Submitted:
03 February 2026
Posted:
05 February 2026
You are already at the latest version
Abstract
Keywords:
- ➢
- Blockchain: Distributed digital ledger that records transactions across multiple computers securely.
- ➢
- Transaction: Record of value transfer or state change on a blockchain network.
- ➢
- Blockchain Trilemma: The challenge of balancing security, scalability, and decentralization in blockchain systems.
- ➢
- Public Blockchain: A permissionless network where anyone can participate and validate transactions.
- ➢
- Smart Contract: Self-executing code that enforces agreement terms on a blockchain.
- ➢
- EVM (Ethereum Virtual Machine): Runtime environment for executing smart contracts on Ethereum and compatible networks.
- ➢
- Gas: Computational fee for executing operations on blockchain networks.
- ➢
- Latency: Time delay between initiating a blockchain transaction and its finality.
- ➢
- TPS (Transactions Per Second): A measure of blockchain processing capacity.
- ➢
- Avalanche: A blockchain platform for sub-second finality and high throughput.
- ➢
- Oracle: Service connecting smart contracts to external live data sources.
- ➢
- Threshold Cryptography: Technique requiring multiple parties to collaborate for cryptographic operations.
- ➢
- Distributed Threshold Cryptography: Distributed implementation of threshold cryptography without central authority.
- ➢
- SSS (Shamir’s Secret Sharing): Algorithm dividing secrets into parts requiring a threshold number to reconstruct.
- ➢
- ECDH (Elliptic Curve Diffie-Hellman): Cryptographic key exchange method using Elliptic Curve mathematics for secure communication.
- ➢
- ChaCha20-Poly1305: Symmetric encryption algorithm combining stream cipher with message authentication code.
- ➢
- Decentralized Storage: Data storage across multiple nodes without central control.
- ➢
- IPFS (InterPlanetary File System): Distributed P2P protocol creating content-addressable file system.
- ➢
- RBAC (Role-based access control): Access control method based on users’ organizational roles.
- ➢
- EHR (Electronic Health Record): Digital version of patient medical records containing health information.
- ➢
- On-chain / Off-chain: A state that is intended to be maintained within (or outside of) a blockchain network.
1. Introduction
1.1. Context and Motivation
1.2. Problem and Research Questions
- Research Question 1: “How does Nexa, through its selection of a public blockchain with specific characteristics, achieve an effective balance of the blockchain trilemma for secure and efficient EHR management?”
- Research Question 2: “How does Nexa’s distributed threshold cryptographic scheme, with its efficient algorithms and oracle design, better secure EHRs and manage access without excessive overhead?”
- Theoretical evaluation of different public blockchain and decentralized storage solutions to assess trade-offs based on the blockchain trilemma.
- Propose a distributed cryptographic mechanism for encrypting EHRs to maintain data security without compromising system scalability.
- Optimize both the data flow between system participants, as well as the smart contract logic, to minimize costs and computational overhead.
- Conduct benchmark testing using synthetic medical datasets that emulate real medical datasets to measure system performance (latency).
1.3. Scope and Limitations
2. Extended Background
2.1. Blockchain and the Blockchain Trilemma
Core Fundamentals
Blockchain Trilemma in Healthcare
2.2. Decentralized Storage for EHRs
3. Literature Review
3.1. Review Approach

3.2. Research Findings
Public Blockchain Proposals
- MedRec [13]: One of the earliest proposals. An Ethereum-based system utilizing smart contracts to enable patient-centric medical history access. Despite being pioneering, the system encountered significant challenges, particularly regarding Ethereum’s transaction throughput limitations.
- HealthRec-Chain [14]: Developed on an Ethereum fork and integrated with InterPlanetary File System (IPFS) [15], this proposal attempted to address blockchain scalability by storing large EHRs off-chain. However, the system faced challenges, with cost optimization being problematic due to the requirement of deploying a new smart contract for each patient-physician visit.
- EdgeHR [16]: A decentralized architecture proposing a novel approach of storing EHRs locally on user devices, with the Ethereum blockchain serving as a data indexing mechanism. The reliance on Ethereum and peer-to-peer LAN can limit scalability and increase vulnerability to network attacks like Man-in-the-middle (MITM) and eavesdropping.
