Next Article in Journal
Dual-Domain Superposition for Maritime Relay Communications: A Flexible-Coded Transmission Design Towards Spectrum–Reliability Synergy
Previous Article in Journal
Innovative Indoor Positioning: BLE Beacons for Healthcare Tracking
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms

by
Shizhuang Liu
,
Yang Zhang
and
Yating Zhao
*
College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(10), 2020; https://doi.org/10.3390/electronics14102020
Submission received: 12 April 2025 / Revised: 8 May 2025 / Accepted: 14 May 2025 / Published: 15 May 2025
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
With the deep integration of distributed network technology and intelligent medical care, how to achieve efficient collaboration under the premise of safeguarding data security and system efficiency has become an important challenge for intelligent medical diagnosis systems. The traditional practical Byzantine fault tolerance (PBFT) algorithm has difficulty meeting the demands of large-scale distributed medical scenarios due to high communication overhead and poor scalability. In addition, the existing improvement schemes are still deficient in dynamic node management and complex attack defence. To this end, this paper proposes the VS-PBFT consensus algorithm, which fuses a verifiable random function (VRF) and reputation mechanism, and designs a distributed intelligent medical diagnosis collaboration system based on this algorithm. Firstly, we introduce the VRF technique to achieve random and unpredictable selection of master nodes, which reduces the risk of fixed verification nodes being attacked. Secondly, we construct a dynamic reputation evaluation model to quantitatively score the nodes’ historical behaviors and then adjust their participation priority in the consensus process, thus reducing malicious node interference and redundant communication overhead. In the application of an intelligent medical diagnosis collaboration system, the VS-PBFT algorithm effectively improves the security and efficiency of diagnostic data sharing while safeguarding patient privacy. The experimental results show that in a 40-node network environment, the transaction throughput of VS-PBFT is 21.05% higher than that of PBFT, the delay is reduced by 33.62%, the communication overhead is reduced by 8.63%, and the average number of message copies is reduced by about 7.90%, which demonstrates stronger consensus efficiency and anti-attack capability, providing the smart medical diagnosis collaboration system with the first VS-PBFT algorithm-based technical support.

1. Introduction

Blockchain technology, as a decentralized distributed ledger technology, has become a key technology driver in a number of fields, such as finance, IoT, supply chain, etc., since the introduction of the Bitcoin system [1] in 2008. With the continuous expansion of blockchain application scenarios, traditional consensus algorithms are facing many challenges, especially the balance of efficiency, security, and scalability [2]. Among many blockchain consensus algorithms, the practical Byzantine fault tolerance (PBFT) algorithm has become the consensus mechanism of choice for many federation and permission chains due to its high throughput and deterministic termination properties [3]. However, the standard PBFT algorithm suffers from high communication complexity (O(n2)), rigid node authentication mechanisms, and lack of resilience to malicious node attacks when facing large-scale node networks [4,5], which severely limits its potential application in highly dynamic blockchain systems.
As the scale of distributed systems expands, the balance between security and performance becomes particularly critical. The traditional PBFT algorithm usually adopts a static node configuration, where all authentication nodes have the same weight, and this ‘one-size-fits-all’ design concept cannot adapt to the characteristics of node heterogeneity and dynamic changes in complex network environments [6]. Especially in open network environments, malicious nodes may disrupt the consensus process through witch attacks, eclipse attacks, etc., and the standard PBFT lacks an effective mechanism to identify and respond to these attacks [7]. These limitations have motivated researchers to explore novel consensus algorithm design ideas that combine cryptographic primitives with incentive mechanisms to enhance the security, scalability, and efficiency of PBFT algorithms [8].
Verifiable random functions (VRFs), as an advanced cryptographic tool, are capable of generating publicly verifiable pseudo-random outputs while maintaining the unpredictability of the outputs [9]. This property of VRFs makes them ideal for designing fair and manipulation-resistant leader election mechanisms, which have been successfully applied in blockchain platforms such as Algorand [10] and Dfinity [11]. On the other hand, reputation mechanisms, as a means of dynamically assessing the reliability of node behavior, assign dynamically changing reputation values to nodes by recording and analyzing the nodes’ historical behaviors, thus providing a quantitative basis for system decision making [12]. Reputation systems have been widely used in P2P networks [13], e-commerce [14], and distributed systems [15], providing new ideas for building autonomous and adaptive security mechanisms.
In the design of blockchain consensus algorithms, regulatory compliance constraints for medical data are particularly critical. For example, in the United States, the Health Insurance Portability and Accountability Act (HIPAA) imposes strict limitations on the use and sharing of protected health information (PHI), allowing data exchange only with patient authorization or under legally permissible circumstances [16]. Similarly, the European Union’s General Data Protection Regulation (GDPR) requires adherence to principles such as data minimization, purpose limitation, and informed consent for the processing of personal health data [17]. These regulations mandate the integration of technical safeguards from the outset, including encrypted storage, fine-grained access control, and tamper-proof audit logs, to ensure legal compliance [16,17]. Meanwhile, healthcare data processing must uphold both anonymity and the principle of data minimization. Traditional VRF-based and reputation-based mechanisms, when applied independently, lack inherent support for data anonymization and fine-grained access control, making it difficult to meet the compliance requirements of HIPAA and GDPR [18].
In order to more intuitively demonstrate the advantages of VS-PBFT over existing mainstream consensus mechanisms, in terms of key performance indicators, this paper compares six typical consensus algorithms in terms of throughput, latency, security, scalability, fault-tolerance, resource consumption, and communication overhead, as shown in Table 1.
Obviously, existing consensus algorithms have their own advantages and disadvantages, and it is difficult to take into account security, efficiency, and scalability at the same time. To this end, this paper proposes an innovative consensus optimization improvement scheme (VS-PBFT) for distributed intelligent medical diagnosis collaborative systems based on a verifiable random function and reputation mechanism, which aims to simultaneously address the limitations of traditional PBFT algorithms in terms of security, efficiency, and scalability.

