Pub Date : 2026-02-01Epub Date: 2025-06-18DOI: 10.1016/j.bcra.2025.100317
Pujie Jing , Xia Feng , Liangmin Wang , Xiangmei Song
Data marketing serves as a centralized third party, aggregating data owners and trading their data with buyers to promote data circulation. However, the security and privacy of marketing rely on a trusted central authority, single points of failure and rights abuse can easily cause untrusted marketing and data leakage. In this paper, we propose a federated authority management for an attribute-based encryption (ABE) scheme in blockchain-assisted data marketing. First, we design an authority blockchain with a threshold issuance protocol to replace the trusted authority in ABE, which achieves trusted authorization for marketing and eliminates the single points of failure. Second, we design an on/off-chain phased right revocation method, which efficiently revokes a buyer's access rights by invoking smart contracts to update the on-chain rights status, and without requiring off-chain re-authorization. Thus, this method prevents insecure marketing due to the abuse of rights. Theoretical analysis shows that our scheme could protect marketing security and data privacy. Experimental results confirm that it reduces the access and revocation cost to a constant level and decreases the storage overhead of marketing by n times compared to existing schemes.
{"title":"FAME: Federated authority management for attribute-based encryption scheme in blockchain-assisted data marketing","authors":"Pujie Jing , Xia Feng , Liangmin Wang , Xiangmei Song","doi":"10.1016/j.bcra.2025.100317","DOIUrl":"10.1016/j.bcra.2025.100317","url":null,"abstract":"<div><div>Data marketing serves as a centralized third party, aggregating data owners and trading their data with buyers to promote data circulation. However, the security and privacy of marketing rely on a trusted central authority, single points of failure and rights abuse can easily cause untrusted marketing and data leakage. In this paper, we propose a federated authority management for an attribute-based encryption (ABE) scheme in blockchain-assisted data marketing. First, we design an authority blockchain with a threshold issuance protocol to replace the trusted authority in ABE, which achieves trusted authorization for marketing and eliminates the single points of failure. Second, we design an on/off-chain phased right revocation method, which efficiently revokes a buyer's access rights by invoking smart contracts to update the on-chain rights status, and without requiring off-chain re-authorization. Thus, this method prevents insecure marketing due to the abuse of rights. Theoretical analysis shows that our scheme could protect marketing security and data privacy. Experimental results confirm that it reduces the access and revocation cost to a constant level and decreases the storage overhead of marketing by <em>n</em> times compared to existing schemes.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100317"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146174012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2026-03-14DOI: 10.1016/j.vrih.2026.01.001
Zhiqi HUANG , Deqiang XIAO , Hongxun LIU , Long SHAO , Danni AI , Jingfan FAN , Tianyu FU , Yucong LIN , Hong SONG , Jian YANG
Background
Computed tomography (CT) and cone-beam computed tomography (CBCT) image registration play pivotal roles in computer-assisted navigation for orthopedic surgery. Traditional methods often apply uniform deformation models, neglecting the biomechanical differences between rigid structures and soft tissues, which compromises registration accuracy, especially during significant bone displacements.
Method
To address this issue, we introduce RE-Reg, a rigid-elastic CT-CBCT image registration framework that jointly learns rigid bone motion and soft tissue deformation. RE-Reg incorporates a rigid alignment (RA) module to estimate global bone motion and an elastic deformation (ED) module to model soft tissue deformation, preserving bony structures through bone shape preservation (BSP) loss.
Result
Our comprehensive evaluation on publicly available datasets demonstrates that RE-Reg significantly outperforms existing methods in terms of registration accuracy and rigid bone structure preservation, achieving a 1.3% improvement in Dice similarity coefficient (DSC) and a 23% reduction in rigid bone deformation () compared with the best baseline.
Conclusion
This framework not only enhances anatomical fidelity but also ensures biomechanical plausibility and provides a valuable tool for image-guided orthopedic surgery. This code is available at https://github.com/Zq-Huang/RE-Reg.