Permissioned Blockchain Proposals
- MedChain [19]: A peer-to-peer network designed for secure, immutable healthcare data management. The system ensures data integrity through digest chains and enhances scalability with session-based access control; it enables efficient and secure sharing of EHRs and IoT data. A higher risk of centralization has been identified.
- Sec-Health [20]: A blockchain-based protocol ensuring secure health record management by addressing regulatory requirements (confidentiality, access control, integrity, revocation, anonymity). It combines CP-ABE encryption for data stored on IPFS with blockchain-stored metadata for tamper-proof verification. Emergency access uses threshold cryptography, while revocation deletes transaction data. The use of a permissioned blockchain and minimal reliance on threshold cryptography increases the risk of centralization.
Hybrid Blockchain Proposals
- SC2M-EHR-B [21]: A proposal combining blockchain technology’s security capabilities with the cloud’s scalable storage infrastructure, representing an approach to addressing system scalability limitations. Centralized storage can make the system vulnerable to Denial-of-Service (DoS) attacks targeting stored EHRs to cripple availability.
3.3. Key Challenges Identified
- Blockchain Trilemma: The fundamental challenge of simultaneously achieving scalability, security, and decentralization remains a critical constraint. Existing solutions often improve certain aspects at the expense of others, even if unintentionally.
- Data Storage: Efficiently managing large healthcare datasets in a decentralized manner without incurring excessive storage costs and latency continues to represent a significant technological hurdle.
- Key Management: Integrating strong, distributed key management schemes that prevent single points of failure while maintaining optimal accessibility and ease of use remains a critical research area.
3.4. Contribution of the Thesis
- Avalanche [22], a scalable public blockchain with 3,400+ TPS, 2-second finality, and subnet sharding, to overcome Ethereum’s throughput limitations while maintaining decentralization.
- IPFS for cost-efficient, tamper-proof EHR storage, coupled with on-chain content identifiers and integrity hashes.
- Distributed threshold cryptography (the use of secret keys to protect EHRs, these keys are then divided into shares using a threshold splitting scheme, with each share thereafter encrypted and distributed via asymmetric encryption), serving as a replacement for centralized key management. By distributing the key shares across patients, physicians, healthcare institutions, and oracles, the system ensures no single entity can decrypt records alone, which helps in preventing breaches even if a few of the shares get compromised.
4. Method
4.1. Research Strategy
4.2. Data Collection and Usage
- EHR records of varying sizes, ranging from approximately 600 KB to 80 MB, representing different types of text-based entries (e.g., clinical notes, diagnostic reports, imaging data). Each file represents a patient persona.
- Files in JSON format, compatible with the FHIR standard, which is commonly used in modern EHR systems.
- Public blockchain transaction latency when submitting EHR metadata.
- Storage and retrieval latency in decentralized storage systems.
- Cryptographic overhead when applying symmetric encryption to records.
4.3. Technology Selection Framework
Considered Variables for Blockchain Selection
- Transaction throughput (TPS): This refers to the number of transactions a blockchain can process concurrently per second. This metric primarily applies to write operations, as read operations are generally not classified as transactions and incur no cost on the chain; this is because they occur from a single node and do not require heavy computational power to execute. An EHR system must demonstrate reliability in managing high-volume data operations, as it is estimated that a single healthcare provider may store up to 80 MB per patient annually [24], which indicates a consistent pattern of frequent data writing and reading on the system.
- Finality time (transaction latency): This refers to the duration required for a blockchain to finalize a transaction, rendering it irreversible. This variable is critical, as certain blockchains, like Bitcoin [5], can take a considerable amount of time to finalize a transaction, depending on network congestion. A study analyzing nine years of Bitcoin transaction history, between the period from January 3rd, 2009, to April 30th, 2018, revealed that the majority of valid transactions were finalized within a timeframe ranging from 1 hour to 2 hours after receiving 6 confirmations [25]. For vital data, this duration can be extremely long. In the context of an EHR system, transactions must be finalized within seconds or in near-real-time to enable healthcare providers to verify data entry during patient visits. The primary reason for minimizing finality time is to quickly determine whether a transaction has been confirmed or remains unprocessed. If a transaction containing valuable references to medical data remains unconfirmed for too long, there is a risk that it may be dropped, delaying data availability. Therefore, minimizing finality time enables medical staff to receive success/failure responses from the system almost instantly, allowing them to resend the transaction if needed.