1.1. Related Work

In the study of consensus mechanisms for distributed systems, the introduction of verifiable random functions (VRFs) and reputation mechanisms provides a new research direction to improve the performance and security of the practical Byzantine fault-tolerant (PBFT) algorithm. In recent years, academics have gradually explored the introduction of reputation mechanisms and verifiable random functions to improve the consensus performance [19,20].
Early improvement efforts mainly focused on quantitatively evaluating nodes through reputation mechanisms so as to dynamically screen out well-performing nodes during the consensus process. In 2010, Barreno et al. [21] proposed a comprehensive security framework for learning systems, analyzing potential threats such as data poisoning and collusion attacks that may affect reputation-based mechanisms. In 2014, Goodfellow et al. [22] introduced an adversarial example generation method, further revealing the vulnerability of learning systems under non-independent and identically distributed (non-i.i.d.) conditions, thereby providing theoretical guidance for the robust design of reputation mechanisms. In 2018, Lei Kai et al. [23] proposed a reputation-based Byzantine fault-tolerant algorithm for the PBFT algorithm in the coalition chain, which reduced the possibility of malicious nodes by obtaining a high voice power during the voting process. In 2020, Chen J. H. et al. [24] proposed an improved PBFT algorithm based on a reputation and voting mechanism. This method reduced the possibility of malicious nodes being elected as master nodes by introducing a reputation model and a voting mechanism to ensure that the master nodes were elected by nodes with higher reputation. In 2021, Tao Wang et al. [25] proposed RBT (distributed reputation system), a distributed reputation system for blockchain-based peer-to-peer energy transactions, which improved the trustworthiness and efficiency of energy trading platforms. In 2022, Rui Gu et al. [26] proposed a PBFT master node election algorithm based on anomaly detection and a reputation model, which reduced the influence of malicious nodes and improved the fault tolerance and security of the system. In 2023, Biggio et al. [27] proposed an evasion attack method targeting machine learning systems, where attackers could bypass model detection during the testing phase, indicating potential risks for reputation mechanisms when facing collusion-based score manipulation. In 2024, Niu Kai et al. [28] proposed an improved method based on reputation value for the PBFT consensus algorithm in IoT environment, which optimized the consensus process and improved the performance and reliability of the system in IoT scenarios.
Meanwhile, in order to solve the centralization and predictability problems in the node election process in the traditional PBFT algorithm, researchers began to focus on the application of VRF in the consensus mechanism. In 2004, Gura et al. [29] evaluated the performance of ECC operations on 8-bit AVR platforms, revealing that a single 160-bit scalar multiplication on an ATmega128 microcontroller took approximately 0.81 s, highlighting the computational burden of VRF on resource-constrained IoT devices. In 2017, Cascudo and David [30] proposed the SCRAPE scheme, which utilized the stochasticity beacon mechanism witnessed by a public entity to provide a more secure stochasticity generation method for distributed systems. Androulaki et al. [31] systematically introduced VRF for the first time in Hyperledger Fabric in 2018, which effectively suppressed witch attacks by selecting consensus nodes through verifiable randomness. In 2020, Kietzmann et al. [32] proposed the integration of lightweight pseudorandom number generation schemes in IoT systems to reduce the performance impact of security mechanisms on resource-constrained devices, offering optimization strategies for deploying VRF on medical edge devices. In 2021, Seo and Azarderakhsh [33] implemented Curve448 computations on the Cortex-M4 platform, showing that core VRF operations required over six million clock cycles. In 2023, Zhang et al. [34] proposed FortunChain, an elliptic curve VRF (EC-VRF)-based scalable blockchain system that implemented state sharding to ensure efficient and secure node selection. In the same year, Jiang et al. [35] proposed the VPBFT algorithm to improve the PBFT consensus mechanism based on VRF and the PageRank algorithm. By introducing VRF for master node election, the unpredictability of master node selection was increased; combined with the PageRank algorithm to evaluate the importance of nodes, the node selection process was optimized. In 2024, Chen et al. [36] proposed the Slicing PBFT (PBFT) consensus algorithm based on VRF, which utilized VRF to group nodes randomly, reducing the communication overhead and improving the consensus efficiency. This improvement effectively solved the performance bottleneck of the traditional PBFT algorithm in large-scale networks.
Overall, the improvement of PBFT from 2015 to present has experienced a clear evolutionary trend from the optimization of a single reputation mechanism to the introduction of VRF [37]. Early research focused on how to optimize node election and reduce the impact of malicious behaviors through reputation mechanisms, while the subsequent introduction of VRFs addressed the fairness and unpredictability issues that existed in traditional PBFT election mechanisms [38]. However, previous research has always focused on either a single VRF mechanism or a reputation mechanism. The VS-PBFT algorithm we propose is the first to deeply integrate both, fully leveraging their complementary advantages. Additionally, we have designed a distributed diagnostic collaboration system model to explore its potential applications in the medical field.