{"title":"Enhanced CT-CBCT image registration for orthopedic surgery: Integrating rigid-elastic motion models","authors":"Zhiqi HUANG , Deqiang XIAO , Hongxun LIU , Long SHAO , Danni AI , Jingfan FAN , Tianyu FU , Yucong LIN , Hong SONG , Jian YANG","doi":"10.1016/j.vrih.2026.01.001","DOIUrl":"10.1016/j.vrih.2026.01.001","url":null,"abstract":"<div><h3>Background</h3><div>Computed tomography (CT) and cone-beam computed tomography (CBCT) image registration play pivotal roles in computer-assisted navigation for orthopedic surgery. Traditional methods often apply uniform deformation models, neglecting the biomechanical differences between rigid structures and soft tissues, which compromises registration accuracy, especially during significant bone displacements.</div></div><div><h3>Method</h3><div>To address this issue, we introduce RE-Reg, a rigid-elastic CT-CBCT image registration framework that jointly learns rigid bone motion and soft tissue deformation. RE-Reg incorporates a rigid alignment (RA) module to estimate global bone motion and an elastic deformation (ED) module to model soft tissue deformation, preserving bony structures through bone shape preservation (BSP) loss.</div></div><div><h3>Result</h3><div>Our comprehensive evaluation on publicly available datasets demonstrates that RE-Reg significantly outperforms existing methods in terms of registration accuracy and rigid bone structure preservation, achieving a 1.3% improvement in Dice similarity coefficient (DSC) and a 23% reduction in rigid bone deformation (<span><math><mrow><mo>%</mo><mo>Δ</mo><mtext>vol</mtext></mrow></math></span>) compared with the best baseline.</div></div><div><h3>Conclusion</h3><div>This framework not only enhances anatomical fidelity but also ensures biomechanical plausibility and provides a valuable tool for image-guided orthopedic surgery. This code is available at https://github.com/Zq-Huang/RE-Reg.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 87-100"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-06-04DOI: 10.1016/j.bcra.2025.100313
Suhyeon Lee , Euisin Gee , Junghee Lee
Verifiable delay function (VDF) is a cryptographic concept that ensures a minimum delay before output through sequential processing, which is resistant to parallel computing. One of the significant VDF protocols academically reviewed is the VDF protocol proposed by Pietrzak. However, for the blockchain environment, the Pietrzak VDF has drawbacks, including a large proof size and recursive protocol computation. In this paper, we present an implementation study of Pietrzak's VDF verification on the Ethereum virtual machine (EVM). We found that the discussion in Pietrzak's original paper can help with a clear optimization in EVM, where the costs of computation are predefined as specific amounts of gas. In our results, the cost of VDF verification can be reduced from 4 M to 2 M gas, and the proof size can be generated under 8 KB with a 2048-bit RSA key length, which is much smaller than the previous expectation.
可验证延迟函数(VDF)是一种密码学概念,它通过顺序处理确保输出前的最小延迟,从而抵抗并行计算。学术上评述的重要VDF协议之一是由Pietrzak提出的VDF协议。然而,对于区块链环境,Pietrzak VDF有缺点,包括大的证明大小和递归协议计算。在本文中,我们提出了Pietrzak的VDF验证在以太坊虚拟机(EVM)上的实现研究。我们发现,Pietrzak原始论文中的讨论有助于EVM的明确优化,其中计算成本被预定义为特定数量的气体。在我们的结果中,VDF验证的成本可以从4 M gas减少到2 M gas,并且证明大小可以在8 KB以下生成,RSA密钥长度为2048位,这比之前的预期要小得多。
{"title":"Implementation study of cost-effective verification for Pietrzak's VDF in Ethereum smart contract","authors":"Suhyeon Lee , Euisin Gee , Junghee Lee","doi":"10.1016/j.bcra.2025.100313","DOIUrl":"10.1016/j.bcra.2025.100313","url":null,"abstract":"<div><div>Verifiable delay function (VDF) is a cryptographic concept that ensures a minimum delay before output through sequential processing, which is resistant to parallel computing. One of the significant VDF protocols academically reviewed is the VDF protocol proposed by Pietrzak. However, for the blockchain environment, the Pietrzak VDF has drawbacks, including a large proof size and recursive protocol computation. In this paper, we present an implementation study of Pietrzak's VDF verification on the Ethereum virtual machine (EVM). We found that the discussion in Pietrzak's original paper can help with a clear optimization in EVM, where the costs of computation are predefined as specific amounts of gas. In our results, the cost of VDF verification can be reduced from 4 M to 2 M gas, and the proof size can be generated under 8 KB with a 2048-bit RSA key length, which is much smaller than the previous expectation.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100313"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147398036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2026-03-14DOI: 10.1016/j.vrih.2026.01.002