- Fee structures: This refers to the calculation of gas fees, which are required for executing transactions on the blockchain, typically involving write operations. This variable is crucial as it directly impacts the scalability potential of the EHR system. For instance, the Ethereum blockchain experienced steep gas fee levels, with a single simple transaction averaging $11.36 from April 14, 2020, to April 14, 2023 [26] (the period spans both before and after The Merge, meaning the pre-Merge average could have been higher). This surge was mostly driven by high demand and Ethereum’s auction-based fee model, where users paid higher fees to prioritize their transactions. When selecting a blockchain for an EHR system, it is essential to consider fee structures and potential scenarios that could influence these fees.
- Sharding Capabilities: This refers to the ability of a certain blockchain to divide the network into smaller, parallel subchains (called “shards”), each responsible for processing a subset of transactions. This reduces the computational load on any single chain, helping to mitigate network congestion, which occurs when the blockchain is overwhelmed by a high volume of transactions [27]. For the EHR system, building it on a blockchain that has sharding capabilities or planning to implement them could significantly improve its potential to scale. This would enable the EHR system to remain optimized and efficiently manage transaction throughput, even during periods of blockchain congestion.
- Block Time: This refers to the average time interval between sequential blocks being added to the blockchain, which impacts transaction throughput and confirmation latency. Higher block time intervals may result in reduced decentralization because they typically correspond to larger blocks that demand more storage space and require more advanced hardware. These increased requirements can limit the ability of entities to host nodes, negatively impacting the network’s topology and increasing the risk of centralization [28].
- Consensus mechanisms: This refers to the methods that blockchain networks use to validate transactions; this has a direct impact on how many transactions can be processed (TPS) and also on finality time (transaction latency). For example, Bitcoin uses Proof-of-Work (PoW), which ensures strong decentralization and security through open participation and mining. However, it struggles with scalability and sustainability because it requires a lot of computing power, which results in substantially slower transaction processing speeds and considerable energy consumption [29]. Other consensus models aim to address these issues, and the most time-tested ones are:
- Proof-of-Stake (PoS): Validators are chosen based on how much funds they have staked (locked up) in the network. Higher stake quantities correlate with increased validator selection likelihood. PoS offers similar decentralization and security as PoW but is considerably more energy-efficient and scalable.
- Delegated Proof-of-Stake (DPoS) [30]: Token holders vote for a smaller group of delegates to validate transactions. This improves scalability and maintains decentralization and security, though it comes with some risks of centralization since fewer validators are typically involved.
- Proof-of-Authority (PoA) [31]: Transactions are validated by trusted pre-chosen entities with a good reputation. This mechanism adopts a centralized structure, prioritizing rapid transaction finality and operational efficiency at the expense of permissionless participation.
- Smart Contract Access and Visibility Modifiers: This refers to the ability of a blockchain to hold immutable smart contracts that enforce access control through explicitly defined roles. This functionality includes:
- Access modifiers, which manage permissions and determine who can execute specific functions or logic within the smart contract.
- Visibility modifiers, which help restrict external access to internal data by leveraging native privacy features. For example, using the private visibility modifier in Solidity [32] to prevent external retrieval of metadata (though it does not provide true confidentiality, only obfuscation through added complexity).
Considered Variables for Decentralized Storage Selection
- Expandability: The ability to handle increasing volumes of data and concurrent access over time. This includes factors such as the number of active storage nodes, the expandability of the available storage pool, and the protocol’s ability to maintain performance under increasing load.
- Storage Cost: Estimated monthly cost per terabyte, including any token requirements or collateral models.
- Data Immutability: The ability for data to remain permanently accessible poses a potential security risk, particularly as cryptographic algorithms evolve. For instance, the advent of quantum computing could render current cryptographic techniques obsolete, which compromises the integrity of immutable data.
- Degree of Decentralization: Architectural characteristics reflecting control distribution, including reliance on federated or centralized nodes.
- Integration Feasibility: The presence of extensive SDKs, detailed API documentation, efficient mechanisms for real-time read/write operations.