1.2. Contribution

Compared with existing research work, this study makes the following contributions to the design and application verification of consensus mechanisms:
(1)
Technical Innovation: In this study, an improved consensus algorithm, VS-PBFT, which incorporates a verifiable random function and dynamic reputation mechanism, is proposed based on the PBFT consensus mechanism. In the leader node selection process, VRF provides cryptographic randomness, avoiding the predictability issues of traditional mechanisms. Meanwhile, the reputation mechanism dynamically adjusts the nodes’ priorities, optimizing efficiency and security in the consensus process. The combination of both effectively reduces the risk of single-point attacks, enhancing the system’s robustness and stability.
(2)
Application Scenario Design: Based on the proposed consensus algorithm, this study designs a distributed diagnosis collaboration system model for intelligent medical scenarios, which serves as a typical application case of the VS-PBFT algorithm, and is used to validate its application potential in medical data security and collaborative processing. The model embodies the applicability of the algorithm in privacy protection, data immutability, and multi-agency collaboration at the system architecture level, which helps to demonstrate the practical value of the proposed algorithm in real complex scenarios.

1.3. Organization

The rest of this paper is organized as follows: Section 2 shows our model design and scenario setting, model evaluation, and system goals. Section 3 describes the research on the optimization of the master node selection mechanism of our proposed enhanced VRF-based VS-PBFT consensus algorithm and the research on the enhanced VS-PBFT consensus algorithm based on the dynamic reputation mechanism. Section 4 discusses the specific setup of the experimental environment and provides experimental results for performance evaluation and comparative analysis. Finally, the paper is summarized in Section 5.

2. System Model Design and Scheme Setup

In this section, we describe our proposed system model and present the model evaluation and system objectives.

2.1. Model Design

The distributed intelligent medical diagnosis collaboration system we propose consists of five core entities working together (as shown in Figure 1). Among them, the trusted authority (TA) serves as the authoritative center of the system, responsible for identity authentication, key distribution, and dynamic reputation assessment of all medical AI agent nodes. To prevent single points of failure or attack risks that the TA may face, we introduce a BLS-based threshold signature mechanism (e.g., in a group of 5 TA nodes, 1 node can fail or be malicious, and at least 3 nodes must jointly sign for it to be valid), thereby constructing a decentralized TA operational structure. During system operation, patients initiate diagnostic requests through smart terminals, and the platform automatically matches the appropriate AI agent nodes based on the provided basic symptoms, medical history, and other information. In the consensus process, the system utilizes the verifiable random function (VRF) mechanism to randomly elect a diagnostic group from the candidate nodes, which is internally weighted based on the latest reputation scores of each node fed back by the diagnostic model to ensure that the high-reputation nodes have a slightly higher probability of winning the VRF, and then reaches a distributed diagnostic result based on the VS-PBFT consensus algorithm that incorporates the dynamic reputation mechanism. Here, there is tight interdependence between the medical diagnostic model and the consensus algorithm: the initial judgment output from the diagnostic model serves as the input for the voting of the consensus nodes, and the voting results of VS-PBFT are in turn used to update the dynamic reputation scores of the agents. This closed-loop feedback mechanism makes it possible that when the diagnostic quality of an agent decreases, its reputation score is automatically cut, resulting in a decrease in its participation ratio in the subsequent VRF lottery election and VS-PBFT voting. On the contrary, high-reputation agents are given more diagnostic and voting opportunities, thus enhancing the system robustness while improving the overall diagnosis accuracy, fully reflecting the synergistic optimization effect of the model and the consensus algorithm. Meanwhile, the medical data center (MDC) is responsible for the security management of the entire data lifecycle. Data are transmitted and processed through TLS 1.3 encrypted channels, and a PKI mechanism is used to achieve mutual authentication between nodes. Critical data are further protected at the application layer using the AES-256 symmetric encryption algorithm, ensuring it cannot be cracked or tampered with. Additionally, we designed a blockchain–EHR interface adaptation mechanism based on middleware. The middleware module can map the structured data on the chain to standard FHIR resources in real time, and at the same time, the diagnostic conclusions confirmed by VS-PBFT consensus will be synchronously pushed to the EHR system and privilege inheritance, so as to realize end-to-end closed-loop synergy from model inference→consensus confirmation→landing of the clinical system, and bi-directional interactions are carried out with the hospital’s EHR system through the RESTful API, supporting data synchronization and privilege inheritance, thus realizing cross-platform data sharing and business synergy. The two-way interaction with the hospital EHR system through the RESTful API supports data synchronization, privilege inheritance and structure conversion, thus realizing cross-platform data sharing and business collaboration. The VS-PBFT algorithm used by the system will be introduced in detail in Section 3.