David Bamidele OLAWADE , Ezenwa Robinson MODUM , Olabanke Florence OLAWUYI , Omobolaji Rosemary OLASILOLA , Babajide David MAKANJUOLA , John Oluwatosin ALABI
Digital twin technology, that creates virtual replicas of physical entities using real-time data and simulation models, has emerged as a transformative innovation across multiple healthcare domains. Its application in physiotherapy and rehabilitation represents a paradigm shift from traditional therapeutic approaches to personalized data-driven interventions that optimize patient outcomes. This narrative review examines the current applications, benefits, challenges, and future prospects of digital twin technology in physiotherapy and rehabilitation, providing a comprehensive analysis of the manner in which this technology is reshaping clinical practice and patient care. A narrative review approach was employed, systematically searching PubMed, IEEE Xplore, Scopus, and Web of Science databases. Studies describing digital twin applications, development methodologies, clinical implementations, and theoretical frameworks in physiotherapy and rehabilitation contexts were included. Digital twin technology demonstrates significant potential in personalizing rehabilitation programs, enabling real-time monitoring of patient progress, predicting treatment outcomes, and facilitating remote therapeutic interventions. Current applications span musculoskeletal rehabilitation, neurological recovery, post-surgical care, and sports injury management. Key benefits include enhanced treatment precision, improved patient engagement, reduced healthcare costs, and accelerated recovery times. However, implementation faces challenges including technological complexity, data privacy concerns, interoperability issues, and the need for substantial infrastructure investment. Digital twin technology represents a promising frontier in physiotherapy and rehabilitation, offering unprecedented opportunities for personalized, efficient, and effective patient care. Successful integration requires addressing the current limitations while fostering interdisciplinary collaboration between clinicians, engineers, and data scientists.
数字孪生技术使用实时数据和仿真模型创建物理实体的虚拟副本,已成为跨多个医疗保健领域的变革性创新。它在物理治疗和康复中的应用代表了从传统治疗方法到个性化数据驱动干预的范式转变,从而优化患者的结果。本文综述了数字孪生技术在物理治疗和康复中的应用、益处、挑战和未来前景,并对该技术重塑临床实践和患者护理的方式进行了全面分析。采用叙述性综述方法,系统地检索PubMed、IEEE explore、Scopus和Web of Science数据库。研究描述了数字双胞胎在物理治疗和康复环境中的应用、开发方法、临床实施和理论框架。数字孪生技术在个性化康复计划、实时监测患者进展、预测治疗结果和促进远程治疗干预方面显示出巨大的潜力。目前的应用范围包括肌肉骨骼康复、神经恢复、术后护理和运动损伤管理。主要优点包括提高治疗精度、提高患者参与度、降低医疗成本和加快恢复时间。然而,实施面临着包括技术复杂性、数据隐私问题、互操作性问题和大量基础设施投资需求在内的挑战。数字孪生技术代表了物理治疗和康复的一个有前途的前沿,为个性化,高效和有效的患者护理提供了前所未有的机会。成功的整合需要解决当前的局限性,同时促进临床医生、工程师和数据科学家之间的跨学科合作。
{"title":"The role of digital twin technology in physiotherapy and rehabilitation practice","authors":"David Bamidele OLAWADE , Ezenwa Robinson MODUM , Olabanke Florence OLAWUYI , Omobolaji Rosemary OLASILOLA , Babajide David MAKANJUOLA , John Oluwatosin ALABI","doi":"10.1016/j.vrih.2026.01.002","DOIUrl":"10.1016/j.vrih.2026.01.002","url":null,"abstract":"<div><div>Digital twin technology, that creates virtual replicas of physical entities using real-time data and simulation models, has emerged as a transformative innovation across multiple healthcare domains. Its application in physiotherapy and rehabilitation represents a paradigm shift from traditional therapeutic approaches to personalized data-driven interventions that optimize patient outcomes. This narrative review examines the current applications, benefits, challenges, and future prospects of digital twin technology in physiotherapy and rehabilitation, providing a comprehensive analysis of the manner in which this technology is reshaping clinical practice and patient care. A narrative review approach was employed, systematically searching PubMed, IEEE Xplore, Scopus, and Web of Science databases. Studies describing digital twin applications, development methodologies, clinical implementations, and theoretical frameworks in physiotherapy and rehabilitation contexts were included. Digital twin technology demonstrates significant potential