4.4. Reliability and Validity
4.5. Ethical Aspects
5. Architectural Design and Implementation
5.1. Comparative Analysis
Decentralized Storage
Public Blockchain
Comparison of Public Blockchain Networks


Distributed Threshold Cryptography

5.2. Prototype Implementation
Machine Specifications and Development Tools
Hardware
- CPU: 13th Gen Intel i5-13500 (20 threads) at 4.800GHz
- Memory: 31852.29 MiB (32 GB RAM)
- Operating System: openSUSE Tumbleweed, 64-bit
Development Tools
- Languages: TypeScript [42], Solidity
- TypeScript will be used for frontend development and smart contract integration, while Solidity will be used for developing the smart contracts.
- Smart Contract Development: Hardhat [43]
- Hardhat is utilized to develop, test, and deploy smart contracts on EVM-compatible blockchains.
- Blockchain Integration: Ethers.js, Viem
- Storage: IPFS (through Filebase as gateway). Provides decentralized storage solutions for encrypted EHRs.
- Frontend Framework: React (with Vite as build tool)
- Cryptography: npm packages include @noble/curves, @noble/ciphers, and shamir-secret-sharing. Specifically, @noble/curves handles ECDH key pair operations. @noble/ciphers creates the ChaCha20-Poly1305 cipher and verifies the integrity of the EHR data. shamir-secret-sharing is used to split the ChaCha20-Poly1305 key into multiple shares.
System Architecture and Interaction Design

- Participants Layer: A React frontend interface that houses all system participants: Hospital administrators who deploy and initialize the system, Patients who can access and retrieve their own EHRs, Physicians who can store, access, and manage patient EHR data.
- Blockchain Layer: This layer implements a smart contract that manages permissions for each participant using RBACs. It also facilitates a key exchange process that connects to off-chain oracle services. Acting as secure, neutral intermediaries, these oracles assist authorized requestors in reconstructing a ChaCha20-Poly1305 key, which was originally used to encrypt a specific EHR. The key itself is split using Shamir’s Secret Sharing, ensuring the EHR remains protected even if a participant’s private key is compromised.
- Storage Layer: Consists of decentralized storage where the actual encrypted EHRs are stored off-chain, separate from the blockchain itself.

6. Results
6.1. Theoretical Comparative Analysis
Selected Blockchain and Limitations
- Data Integrity: Avalanche offers superior data protection with both access and visibility modifiers in its Solidity-based smart contracts; this enables granular access control critical for sensitive EHRs.
- Finality Time: With 2-second finality, Avalanche provides almost instant transaction confirmation essential for physicians during patient visits.
- TPS: At 3,400+ TPS, Avalanche delivers powerful throughput easily capable of handling EHR system demands.
- Sharding Capabilities: Avalanche’s subnet architecture provides native sharding functionality; this guarantees long-term scalability for growing EHR systems as subnets increase in number.
Limitations of Alternative Blockchains
- NEAR [46]: Despite its excellent TPS (12,000+) and low fees, NEAR has a smaller ecosystem and fewer validators compared to Avalanche. EVM compatibility also provides better bridge functionality to other EVM chains, making Avalanche more practical for interoperability. NEAR remains a strong candidate worth investigating for future EHR systems.
- Solana [47]: While also offering high TPS (7,200+) and low fees, Solana has experienced multiple network outages https://status.solana.com/incidents/m6qzbgc7np9b, https://status.solana.com/incidents/ymr0gyj9xqy, https://status.solana.com/incidents/n5kcgs8dl9pj, posing substantial risks for critical EHR systems that require consistent availability. Additionally, the absence of visibility modifiers on Solana may impose further limitations on implementing extra privacy controls within smart contracts.
- BNB Chain [50] & TRON [51]: Both offer low fees and fast transactions but lack sharding capabilities; this limits their long-term scalability for extensive healthcare data operations. BNB Chain utilizes Proof of Authority (PoA) as its consensus protocol, which raises concerns about decentralization, making it even less suitable for adoption in the proposed architecture.
