Copyright: © 2025 by the authors. Licensee: Pirogov University.
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (CC BY).

OPINION

Security of electronic health records: federated blockchain and post-quantum cryptography

About authors

Yaroslavl State Medical University, Yaroslavl, Russia

Correspondence should be addressed: Sergey A. Kostrov
Revolutsionnaya St., 5, Yaroslavl, 150000, Russia; ur.umsy@aesok

About paper

Author contribution: Potapov MP — research planning, analysis, editing; Kostrov SA — data collection, analysis and interpretation, preparing a draft manuscript.

Received: 2025-08-13 Accepted: 2025-10-18 Published online: 2025-11-03
|
  1. Meeting Abstracts from the 5th National Big Data Health Science Conference. BMC Proceedings. 2024; 18(9). DOI: 10.1186/s12919-024-00292-3.
  2. Broklyn, Peter and Shad, Ralph and Egon, Axel, The Evolving Thread Landscape Pf Ai-Powered Cyberattacks: A Multi-Faceted Approach to Defense and Mitigate. July 18, 2024. DOI: 10.2139/ssrn.4904878.
  3. Dirksen S and Korah J. “GUARD: Graph-based Unknown Attack Recognition and Detection,”2024 IEEE International Workshop on Information Forensics and Security (WIFS), Rome, Italy, 2024; 1–6. DOI: 10.1109/WIFS61860.2024.10810721.
  4. Porsdam Mann S, Savulescu J, Ravaud P, & Benchoufi M. Blockchain, consent and prosent for medical research. Journal of medical ethics, 2020; 47(4): 244–250. Advance online publication. DOI: 10.1136/medethics-2019-105963
  5. Litvin AA, Korenev SV, Knyazeva EG, Litvin V. The Possibilities of Blockchain Technology in Medicine (Review). Modern Technologies in Medicine. 2019; 11(4): 191–199. DOI: 10.17691/stm2019.11.4.21. — EDN FKRPUE.
  6. Esmaeilzadeh P. Benefits and concerns associated with blockchain-based health information exchange (HIE): a qualitative study from physicians’ perspectives. BMC medical informatics and decision making, 2022; 22(1): 80. DOI: 10.1186/s12911-022-01815-8.
  7. Hasnain M, et al. The Hyperledger fabric as a Blockchain framework preserves the security of electronic health records. Frontiers in Public Health. 2023; 11. DOI: 10.3389/fpubh.2023.1272787.
  8. Andrianova NG. Osnovnyye napravleniya ispol’zovaniya tekhnologiy v finansovoy sfere. Agrarnoye i zemel’noye pravo. 2024; 4 (232): 109– 111. DOI: 10.47643/1815-1329_2024_4_109109-111. Russian.
  9. Liu C, Xiang F, Sun Z. Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain. Security and Communication Networks. 2022; 1. DOI: 10.1155/2022/8497628.
  10. Huang Y, et al. Choosing Coordinate Forms for Solving ECDLP Using Shor’s Algorithm. arXiv preprint arXiv:2502.12441. 2025.
  11. Dam D -T, Nguyen T -H, Tran T -H, Le D -H, Hoang T -T and Pham C -K. “High-Efficiency Multi-Standard Polynomial Multiplication Accelerator on RISC-V SoC for Post-Quantum Cryptography”, in IEEE Access. 2024; 12: 195015–195031. DOI: 10.1109/ACCESS.2024.3520592.
  12. Li’ A, Li Z, Tang J and Lu Y. “KDA: Kyber and Dilithium Accelerator for CRYSTALS Suite of Post-Quantum Cryptography in Hybrid Multipath Delay Commutator Pipelined Architecture”. 2024 IEEE Asian Solid-State Circuits Conference (A-SSCC). Hiroshima. Japan. 2024; 1–3. DOI: 10.1109/A-SSCC60305.2024.10848993.
  13. Castryck W, Decru T. (2023). An Efficient Key Recovery Attack on SIDH. In: Hazay C, Stam M. (eds) Advances in Cryptology — EUROCRYPT 2023. EUROCRYPT 2023. Lecture Notes in Computer Science. 2023; 14008. Springer, Cham. DOI: 10.1007/978-3-031-30589-4_15.
  14. Komarova A, Korobeynikov A. Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: Kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj. Podpisi. Proceedings of the 12th International Conference on Security of Information and Networks. 2019; 1–8.
  15. Nazarenko AP, Dmitriyev Ye V. Sovremennoye sostoyaniye postkvantovoy kriptografii v Rossii i za rubezhom. Sistemy sinkhronizatsii, formirovaniya i obrabotki signalov. 2021; 12(6): 77–83. EDN FNKIVP. Russian.
  16. Urban NA, Mel’nikova Ye A. Primeneniye algoritmov na reshotkakh v postkvantovoy kriptografii. Sovremennyye informatsionnyye tekhnologii i IT-obrazovaniye. 2024; 20(1): 27–33. DOI: 10.25559/SITITO.020.202401.27-33. EDN BNHDRO. Russian.
  17. Kiktenko EO, et al. SPHINCS + digital signature scheme with GOST hash functions. arXiv. 2019. DOI: 10.1063/5.0011441.
  18. Guo H, et al. Access control for electronic health records with hybrid blockchain-edge architecture. 2019 IEEE international conference on blockchain (Blockchain). IEEE. 2019; 44–51. DOI: 10.48550/arXiv.1906.01188.
  19. Rajasekharan A and Koshy R. “EMRChain: Electronic Medical Records Management System using Blockchain”. 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) Pune. India. 2024; 1–6. DOI: 10.1109/ICBDS61829.2024.10837244.