in personalizing rehabilitation programs, enabling real-time monitoring of patient progress, predicting treatment outcomes, and facilitating remote therapeutic interventions. Current applications span musculoskeletal rehabilitation, neurological recovery, post-surgical care, and sports injury management. Key benefits include enhanced treatment precision, improved patient engagement, reduced healthcare costs, and accelerated recovery times. However, implementation faces challenges including technological complexity, data privacy concerns, interoperability issues, and the need for substantial infrastructure investment. Digital twin technology represents a promising frontier in physiotherapy and rehabilitation, offering unprecedented opportunities for personalized, efficient, and effective patient care. Successful integration requires addressing the current limitations while fostering interdisciplinary collaboration between clinicians, engineers, and data scientists.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 71-86"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2026-03-14DOI: 10.1016/j.vrih.2023.08.009
Chi Weng MA , Ruien SHEN , Deli DONG , Shuangjiu XIAO
Background
3D botanical tree reconstruction from a single image plays a vital role in the field of computer graphics. However, accurately capturing the intricate branching patterns and detailed morphologies of trees remains a challenge.
Methods
In this study, we proposed a novel approach for single-image tree reconstruction using a conditional generative adversarial network to infer the 3D skeleton of a tree in the form of a 2D skeleton depth map. Based on the 2D skeleton depth map, a corresponding branching structure (3D skeleton) that inherits the tree shape in the input image and leaves can be generated using a procedural modeling technique.
Result
Experimental results show that the proposed method accurately reconstructs diverse tree structures across species. Both quantitative and qualitative evaluations demonstrate improved skeleton completeness, branching accuracy, and visual realism over baseline methods, while requiring no user input.
Conclusions
Our proposed approach for generating lifelike 3D tree models from a single image with no user input shows its proficiency in achieving efficient and reliable reconstruction. These results showcase the capability of the proposed model to recreate complex tree architectures while capturing their visual authenticity.
{"title":"Botanical tree reconstruction from a single image via 3D GAN-based skeletonization","authors":"Chi Weng MA , Ruien SHEN , Deli DONG , Shuangjiu XIAO","doi":"10.1016/j.vrih.2023.08.009","DOIUrl":"10.1016/j.vrih.2023.08.009","url":null,"abstract":"<div><h3>Background</h3><div>3D botanical tree reconstruction from a single image plays a vital role in the field of computer graphics. However, accurately capturing the intricate branching patterns and detailed morphologies of trees remains a challenge.</div></div><div><h3>Methods</h3><div>In this study, we proposed a novel approach for single-image tree reconstruction using a conditional generative adversarial network to infer the 3D skeleton of a tree in the form of a 2D skeleton depth map. Based on the 2D skeleton depth map, a corresponding branching structure (3D skeleton) that inherits the tree shape in the input image and leaves can be generated using a procedural modeling technique.</div></div><div><h3>Result</h3><div>Experimental results show that the proposed method accurately reconstructs diverse tree structures across species. Both quantitative and qualitative evaluations demonstrate improved skeleton completeness, branching accuracy, and visual realism over baseline methods, while requiring no user input.</div></div><div><h3>Conclusions</h3><div>Our proposed approach for generating lifelike 3D tree models from a single image with no user input shows its proficiency in achieving efficient and reliable reconstruction. These results showcase the capability of the proposed model to recreate complex tree architectures while capturing their visual authenticity.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 101-114"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-06-20DOI: 10.1016/j.bcra.2025.100319
Rahma Mukta , Shantanu Pal , Kowshik Chowdhury , Michael Hitchens , Hye-young Paik , Salil S. Kanhere
As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.