- Ethereum and Layer 2 Solutions: These networks offer a mature ecosystem, but Ethereum suffers from higher fees and scalability issues. Layer 2 solutions like Arbitrum [52] and Optimism [53] have a delayed practical finality of ~10-15 minutes after a transaction is submitted and they could be deemed intolerable for time-sensitive EHR systems.
Limitations of Avalanche
- Transaction Costs: Avalanche’s fees are higher than those of alternatives like NEAR or Solana but remain orders of magnitude lower than Ethereum’s, which makes Avalanche reasonable enough to support adoption in an EHR system architecture when it comes to cost-efficiency.
- Transaction Throughput: Considering a transaction throughput of over 3,400 TPS, Avalanche could provide sufficient performance for current healthcare needs but as the comparison demonstrated, it falls below the capacities of NEAR (12,000+ TPS) and Solana (7,200+ TPS). However, it is important to note that Avalanche’s subnet architecture and sharding capabilities can help mitigate this limitation as the network scales, making it a temporary constraint rather than a long-term barrier.
Selected Decentralized Storage and Limitations
- Sia: Demonstrated compelling theoretical advantages, particularly in terms of cost-efficiency and native security. With built-in redundancy and decentralized peer-to-peer contracts, it maintains a highly competitive storage cost of approximately $1–$2/TB/month. However, its practical integration capabilities remain limited. At the time of evaluation, Sia lacked stable, well-maintained SDKs, provided minimal API documentation, and offered sparse integration support. These constraints greatly hindered its viability for automated deployments and prototyping, leading to its exclusion from the benchmarking phase despite its strong technical foundation.
- Filecoin: Built on top of the InterPlanetary File System (IPFS), introduced a robust framework for verifiable decentralized storage. It features cryptographic consensus mechanisms, Proof-of-Replication (PoRep) and Proof-of-Spacetime (PoSt), to ensure that storage providers reliably commit and retain data. While Filecoin benefits from a maturing ecosystem and ongoing adoption in archival and scientific contexts, its reliance on an auction-based storage market introduces variable upload latency and non-deterministic availability. Data uploads must pass through a bidding process before being committed to the network, complicating real-time interactions. Although well-suited for long-term archival use, this asynchronous mechanism made Filecoin less practical for the more interactive demands of EHR systems within the scope of this thesis.
- Arweave: Offers a unique value proposition in the form of permanent, one-time-payment storage. This immutability ensures that uploaded data is persistently accessible and tamper-proof. However, the inability to alter or delete content also introduces a vital long-term risk, especially in the context of sensitive health records. If current encryption algorithms become obsolete by future advances such as quantum computing, immutable datasets may become vulnerable, with no way to retract or sanitize previously uploaded content. For this reason, Arweave was deemed unsuitable for handling sensitive healthcare data where regulatory flexibility and the potential for future cryptographic upgrades must be considered.
- Filebase: Utilizes the IPFS protocol as its underlying storage mechanism, offering a familiar interface, well-documented SDKs, and up to 5 GiB of free storage for testing purposes. These features provided a strong foundation for research-stage integration. However, Filebase operates as a centralized gateway to the IPFS network, meaning that the party operating the gateway (the healthcare provider) maintains control over data retention, including the ability to delete records. Even though it is acceptable for prototyping and evaluation, this centralization introduces a potential single point of failure and must be addressed in any production-grade deployment. To mitigate this limitation in real-world scenarios, alternative solutions leveraging IPFS in a more decentralized way (without a centralized layer of control) are recommended.
6.2. Benchmark Performance Analysis


Smart Contract Operations
RBACs and EHR Metadata Management
Oracle-Assisted Operations
Decentralized Storage Operations
Cryptographic Operations
Comparison with other solutions

7. Discussion
7.1. Analysis of Results and Research Contributions
7.2. Future Work
- Trusted Execution Environments (TEEs) [55]: Exploring the integration of TEEs (e.g., Intel SGX, AMD SEV) for isolating the generation and handling of cryptographic keys and shares (both ephemeral ECDH keys and ChaCha20-Poly1305 key shares). This could further enhance security by protecting sensitive operations even if the host system is compromised.
- Compromise-Triggered Key Rotation: Developing a mechanism for rotating the ChaCha20-Poly1305 symmetric key for specific EHRs if a participating actor (e.g., a physician or oracle) is known to be compromised.
