{"id":"https://openalex.org/W7126089696","doi":"https://doi.org/10.1109/bibm66473.2025.11356309","title":"Fast Authenticated and Interoperable Multimedia Healthcare Data Over Hybrid-Storage Blockchains","display_name":"Fast Authenticated and Interoperable Multimedia Healthcare Data Over Hybrid-Storage Blockchains","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7126089696","doi":"https://doi.org/10.1109/bibm66473.2025.11356309"},"language":null,"primary_location":{"id":"doi:10.1109/bibm66473.2025.11356309","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356309","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111215364","display_name":"Jucai Yang","orcid":"https://orcid.org/0009-0005-3602-6207"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jucai Yang","raw_affiliation_strings":["East China Normal University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai,China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116453067","display_name":"Liang Li","orcid":"https://orcid.org/0009-0005-2492-507X"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Li","raw_affiliation_strings":["East China Normal University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai,China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124289876","display_name":"Yiwei Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiwei Gu","raw_affiliation_strings":["East China Normal University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai,China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":null,"display_name":"Haiqin Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiqin Wu","raw_affiliation_strings":["East China Normal University,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai,China","institution_ids":["https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111215364"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84088178,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4319","last_page":"4322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.91839998960495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.91839998960495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.020600000396370888,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.009499999694526196,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6654000282287598},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5267000198364258},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4691999852657318},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.4569999873638153},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.45669999718666077},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.451200008392334},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.45019999146461487},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4433000087738037},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.43639999628067017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8192999958992004},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6654000282287598},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5557000041007996},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5267000198364258},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4691999852657318},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.4569999873638153},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.45669999718666077},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.451200008392334},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.45019999146461487},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4433000087738037},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.43639999628067017},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41449999809265137},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.4000000059604645},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3968999981880188},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3682999908924103},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3643999993801117},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.350600004196167},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3474000096321106},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.3452000021934509},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3206999897956848},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.32019999623298645},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.3107999861240387},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.29919999837875366},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.2770000100135803},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.272599995136261},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2565000057220459},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2547000050544739}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bibm66473.2025.11356309","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bibm66473.2025.11356309","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5141996592","display_name":null,"funder_award_id":"2022YFB2701400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8004461168","display_name":null,"funder_award_id":"62202167,62172162,62132005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2114428623","https://openalex.org/W2990094262","https://openalex.org/W3110891612","https://openalex.org/W4251491041","https://openalex.org/W4386094364","https://openalex.org/W4390992044","https://openalex.org/W4390992169","https://openalex.org/W4391097107","https://openalex.org/W4406238057","https://openalex.org/W4406259614","https://openalex.org/W4406771325","https://openalex.org/W4411240318"],"related_works":[],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,22,46,51,173,185],"blockchain":[3],"technology":[4],"into":[5],"healthcare":[6,31,88,195],"presents":[7],"a":[8,170,183,217],"paradigm":[9],"shift":[10],"for":[11,48,72,165,193,216],"secure":[12,84],"data":[13,85,92,177],"management,":[14],"enabling":[15],"decentralized":[16],"and":[17,20,75,94,136,160,179,187],"tamper-proof":[18],"storage":[19,93,108],"sharing":[21,86,95],"sensitive":[23],"Electronic":[24],"Health":[25],"Records":[26],"(EHRs).":[27],"However,":[28],"existing":[29],"blockchain-based":[30],"systems,":[32],"while":[33,118],"providing":[34],"robust":[35],"access":[36,129],"control,":[37],"commonly":[38],"overlook":[39],"the":[40,83,119,138,146,155],"high":[41],"latency":[42,201],"in":[43,59,144],"user-side":[44,101,199],"re-computation":[45],"hashes":[47],"integrity":[49],"verification":[50,200],"large":[52],"multimedia":[53],"data,":[54],"impairing":[55],"their":[56],"practicality,":[57],"especially":[58],"time-sensitive":[60],"clinical":[61],"scenarios.":[62],"In":[63],"this":[64],"paper,":[65],"we":[66,131],"propose":[67],"FAITH,":[68,186],"an":[69,106],"innovative":[70],"scheme":[71],"Fast":[73],"Authenticated":[74],"Interoperable<sup":[76],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[77,79],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup><sup":[78],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sup>We":[80],"focus":[81],"on":[82],"across":[87],"institutions.":[89],"mulTimedia":[90],"Healthcare":[91],"over":[96],"hybrid-storage":[97],"blockchains.":[98],"Rather":[99],"than":[100],"hash":[102],"re-computations,":[103],"FAITH":[104],"lets":[105],"off-chain":[107],"provider":[109,139],"generate":[110],"verifiable":[111],"proofs":[112,161],"using":[113],"recursive":[114],"Zero-Knowledge":[115],"Proofs":[116],"(ZKPs),":[117],"user":[120],"only":[121],"needs":[122],"to":[123,140,204,212],"perform":[124],"lightweight":[125],"verification.":[126,167],"For":[127],"flexible":[128],"authorization,":[130],"leverage":[132],"Proxy":[133],"Re-Encryption":[134],"(PRE)":[135],"enable":[137],"conduct":[141],"ciphertext":[142],"re-encryption,":[143],"which":[145],"re-encryption":[147],"correctness":[148],"can":[149],"be":[150],"verified":[151],"via":[152],"ZKPs":[153],"against":[154],"malicious":[156],"provider.":[157],"All":[158],"metadata":[159],"are":[162],"recorded":[163],"on-chain":[164],"public":[166],"We":[168,181],"provide":[169],"comprehensive":[171],"analysis":[172],"FAITH's":[174],"security":[175],"regarding":[176],"privacy":[178],"integrity.":[180],"implemented":[182],"prototype":[184],"extensive":[188],"experiments":[189],"demonstrated":[190],"its":[191],"practicality":[192],"time-critical":[194],"applications,":[196],"dramatically":[197],"reducing":[198],"by":[202],"up":[203],"98%,":[205],"bringing":[206],"it":[207],"from":[208],"4":[209],"s":[210],"down":[211],"around":[213],"70":[214],"ms":[215],"5":[218],"GB":[219],"encrypted":[220],"file.":[221]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-30T00:00:00"}