{"title":"Zero trust-driven access control delegation using blockchain","authors":"Rahma Mukta , Shantanu Pal , Kowshik Chowdhury , Michael Hitchens , Hye-young Paik , Salil S. Kanhere","doi":"10.1016/j.bcra.2025.100319","DOIUrl":"10.1016/j.bcra.2025.100319","url":null,"abstract":"<div><div>As digital ecosystems become more complex with decentralized technologies like the Internet of Things (IoT) and blockchain, traditional access control models fail to meet the security needs of dynamic, high-risk environments. The need for dynamic, fine-grained access control mechanisms has become critical, particularly in environments where trust must be continuously evaluated, and access decisions must adapt to real-time conditions. Traditional models often rely on static identity management and centralized trust assumptions, which are inadequate for modern, decentralized, and highly dynamic environments such as IoT ecosystems. Consequently, existing solutions lack fine-grained identity management, flexible delegation, and continuous trust evaluation, highlighting the need for a more robust, adaptive, and decentralized access control architecture. To address these gaps, this paper presents a novel access control architecture that integrates self-sovereign identity (SSI) and decentralized identifier (DID)-based access control with zero trust principles, enhanced by a flexible capability-based access control (CapBAC) approach. Leveraging SSI and DID allows entities to manage their identities without relying on a central authority, aligning with zero-trust principles. The integration of CapBAC ensures flexible, context-aware, and attribute-based access control, where access rights are dynamically granted based on the requester's capabilities. This enables fine-grained delegation of access rights, allowing trusted entities to delegate specific privileges to others without compromising overall security. Continuous trust evaluation is employed to assess the authenticity of access requests, mitigating the risks posed by compromised devices or users. The proposed architecture also incorporates blockchain technology to ensure transparent, immutable, and secure management of access logs, providing traceability and accountability for all access events. We demonstrate the feasibility and effectiveness of this solution through performance evaluations and comparisons with existing access control schemes, showing its superior security, scalability, and adaptability in real-world scenarios. Our work demonstrates a comprehensive, decentralized, and scalable solution for secure access control delegation using zero trust-driven principles.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100319"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146024719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-06-09DOI: 10.1016/j.bcra.2025.100315
Jakob Svennevik Notland , Jingyue Li , Mariusz Nowostawski , Peter Halland Haro
Cross-chain bridges are solutions that enable interoperability between heterogeneous blockchains. In contrast to the underlying blockchains, the bridges often provide inferior security guarantees and have been targets of hacks, causing damage in the range of 1.5 to 2 billion USD in 2022. The current state of bridge architectures is that they are ambiguous, and the relation between overarching architectures, underlying components, and exploits is shallow. We address this gap through a multivocal literature review covering 64 different bridges, including 31 exploits and four known bugs over three years (2021–2023). Our analysis identifies 13 architectural components of blockchain bridges. We link the components to eight types of vulnerabilities, also called design flaws. Furthermore, we identified prevention measures and proposed 11 impact reduction measures based on existing and possible countermeasures to address the imminent exploitation of design flaws. The results present an overview of the state of the art in bridge security, future research directions, and guidelines for designing and implementing secure cross-chain bridge architectures.
{"title":"SoK: cross-chain bridging architectural design flaws and mitigations","authors":"Jakob Svennevik Notland , Jingyue Li , Mariusz Nowostawski , Peter Halland Haro","doi":"10.1016/j.bcra.2025.100315","DOIUrl":"10.1016/j.bcra.2025.100315","url":null,"abstract":"<div><div>Cross-chain bridges are solutions that enable interoperability between heterogeneous blockchains. In contrast to the underlying blockchains, the bridges often provide inferior security guarantees and have been targets of hacks, causing damage in the range of 1.5 to 2 billion USD in 2022. The current state of bridge architectures is that they are ambiguous, and the relation between overarching architectures, underlying components, and exploits is shallow. We address this gap through a multivocal literature review covering 64 different bridges, including 31 exploits and four known bugs over three years (2021–2023). Our analysis identifies 13 architectural components of blockchain bridges. We link the components to eight types of vulnerabilities, also called design flaws. Furthermore, we identified prevention measures and proposed 11 impact reduction measures based on existing and possible countermeasures to address the imminent exploitation of design flaws. The results present an overview of the state of the art in bridge security, future research directions, and guidelines for designing and implementing secure cross-chain bridge architectures.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100315"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147398032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2026-03-14DOI: 10.1016/j.vrih.2025.12.004
Shuo WANG , Pengju ZHANG , Yihong WU
LiDAR and camera are two of the most common sensors used in the fields of robot perception, autonomous driving, augmented reality, and virtual reality, where these sensors are widely used to perform various tasks such as odometry estimation and 3D reconstruction. Fusing the information from these two sensors can significantly increase the robustness and accuracy of these perception tasks. The extrinsic calibration between cameras and LiDAR is a fundamental prerequisite for multimodal systems. Recently, extensive studies have been conducted on the calibration of extrinsic parameters. Although several calibration methods facilitate sensor fusion, a comprehensive summary for researchers and, especially, non-expert users is lacking. Thus, we present an overview of extrinsic calibration and discuss diverse calibration methods from the perspective of calibration system design. Based on the calibration information sources, this study classifies these methods as target-based or targetless. For each type of calibration method, further classification was performed according to the diverse types of features or constraints used in the calibration process, and their detailed implementations and key characteristics were introduced. Thereafter, calibration-accuracy evaluation methods are presented. Finally, we comprehensively compare the advantages and disadvantages of each calibration method and suggest directions for practical applications and future research.