2.2. System Objectives

This study proposes and implements an improved VS-PBFT consensus algorithm based on the deep integration of a verifiable random function (VRF) and a node reputation mechanism. By introducing randomized leader election and dynamic reputation evaluation, the system’s security and fault tolerance are significantly enhanced. Building upon this foundation, a distributed medical diagnosis system is designed, utilizing a blockchain ledger to record the entire diagnostic process and results, thereby ensuring data integrity, traceability, and tamper resistance.

3. VS-PBFT Algorithm Based on the Combination of Reputation Mechanism and Verifiable Random Function (VRF)

The VS-PBFT algorithm proposed in this paper combines a verifiable random function and reputation mechanism to optimize the master node election and node trust management of the traditional PBFT, thereby enhancing the fairness, robustness, and security of the consensus process. It is particularly suitable for distributed intelligent medical systems requiring high performance and security. The specific flow of the algorithm is shown in Figure 2 below.

3.1. Optimization of Master Node Selection Mechanism of Enhanced VS-PBFT Consensus Algorithm Based on VRF

In distributed system consensus algorithms, the master node selection mechanism is a critical component for ensuring system security, performance, and fairness. The verifiable random function (VRF) needs to satisfy the following properties:
  • Verifiability: For all key pairs ( p k , s k ) KeyGen ( 1 λ ) and strings m { 0 , 1 } i n ( λ ) , if ( δ , ρ ) = P r o v e ( s k , m ) , then there exists a negligible polynomial μ , such that:
    Pr [ Verify ( p k , m , δ , ρ ) = 1 ] = 1 μ ( λ )
  • Uniqueness: For all key pairs ( p k , s k ) Keypair ( 1 λ ) and prime strings m { 0 , 1 } i n ( λ ) , there exists no δ 1 , δ 2 , ρ 1 , ρ 2 such that Verify p k , m , δ 1 , ρ 1 = 1 and Verify p k , m , δ 2 , ρ 2 = 1 hold simultaneously, i.e.,:
    Pr [ δ 1 δ 2 | Verify ( p k , m , δ 2 , ρ 2 ) = 1 Verify ( p k , m , δ 1 , ρ 1 ) = 1 , ] μ ( λ )
  • For all functions where D obeys the PPT distribution, there exists a negligible polynomial μ , such that:
    Pr [ D ( 1 λ , F ( s k , m ) ) = 1 ] Pr [ D ( 1 λ , { 0 , 1 } out ( λ ) ) = 1 ] μ ( λ )
Figure 3 shows a sketch of the security proofing of the VRF module in the VS-PBFT protocol based on the universally composable (UC) security framework. The model portrays the contrasting relationship between the real protocol and the ideal functionality by formally modeling the participating entities in the system and their interaction behaviors. Environment A acts as an external driver, receiving inputs r, x, and j and coordinating the protocol flow. Adversary A intercepts inputs r and x and intervenes in the execution behavior of participant P_i by calling the interface in x. System participant P_i receives inputs r, x, and j from Environment A and coordinates the protocol flow. System participant P_i receives commands from the ambient body and the input module, executes the corresponding protocol logic, and feeds the output back to the ambient body. The dashed box on the right shows the ideal functional area containing the generator module Γ_VRF for the verifiable random function and its functional abstraction F_VRF, where Γ_VRF receives the seed values and outputs pseudo-random pairs (y,π) through the secure VRF generator component G, and F_VRF subsequently provides interfaces for protocol calls to ensure that the outputs are unpredictable and verifiable. The security model uniformly schedules the VRF behavior through abstract functionalities F to limit the intervention of adversaries in the randomness and output process, thus ensuring the robustness and composable security of the protocol in the face of malicious environments.

3.1.1. Key Generation for VRF

In this study, we used the Ed25519 algorithm of elliptic curve cryptography to implement the verifiable random function. The general form of the elliptic curve equation is:
f ( u ) = v 2 mod p = u 3 + a u + b (   mod   p )
where a, b, and p are constants defining a particular elliptic curve and (u, v) are points on the curve. During the key generation phase, each node generates a unique public–private key pair, and the Ed25519 system ensures key security and unforgeability:
p k = G sk mod   p
where the private key (sk) is a random number that is the base of the Ed25519 elliptic curve and p is the modulus of the prime field. pk is the 32-byte public key; sk is the 64-byte private key.

