 25, pages 696\u2013701. Springer, (2013)","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"4688_CR44","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.comcom.2023.09.020","volume":"211","author":"Garima Thakur","year":"2023","unstructured":"Thakur, Garima, Kumar, Pankaj, Chen, Chein-Ming., Vasilakos, Athanasios V., Prajapat, Sunil, et al.: A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment. Comput. Commun. 211, 271\u2013285 (2023)","journal-title":"Comput. Commun."},{"key":"4688_CR45","doi-asserted-by":"crossref","unstructured":"Blanchet, Bruno: Automatic verification of security protocols in the symbolic model: the verifier proverif. In International School on Foundations of Security Analysis and Design, pages 54\u201387. Springer, (2012)","DOI":"10.1007\/978-3-319-10082-1_3"},{"key":"4688_CR46","doi-asserted-by":"crossref","unstructured":"Blanchet, Bruno: Automatic verification of security protocols in the symbolic model: the verifier proverif. In International School on Foundations of Security Analysis and Design, pages 54\u201387. Springer, (2012)","DOI":"10.1007\/978-3-319-10082-1_3"},{"key":"4688_CR47","doi-asserted-by":"crossref","unstructured":"Prajapat, Sunil, Kumar, Pankaj, Kumar, Sandeep: A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks. Cluster Computing, pages 1\u201317, (2024)","DOI":"10.1007\/s10586-024-04449-9"},{"key":"4688_CR48","doi-asserted-by":"publisher","first-page":"58254","DOI":"10.1109\/ACCESS.2022.3179110","volume":"10","author":"Er-Shuo Zhuang","year":"2022","unstructured":"Zhuang, Er-Shuo., Fan, Chun-I., Kuo, I-Hua,: Multiauthority attribute-based encryption with dynamic membership from lattices. IEEE Access 10, 58254\u201358267 (2022)","journal-title":"IEEE Access"},{"key":"4688_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09381-4","volume":"34","author":"Giuseppe Ateniese","year":"2021","unstructured":"Ateniese, Giuseppe, Francati, Danilo, Nu\u00f1ez, David, Venturi, Daniele: Match me if you can: matchmaking encryption and its applications. J. Cryptol. 34, 1\u201350 (2021)","journal-title":"J. Cryptol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04688-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04688-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04688-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:06:50Z","timestamp":1736521610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04688-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,14]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4688"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04688-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2024,10,14]]},"assertion":[{"value":"2 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"5"}}