- NEAR as an Alternative Platform: Conducting a practical implementation and benchmarking study using the NEAR protocol. Given its high TPS and low fees identified in the comparative analysis, a direct comparison could reveal specific performance trade-offs and potentially offer an even more scalable or cost-effective alternative for certain deployment scenarios.
- Post-Quantum Cryptography Integration [56]: Investigating the integration of post-quantum cryptographic algorithms to ensure long-term security of the Nexa architecture against quantum computer threats, which represents an urgent priority for system sustainability.
- Real-World Pilot Study: Deploying Nexa in a controlled pilot program within a healthcare setting to evaluate its performance, usability, and integration capabilities under real-world conditions and gather feedback from clinicians and patients.
- Interoperability with Legacy Systems: Designing and evaluating standardized APIs and adapters (e.g., FHIR-based interfaces) to enable seamless integration of Nexa with existing hospital information systems and other healthcare IT infrastructure.
8. Conclusion
Appendix A — Nexa’s Threshold Encryption Algorithm and Flow

Appendix B — Nexa’s Threshold Decryption Algorithm and Flow

References
- D. Portela, D. Nogueira-Leite, R. Almeida, and R. Cruz-Correia, “Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study,” JMIR Formative Research, vol. 7, p. e41738, Jun. 2023. [CrossRef]
- T. Chen, X. Li, X. Luo, and X. Zhang, “Under-optimized smart contracts devour your money,” 2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER), Feb. 2017. [CrossRef]
- O.Konashevych, “Why ‘Permissioned’ and ‘Private’ are not Blockchains,” SSRN Electronic Journal, 2019,. [CrossRef]
- J. Walonoski et al., “Synthea: An approach, method, and software mechanism for generating synthetic patients and the synthetic electronic health care record,” Journal of the American Medical Informatics Association, vol. 25, no. 3, pp. 230–238, Aug. 2017. no. 3). [CrossRef]
- S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System.” 2008. Accessed: May 11, 2025. [Online]. Available: https://bitcoin.org/bitcoin.pdf.
- F. Saleh, “Blockchain without Waste: Proof-of-Stake,” The Review of Financial Studies, vol. 34, no. 3, pp. 1156–1190, Jul. 2020. [CrossRef]
- S. H. Ammous, “Blockchain Technology: What is it Good for?,” SSRN Electronic Journal, 2016. [CrossRef]
- Y. Han, Y. Zhang, and S. H. Vermund, “Blockchain Technology for Electronic Health Records,” International Journal of Environmental Research and Public Health, vol. 19, no. 23, p. 15577, Nov. 2022. [CrossRef]
- S. Mssassi and A. Abou El Kalam, “The Blockchain Trilemma: A Formal Proof of the Inherent Trade-Offs Among Decentralization, Security, and Scalability,” Applied Sciences, vol. 15, no. 1, p. 19, Dec. 2024,. [CrossRef]
- M. Baboi, “Security of Consensus Mechanisms in Blockchain,” Romanian Cyber Security Journal, vol. 5, no. 2, pp. 45–53, Nov. 2023. [CrossRef]
- V. Buterin, “Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform,” ethereum.org. Accessed: May 11, 2025. [Online]. Available: https://ethereum.org/en/whitepaper/.
- M. Legault, “A Practitioner’s View on Distributed Storage Systems: Overview, Challenges and Potential Solutions,” Technology Innovation Management Review, pp. 32–41, Jul. 2021. [CrossRef]
- A.Azaria, A. Ekblaw, T. Vieira, and A. Lippman, “MedRec: Using Blockchain for Medical Data Access and Permission Management,” 2016 2nd International Conference on Open and Big Data (OBD), Aug. 2016. [CrossRef]
- D. Kumari, A. S. Parmar, H. S. Goyal, K. Mishra, and S. Panda, “HealthRec-Chain: Patient-centric blockchain enabled IPFS for privacy preserving scalable health data,” Computer Networks, vol. 241, p. 110223, Mar. 2024. [CrossRef]
- J. Benet, “IPFS - Content Addressed, Versioned, P2P File System,” arXiv.org. [Online]. Available: https://arxiv.org/abs/1407.3561.