3.1.2. Generation and Output of Random Numbers

Each node i generates r based on sk and m. We used a hash-based pseudo-random number generation method, where m first undergoes a SHA-512 hash computation to produce a 512-bit hash value. Then, we intercepted the first 64 bytes to form an intermediate result and introduced exponential and logarithmic operations to increase the complexity:
M = i = 1 64 H 64 [ i ] × 2 i mod   p
N = log 2 1 + i = 1 64 ( H 64 [ i ] + 1 ) mod   p
where H 64 [ i ] denotes the ith byte of the intercept, M is an intermediate random number generated by weighted exponentiation, and N is a nonlinear random number generated by combining logarithm and product. Finally, we further introduced bitwise operations and nonlinear mapping f ( x ) to enhance the complexity of the output, i.e., the final random number output, which can be expressed by the following equation:
r = ( M N ) + H 256 ( H 64 ) × e M mod   p + log 2 ( N + 1 ) mod  
where e M mod   p introduces an exponential operation to amplify the nonlinear effect and log 2 ( N + 1 ) balances the numerical growth to avoid overflow.

3.1.3. Proof Generation

During the master node election process, each node i generates the corresponding proof simultaneously based on private key sk and message m (the implementation is shown in Algorithm 1). The VRF proof generation process can be represented as follows:
π = ( H 256 ( r G ) , H 256 ( ( r + H 512 ( r + H s ) mod   p ) )
where H 256 ( m ) denotes the SHA-256 hash performed, R = r G is the curve point corresponding to r , and s is the sk-derived scalar. After completing the construction, the legitimacy of the proof is also verified by checking whether the curve point computation is R = R . If consistent, the node identity is confirmed. The specific verification formula can be expressed as follows:
R = s 1 ( S G H 512 ( R pk m ) pk )
Algorithm 1 VRF Proof Generation Algorithm
Input: Secret key sk, Message m
Output: Proof π
1: CP(sk, m):
2:  SD ← sk[0…31]
3:  HS ← Init_SHA512()
4:  HS ← Up(HS, SD)
5:  HS ← Up(HS, m)
6:  H ← R(HS)
7:  π ← S(h, sk)
8:  return −1
9:  if VS(H, π, DP(sk)) = F then
10:   return CP(sk, m)
11:  else
12:   return π
13:  End if
Where CP denotes the ComputeProof function, SD is the private key seed, HS denotes the current hash state, Init_SHA512 denotes initializing the hash state, Up denotes updating the hash state, H denotes the hash value, R denotes the final result, S denotes the use of the signature algorithm for signing, VS denotes the use of the public key for verifying the signature, D denotes the public key exported from the private key, F is the false, and T is true. The algorithm notations in subsequent sections will not be repeated if already introduced.

3.1.4. VRF Proof Verification

The goal of the VRF verification algorithm is to verify the validity of proof π generated from a private key by means of public key pk and input message m. First, for input message m and public key pk, a hash value hash is computed. Mathematically, this can be expressed as follows:
Hash = H 512 ( p k M ) = H 512 ( p k 1 , p k 2 , , p k n , m 1 , m 2 , , m k )
where pk = ( p k 1 , p k 2 , , p k n ) denotes the byte sequence of the public key and m e s s a g e = ( m 1 , m 2 , , m k ) denotes the byte sequence of the message. Then, in the Ed25519 algorithm, the signature verification process makes the following equation hold by checking for the existence of private key sk:
H ( p k , m ) = R ( p k , m ) + s k Q ( p k , m )
where R ( p k , m ) and Q ( p k , m ) are elliptic curve points associated with message m and public key pk, and H ( p k , m ) is the hash value generated from the message and the public key. Finally, if the signature is successfully verified, the proof is valid and 0 is returned; otherwise, an error code −1 is returned, indicating that the proof is invalid.

3.1.5. Master Node Election Process

With the introduction of VRF, the master node election process becomes more dynamic and unpredictable. First, the master node election is based on the random number generated by VRF. Each node i generates a random number r i based on its own private key and shared message m. A new master node can be elected by the following formula:
X = r i [ 0 ]   mod  
where r i [ 0 ] is the first byte of the random number generated by node i and N is the total number of nodes in the network. To avoid selecting a node already acting as a master, the system recalculates the master node ID through a simple mechanism:
X = X + 1 m o d N
This adjustment mechanism effectively avoids the same node becoming the master node consecutively and ensures the fairness and decentralization of the consensus process. The specific implementation is shown in Algorithm 2:
Algorithm 2 VRF-based View Change Algorithm
INPUT: Current view v, Number of nodes N, Current leader LC
OUTPUT: New leader LN, New view v’
1: CV(v, N, L):
2:  v’ ← v + 1
3: NI ← r[0] mod N
4:  SD ← “leader-election” || v’
5:  (pk, sk) ← G(λ)
6:  π ← CP(sk, SD)
7:  r ← CO(π)
8:  CL ← r[0] mod N
9:  if CL = L then
10:   LN ← (CL + 1) mod N
11:   else
12:   LN ← CL
13:   End i
14:   BV(v’, LN, π, r)
15:   return (LN, v’)
Where CV denotes the attempt conversion, v denotes the current attempt number, v’ denotes the new attempt number, L denotes the current leader, NI denotes the new leader ID, G is a key pair generating function, CL denotes the candidate leader, LN is the new leader, and BV denotes the broadcasting of the new leader information.

3.2. Research on Enhanced VS-PBFT Consensus Algorithm Based on Dynamic Reputation Mechanism

In this section, we introduce how the reputation mechanism can dynamically adjust node participation authority and improve the security and fault tolerance of the algorithm.