{"title":"Review of extrinsic parameter calibration of LiDAR and camera","authors":"Shuo WANG , Pengju ZHANG , Yihong WU","doi":"10.1016/j.vrih.2025.12.004","DOIUrl":"10.1016/j.vrih.2025.12.004","url":null,"abstract":"<div><div>LiDAR and camera are two of the most common sensors used in the fields of robot perception, autonomous driving, augmented reality, and virtual reality, where these sensors are widely used to perform various tasks such as odometry estimation and 3D reconstruction. Fusing the information from these two sensors can significantly increase the robustness and accuracy of these perception tasks. The extrinsic calibration between cameras and LiDAR is a fundamental prerequisite for multimodal systems. Recently, extensive studies have been conducted on the calibration of extrinsic parameters. Although several calibration methods facilitate sensor fusion, a comprehensive summary for researchers and, especially, non-expert users is lacking. Thus, we present an overview of extrinsic calibration and discuss diverse calibration methods from the perspective of calibration system design. Based on the calibration information sources, this study classifies these methods as target-based or targetless. For each type of calibration method, further classification was performed according to the diverse types of features or constraints used in the calibration process, and their detailed implementations and key characteristics were introduced. Thereafter, calibration-accuracy evaluation methods are presented. Finally, we comprehensively compare the advantages and disadvantages of each calibration method and suggest directions for practical applications and future research.</div></div>","PeriodicalId":33538,"journal":{"name":"Virtual Reality Intelligent Hardware","volume":"8 1","pages":"Pages 28-70"},"PeriodicalIF":0.0,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147454100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-07-01DOI: 10.1016/j.bcra.2025.100322
Jinwen Xi , Guosheng Xu , Shihong Zou , Yinliang Yue , Binsi Cai , Guoqiang Li
Blockchain technology, renowned for its decentralized and secure nature, has gained substantial attention. Central to its functionality are consensus mechanisms, which are essential for validating transactions and upholding the integrity of the distributed ledger. However, the efficiency and scalability of blockchain are currently impeded by the resource limitations and excessive communication demands of existing consensus mechanisms. To address these challenges, we propose GT-BFT, a streamlined and lightweight blockchain consensus mechanism grounded in a global trust model. This model capitalizes on node behavior to form consensus groups and facilitate consensus achievement. GT-BFT integrates a novel approach of selective broadcasting along with a Byzantine threshold determination algorithm, significantly boosting both the efficiency and security of the network. Our extensive analysis and performance evaluation reveal that GT-BFT surpasses existing mechanisms in key areas such as security, system throughput, and transaction confirmation speed, marking a significant advancement in blockchain consensus technology.