- V. Mandarino, G. Pappalardo, and E. Tramontana, “A Blockchain-Based Electronic Health Record (EHR) System for Edge Computing Enhancing Security and Cost Efficiency,” Computers, vol. 13, no. 6, p. 132, May 2024. [CrossRef]
- A.Dubovitskaya et al., “ACTION-EHR: Patient-Centric Blockchain-Based Electronic Health Record Data Management for Cancer Care,” Journal of Medical Internet Research, vol. 22, no. 8, p. e13598, Aug. 2020. [CrossRef]
- E. Androulaki et al., “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” arXiv.org. [Online]. Available: https://arxiv.org/abs/1801.10228.
- B. Shen, J. Guo, and Y. Yang, “MedChain: Efficient Healthcare Data Sharing via Blockchain,” Applied Sciences, vol. 9, no. 6, p. 1207, Mar. 2019,. [CrossRef]
- L. D. Costa, B. Pinheiro, W. Cordeiro, R. Araújo, and A. Abelém, “Sec-Health: A Blockchain-Based Protocol for Securing Health Records,” IEEE Access, vol. 11, pp. 16605–16620, 2023. [CrossRef]
- E. A. Abdullah, “A Hybrid Algorithm for Encrypting Electronic Health Record Using Blockchain in a Cloud Computing Environment,” International Journal of Intelligent Systems and Applications in Engineering, no. 22s. pp. 903–912, Jul. 09, 2024. Accessed: May 11, 2025. [Online]. Available: https://ijisae.org/index.php/IJISAE/article/view/6573.
- K. Sekniqi, D. Laine, Stephen Buttolph, and E. G. Sirer, “Avalanche Platform.” AvaLabs, Jun. 30, 2020. Accessed: May 11, 2025. [Online]. Available: https://www.avalabs.org/whitepapers.
- A.Abbasi, “Synthetic EHRs for Benchmarking System Performance,” Kaggle. Accessed: May 11, 2025. [Online]. Available: https://www.kaggle.com/dsv/11614066.
- C.Suter-Crazzolara, “Better Patient Outcomes Through Mining of Biomedical Big Data,” Frontiers in ICT, vol. 5, Dec. 2018. [CrossRef]
- .Hou and F. Chen, “A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users,” 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1031–1043, Nov. 2020. [CrossRef]
- A.Jain, C. Jain, and K. Krystyniak, “Blockchain transaction fee and Ethereum Merge,” Finance Research Letters, vol. 58, p. 104507, Dec. 2023. [CrossRef]
- B.L. Y. Quan et al., “Recent Advances in Sharding Techniques for Scalable Blockchain Networks: A Review,” IEEE Access, vol. 13, pp. 21335–21366, 2025. [CrossRef]
- K. Croman et al., “On Scaling Decentralized Blockchains,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 106–125. [Online]. Available: https://doi.org/10.1007/978-3-662-53357-4_8.
- G. Kaur and C. Gandhi, “Scalability in Blockchain: Challenges and Solutions,” in Handbook of Research on Blockchain Technology, Elsevier, 2020, pp. 373–406. [Online]. Available: https://doi.org/10.1016/b978-0-12-819816-2.00015-0.
- J. Liu, W. Zheng, D. Lu, J. Wu, and Z. Zheng, “Understanding the Decentralization of DPoS: Perspectives From Data-Driven Analysis on EOSIO,” arXiv.org. [Online]. Available: https://arxiv.org/abs/2201.06187.
- S. Joshi, “Feasibility of Proof of Authority as a Consensus Protocol Model,” arXiv.org. [Online]. Available: https://arxiv.org/abs/2109.02480.
- “Solidity 0.8.30 documentation,” Solidity. Accessed: May 11, 2025. [Online]. Available: https://docs.soliditylang.org/en/stable/.
- “Filebase Documentation,” Filebase. Accessed: May 11, 2025. [Online]. Available: http://docs.filebase.com/.
- D.Vorick and L. Champine, “Sia: Simple Decentralized Storage.” Nebulous Inc., Nov. 29, 2014. Accessed: May 11, 2025. [Online]. Available: https://sia.tech/sia.pdf.