3.2.1. Credibility Constraints on the Consensus Process

Each node maintains a reputation R i , whose reputation R i is affected by successful or failed execution. Specifically, when a node successfully completes a vote in consensus, its reputation increases; and vice versa decreases. The update rule of reputation degree is shown in Equation (15):
R i = R i + k T m F ( 0 < R i < 100 )
where k is the percentage of credibility increase in case of success, m is the percentage of decrease in case of failure, T stands for completion of voting, and F stands for verification failure. When the reputation of a node falls below a predefined threshold, the node will be excluded from participating in the consensus process. The reputation of all nodes at startup is initialized to 50.0; it is automatically trimmed to the range of 0–100 after each update to avoid overshooting or underflow. As shown below, where ϵ is the credibility threshold.
Y = 1 , R i > ϵ 0 , R i ϵ

3.2.2. Combination of Credibility Update and Consensus Process

In the PREPARED phase of the VS-PBFT protocol, whenever a node votes on a “ready” message, the reputation-weighted message validation algorithm is shown in Algorithm 3, the system will first check its reputation. It can only participate if R i > 30 . If the validation is successful, the reputation will be increased; if the validation is unsuccessful, the reputation will be deducted. If voting is prohibited due to a reputation lower than 30, the reputation will also be deducted again for failure to participate in the consensus, accelerating the elimination of unreliable nodes. The node reputation update formula in the reputation mechanism can be expressed as follows:
R i ( t ) = R i ( t 1 ) + η 1 100 R i ( t 1 ) γ s ,   s ( t ) Ω R i ( t 1 ) 1 η 2 γ f ,   f ( t ) Φ
where R i ( t ) denotes the reputation of node i at moment t; R i ( t 1 ) denotes the reputation of node i at the previous moment t − 1; η 1 and η 2 are the adjustment factors for successful and failed participation in the consensus, respectively; and γ s and γ f are the influence factors for successful and failed participation in the consensus, respectively. s ( t ) and f ( t ) are the schematic functions denoting the success and failure events, respectively. Ω and Φ denote the success and failure of the set of events indicating whether the node is successful in the current round of message propagation or not, respectively, and the node controls whether it participates in the subsequent consensus phase through these dynamically changing reputation. Specifically, R i ( t ) can be denoted as follows:
Δ R t ( t ) = R i + 0.09 , s ( t ) Ω R i 0.5 , f ( t ) Φ
Algorithm 3 Reputation-Weighted Message Verification Algorithm
INPUT: Message m, Sender ID s, Recipient ID r, Current reputations {Rep_i}_{i = 1}^N
OUTPUT: Boolean result, Updated reputation R’
1: VM(m, s, r, {R}_{i = 1}^N):
2:  θ ← 30.0
3:  if CanP(s, R, θ) = F then
4:   return (F, R)
5:  End if
6:  SV ← (m[6] = ‘1’)
7:  CM ← (CCT(m[3]) = CI)
8:  VIM ← (CCT(m[4]) = VIN)
9:  if SV ∧ CM ∧ VIM then
10:    R’ ← UR(s, R, T)
11:    return (T, R’)
12:   else
13:    R’ ← UR(s, R, F)
14:    return (F, R’)
15:   End if
Where VM denotes the verification of message accuracy, θ is to set the threshold of credibility, Canp checks the credibility of the node comparing with the threshold, SV verifies whether the signature is legal or not, CM verifies whether the client matches or not, CCT denotes the conversion of characters to integer, and VIM verifies the numbering of the attempts.

4. Experimental Results and Analysis

This section describes the experimental environment setup of this paper and evaluates and analyzes the performance of the VS-PBFT algorithm.

4.1. Experimental Environment Setup

The experiment was conducted in a virtual machine environment with a Ryzen 7 7840H processor (AMD Inc., Santa Clara, CA, USA) and Ubuntu 20.04.3 operating system, configured with 8 GB RAM and a 40 GB SCSI hard disk. The experiment was based on the NS3.40 framework in C++ and the development tool was Visual Studio Code 1.98.1. The experiment used IPv4 as the network layer protocol, the link type was P2P, the link propagation delay was 2 ms, the transport layer protocol was UDP, the initial reputation value was set to 50.0, the network topology was a fully-connected (mesh) structure, the link bandwidth was 5 Mbps, the IP address was assigned in the 10.1.1.0/24 network segment, and the communication port was 7071. Tests of different environments in the NS3 framework with 10–40 nodes and 10–30 consensus rounds were performed. The experimental data were averaged over 50 independent runs with the outliers removed.
Messages delivered by the node consensus process used the lightweight UCI Heart Disease Data Set (https://github.com/Ruohan-Yang/Heart-Disease-Data-Set, accessed on 25 April 2025), a healthcare dataset that was primarily used to validate the system’s protocol stability in handling business loads with data transfer capability. The Github address for this experimental code is: https://github.com/ZDQCDB/VS-PBFT-main/tree/master (accessed on 25 April 2025).