{"title":"A global trust-based blockchain lightweight consensus mechanism","authors":"Jinwen Xi , Guosheng Xu , Shihong Zou , Yinliang Yue , Binsi Cai , Guoqiang Li","doi":"10.1016/j.bcra.2025.100322","DOIUrl":"10.1016/j.bcra.2025.100322","url":null,"abstract":"<div><div>Blockchain technology, renowned for its decentralized and secure nature, has gained substantial attention. Central to its functionality are consensus mechanisms, which are essential for validating transactions and upholding the integrity of the distributed ledger. However, the efficiency and scalability of blockchain are currently impeded by the resource limitations and excessive communication demands of existing consensus mechanisms. To address these challenges, we propose GT-BFT, a streamlined and lightweight blockchain consensus mechanism grounded in a global trust model. This model capitalizes on node behavior to form consensus groups and facilitate consensus achievement. GT-BFT integrates a novel approach of selective broadcasting along with a Byzantine threshold determination algorithm, significantly boosting both the efficiency and security of the network. Our extensive analysis and performance evaluation reveal that GT-BFT surpasses existing mechanisms in key areas such as security, system throughput, and transaction confirmation speed, marking a significant advancement in blockchain consensus technology.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100322"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147398035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-02-01Epub Date: 2025-07-01DOI: 10.1016/j.bcra.2025.100320
W. Van Woensel , O. Seneviratne
Health 3.0 enables decision-making to be based on longitudinal data from multiple institutions spanning the patient’s healthcare journey. Blockchain smart contracts can act as neutral and trustworthy intermediaries to implement such decision-making. In this distributed healthcare setting, transmitted data are structured using standards, such as Health Level Seven Fast Healthcare Interoperability Resources (HL7 FHIR), for semantic interoperability. Hence, the smart contract will require interoperability with the domain standard. However, it will also have to implement a complex communication setup to work in a distributed environment (e.g., using oracles), and be developed using special-purpose blockchain languages (e.g., Solidity). To support these requirements, we propose the encoding of smart contract logic using a high-level semantic Knowledge Graph (KG), which uses concepts and relations from a domain standard and additionally lists distributed data requirements. We subsequently deploy this semantic KG on blockchain via a hybrid on-/off-chain code-generation approach. We applied our approach to generate smart contracts for three health insurance cases from Medicare. We evaluated the generated contracts in terms of correctness and execution cost (i.e., gas) on blockchain. Finally, we discuss the suitability of blockchain—and by extension, our approach—for a number of healthcare use cases.
Health 3.0使决策能够基于跨越患者医疗保健旅程的多个机构的纵向数据。区块链智能合约可以作为中立和可信的中介来实现这种决策。在这种分布式医疗保健设置中,传输的数据使用诸如健康级别7快速医疗保健互操作性资源(HL7 FHIR)等标准进行结构化,以实现语义互操作性。因此,智能合约将需要与领域标准的互操作性。然而,它还必须实现一个复杂的通信设置,以便在分布式环境中工作(例如,使用oracle),并使用特殊用途的区块链语言(例如,Solidity)进行开发。为了支持这些需求,我们提出使用高级语义知识图(KG)对智能合约逻辑进行编码,该知识图使用领域标准中的概念和关系,并额外列出分布式数据需求。随后,我们通过混合链上/链下代码生成方法在区块链上部署这个语义KG。我们应用我们的方法为医疗保险中的三个健康保险案例生成智能合约。我们根据区块链上的正确性和执行成本(即gas)来评估生成的合同。最后,我们讨论了区块链的适用性,并扩展了我们的方法,用于许多医疗保健用例。
{"title":"Semantic interoperability on blockchain by generating smart contracts based on knowledge graphs","authors":"W. Van Woensel , O. Seneviratne","doi":"10.1016/j.bcra.2025.100320","DOIUrl":"10.1016/j.bcra.2025.100320","url":null,"abstract":"<div><div>Health 3.0 enables decision-making to be based on longitudinal data from multiple institutions spanning the patient’s healthcare journey. Blockchain smart contracts can act as neutral and trustworthy intermediaries to implement such decision-making. In this distributed healthcare setting, transmitted data are structured using standards, such as Health Level Seven Fast Healthcare Interoperability Resources (HL7 FHIR), for semantic interoperability. Hence, the smart contract will require interoperability with the domain standard. However, it will also have to implement a complex communication setup to work in a distributed environment (e.g., using oracles), and be developed using special-purpose blockchain languages (e.g., Solidity). To support these requirements, we propose the encoding of smart contract logic using a high-level semantic Knowledge Graph (KG), which uses concepts and relations from a domain standard and additionally lists distributed data requirements. We subsequently deploy this semantic KG on blockchain via a hybrid on-/off-chain code-generation approach. We applied our approach to generate smart contracts for three health insurance cases from Medicare. We evaluated the generated contracts in terms of correctness and execution cost (i.e., gas) on blockchain. Finally, we discuss the suitability of blockchain—and by extension, our approach—for a number of healthcare use cases.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100320"},"PeriodicalIF":5.6,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146174011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}