- “Filecoin: A Decentralized Storage Network.” Protocol Labs, Jul. 19, 2017. Accessed: May 11, 2025. [Online]. Available: https://filecoin.io/filecoin.pdf.
- S. Williams, A. Kedia, L. Berman, and S. Campos-Groth, “Arweave: The Permanent Information Storage Protocol.” Arweave, Dec. 26, 2023. Accessed: May 11, 2025. [Online]. Available: https://www.arweave.org/files/arweave-lightpaper.pdf.
- A.Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979. [CrossRef]
- Y. Nir and A. Langley, “ChaCha20 and Poly1305 for IETF Protocols,” RFC Editor, Jun. 2018. Accessed: May 11, 2025. [Online]. Available: https://doi.org/10.17487/rfc8439.
- R. K. Muhammed et al., “Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption,” Kurdistan Journal of Applied Research, vol. 9, no. 1, pp. 52–65, May 2024,. [CrossRef]
- D.J. Bernstein, “Curve25519: New Diffie-Hellman Speed Records,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 207–228. [Online]. Available: https://doi.org/10.1007/11745853_14.
- F.Mallouli, A. Hellal, N. Sharief Saeed, and F. Abdulraheem Alzahrani, “A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms,” 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 173–176, Jun. 2019. [CrossRef]
- “TypeScript Documentation,” TypeScript. Accessed: May 11, 2025. [Online]. Available: https://www.typescriptlang.org/docs/.
- Hardhat Documentation,” Hardhat, Nomic Foundation. Accessed: May 11, 2025. [Online]. Available: https://hardhat.org/docs.
- A.Abbasi and M. N. Humeidi, “NexaEHR Prototype,” GitHub. Accessed: May 11, 2025. [Online]. Available: https://github.com/alcompilor/nexa.
- “MetaMask Developer Documentation,” MetaMask. Accessed: May 11, 2025. [Online]. Available: https://docs.metamask.io/.
- “The NEAR White Paper.” Accessed: May 11, 2025. [Online]. Available: https://pages.near.org/papers/the-official-near-white-paper.
- A.Yakovenko, “Solana: A new architecture for a high performance blockchain v0.8.13.” Accessed: May 11, 2025. [Online]. Available: https://solana.com/solana-whitepaper.pdf.
- G.Wood, “Polkadot: Vision for a Heterogeneous Multi-chain Framework.” Accessed: May 11, 2025. [Online]. Available: https://polkadot.com/papers/Polkadot-whitepaper.pdf.
- “Cardano Docs,” Cardano. Accessed: May 11, 2025. [Online]. Available: https://docs.cardano.org/.
- BNB Smart Chain Whitepaper,” GitHub. Accessed: May 11, 2025. [Online]. Available: https://github.com/bnb-chain/whitepaper/blob/master/WHITEPAPER.md.
- TRON DAO, “Tron: Advanced Decentralized Blockchain Platform,” no. 2.0. Dec. 10, 2018. Accessed: May 11, 2025. [Online]. Available: https://tron.network/static/doc/white_paper_v_2_0.pdf.
- H.Kalodner, S. Goldfeder, X. Chen, S. M. Weinberg, and E. W. Felten, “Arbitrum: Scalable, private smart contracts.” 27th USENIX Security Symposium, Aug. 2018. Accessed: May 11, 2025. [Online]. Available: https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-kalodner.pdf.
- “Optimism Docs,” Optimism. Accessed: May 11, 2025. [Online]. Available: https://docs.optimism.io/.
- A.Abbasi, “NexaEHR Benchmarks,” Kaggle. Accessed: May 15, 2025. [Online]. Available: https://www.kaggle.com/dsv/11826992.
- X. Li, B. Zhao, G. Yang, T. Xiang, J. Weng, and R. H. Deng, “A Survey of Secure Computation Using Trusted Execution Environments,” arXiv.org. [Online]. Available: https://arxiv.org/abs/2302.12150.
- D. J. Bernstein, “Introduction to post-quantum cryptography,” in Post-Quantum Cryptography, D. J. Bernstein, J. Buchmann, and E. D. Goodman, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 1–14. Accessed: May 11, 2025. [Online]. Available: https://doi.org/10.1007/978-3-540-88702-7_1.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