4.2. Experimental Results

In this section, we show and analyze the performance of our proposed consensus optimization algorithm VS-PBFT for distributed intelligent medical diagnostic collaborative systems based on a verifiable random function and reputation mechanism versus the traditional PBFT algorithm in terms of transaction throughput TPS, average transaction latency, average number of message replicas, communication overhead, reputation variations, DOS attacks under different number of nodes (10 to 40), and performance comparison in a consensus rounds (10 to 30) environment.
As shown in Figure 4, the TPS and latency variations of six PBFT variants (VS-PBFT, PBFT, GR-PBFT, POS_PBFT, POW_PBFT, and NAC_PBFT) under the same number of consensus rounds are compared to validate the advantages of VS-PBFT. The transaction latency of all algorithms increases with the number of nodes, but VS-PBFT always maintains the lowest latency. At 40 nodes, its latency is only 66.48% of PBFT and the growth curve is flat, indicating that it effectively reduces the latency by optimizing the communication mechanism, while the latency of PBFT, POW, and NAC_PBFT increases significantly when the number of nodes exceeds 30. Figure 5 shows that the throughput of each algorithm decreases with node expansion, but VS-PBFT not only maintains the highest throughput, which is significantly better than POS and GR-PBFT at 10–20 nodes, but also maintains more than 2000 tps at more than 25 nodes, which is significantly better than the other algorithms (which are all lower than 1500 tps).
In the distributed network experiments containing 25 nodes and 30 rounds (Figure 6 and Figure 7), VS-PBFT keeps the average message replica count lower than PBFT, GR-PBFT, and NAC_PBFT through dynamic reputation evaluation with randomized role assignment. The experiments show that the replica count of VS-PBFT grows more moderately with increases in the number of nodes and the number of consensus rounds, which proves that its reputation strategy is able to effectively suppress the communication overhead.
The experimental results in Figure 8 and Figure 9 show that the communication overhead of each algorithm rises significantly as the number of nodes increases from 10 to 40; however, at 40 nodes, the communication data size of VS-PBFT is 4860 KB, which is about 10.4% and 7.7% lower than that of PBFT and NAC_PBFT, respectively, and in the range of 30–40 nodes, its overhead rate (77.1%) is lower than that of PBFT (85.2%) and GR-PBFT (81.2%). The advantage of VS-PBFT in overhead is also gradually revealed when the number of consensus rounds increases.
In terms of reputation management, Figure 10 and Figure 11 show that VS-PBFT maintains high reputation stability as the node size increases from 10 to 40. The average reputation of the nodes increases steadily, and the difference between the maximum and minimum reputation is about 1 percentage point, which exhibits a better fair regulation mechanism. Finally, the DoS attack defense experimental results presented in Figure 12 show that VS-PBFT, by integrating the reputation mechanism with the verifiable random function (VRF), its attack success rate is always controlled at 0.15–0.25% (only 0.18% at 10 nodes), and the number of attacks grows extremely slowly, thus significantly improving the system’s attack resistance.
Figure 13 shows the comparison of five key metrics between VS-PBFT and FHIRChain under 10 to 25 nodes, including the audit trail generation time, maximum/minimum response time, average node audit time, and generation rate. The results show that VS-PBFT outperforms FHIRChain overall in all metrics, and the performance maintains higher stability with the increase in the number of nodes, while FHIRChain fluctuates significantly. Specifically, in the case of 25 nodes, the audit trail generation rate of VS-PBFT is 42.14% higher than that of FHIRChain, and the generation time is 29.60% lower.

5. Conclusions

5.1. Research Summary

In this paper, we propose the consensus optimization algorithm VS-PBFT based on a verifiable random function and reputation mechanism for distributed intelligent medical diagnosis collaboration systems. The algorithm breaks through the performance bottleneck of the traditional PBFT in large-scale networks by combining reputation evaluation and VRF random node selection. The experimental results show that VS-PBFT significantly outperforms traditional algorithms in terms of transaction throughput, latency, network security, communication efficiency, and reputation management. Its dynamic update of node weights can effectively curb malicious behaviors, and the optimized message propagation and view switching strategy reduces redundant communication while realizing a balanced distribution of node reputation to ensure stable operation of the system, thus providing efficient and reliable consensus support for intelligent medical diagnosis collaboration systems.

5.2. Limitations and Future Work

Although the VS-PBFT algorithm showed excellent performance in this study, large-scale scaling in a multi-hospital network still faces certain challenges, such as coordination overhead due to heterogeneity among nodes and cross-institutional data privacy protection. In addition, the current system has not yet been deployed and validated in a real clinical environment, and in-depth research in conjunction with the regulatory approval process is needed in the future. We also fully recognize the importance of collaborating with medical professionals to conduct case studies, and our future work will focus on conducting joint research with clinical partners to promote a pilot application and field validation of the system in real medical scenarios. On the other hand, the reputation mechanism has a cold start problem, and the lack of effective historical data support for new nodes at the initial stage may affect the system’s decision-making efficiency. To address this limitation, subsequent work can introduce a reputation cross-validation extension mechanism based on federated learning, in which each institution locally scores the behavior of nodes and shares the parameters of encrypted models to achieve collaborative cross-organizational reputation updating, which will enhance the accurate assessment of node reputation while protecting privacy, and thus further improve the system’s scalability and adaptability in complex and heterogeneous healthcare environments.

Author Contributions

The authors confirm their contributions to the paper as follows: study conception and design: S.L. and Y.Z. (Yang Zhang); software development: S.L.; analysis and interpretation of results: S.L.; draft preparation: S.L.; manuscript guidance: Y.Z. (Yang Zhang) and Y.Z. (Yating Zhao). All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Postdoctoral Fellowship Program of CPSF (grant number GZC20240925), the China Postdoctoral Science Foundation (grant number 2024M751855), the Shandong Postdoctora1 Science Foundation (grant number SDCXRS-202400018), and the Qingdao Postdoctoral Project (project number QDBSH20240102189).

Data Availability Statement

The files are open-sourced and stored in a code repository, which can be accessed via the following link: https://github.com/ZDQCDB/VS-PBFT-main/tree/master (accessed on 25 April 2025).

Acknowledgments

The authors would like to thank the researchers at Shandong University of Science and Technology for their valuable discussions during this research.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 April 2025).
  2. Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the IEEE International Congress on Big Data, Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar]
  3. Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
  4. Lamport, L.; Shostak, R.; Pease, M. The Byzantine Generals Problem. In Concurrency: The Works of Leslie Lamport; Association for Computing Machinery: New York, NY, USA, 2019; pp. 203–226. [Google Scholar]
  5. Sousa, J.; Bessani, A.; Vukolić, M. A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Naples, Italy, 23–26 June 2018; pp. 51–58. [Google Scholar]
  6. Chen, L.; Xu, L.; Shah, N.; Gao, Z.; Lu, Y.; Shi, W. On Security Analysis of Proof-of-Elapsed-Time (PoET). In Proceedings of the International Symposium on Stabilization, Safety, and Security of Distributed Systems, Boston, MA, USA, 5–8 November 2017; pp. 282–297. [Google Scholar]
  7. Ekparinya, P.; Gramoli, V.; Jourjon, G. The Attack of the Clones Against Proof-of-Authority. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2019. [Google Scholar]
  8. Cai, S.; Han, T.; Wang, Y.; Zhang, H. Study of Blockchain’s Consensus Mechanism Based on Score: An Improved Consensus Mechanism. IET Blockchain 2021, 1, 41–55. [Google Scholar] [CrossRef]
  9. Micali, S.; Rabin, M.; Vadhan, S. Verifiable Random Functions. In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science, New York, NY, USA, 17–19 October 1999; pp. 120–130. [Google Scholar]
  10. Gilad, Y.; Hemo, R.; Micali, S.; Vlachos, G.; Zeldovich, N. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), Shanghai, China, 29–31 October 2017; pp. 51–68. [Google Scholar]
  11. Hanke, T.; Movahedi, M.; Williams, D. DFINITY Technology Overview Series, Consensus System. arXiv 2018, arXiv:1805.04548. [Google Scholar]
  12. Hoffman, K.; Zage, D.; Nita-Rotaru, C. A Survey of Attack and Defense Techniques for Reputation Systems. ACM Comput. Surv. 2009, 42, 1–31. [Google Scholar] [CrossRef]
  13. Kamvar, S.D.; Schlosser, M.T.; Garcia-Molina, H. The Eigentrust Algorithm for Reputation Management in P2P Networks. In Proceedings of the International Conference on World Wide Web (WWW), Budapest, Hungary, 20–24 May 2003; pp. 640–651. [Google Scholar]
  14. Jøsang, A.; Ismail, R.; Boyd, C. A survey of trust and reputation systems for online service provision. Decis Support Syst. 2007, 43, 618–644. [Google Scholar] [CrossRef]
  15. Yang, Z.; Yang, K.; Lei, L.; Zheng, K.; Leung, V.C. Blockchain-Based Decentralized Trust Management in Vehicular Networks. IEEE Internet Things J. 2018, 6, 1495–1505. [Google Scholar] [CrossRef]
  16. U.S. Department of Health and Human Services. Summary of the HIPAA Privacy Rule. Available online: https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/general-overview/index.html (accessed on 26 April 2025).
  17. European Data Protection Board. EDPB Adopts Guidelines on Processing Personal Data Through Blockchains, April 2025. Available online: https://edpb.europa.eu (accessed on 26 April 2025).
  18. Nunes, T.; Rupino da Cunha, P. Reflections about Blockchain in Health Data Sharing: Navigating a Disruptive Technology. Digital Health 2024, 10, 230. [Google Scholar] [PubMed Central]
  19. Croman, K.; Decker, C.; Eyal, I.; Gencer, A.E.; Juels, A.; Kosba, A.; Wattenhofer, R. On Scaling Decentralized Blockchains. In Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research; Springer: Berlin/Heidelberg, Germany, 2016; pp. 106–125. [Google Scholar]
  20. Xie, M.; Liu, J.; Chen, S.; Lin, M. A Survey on Blockchain Consensus Mechanism: Research Overview, Current Advances and Future Directions. Int. J. Intell. Comput. Cybern. 2023, 16, 314–340. [Google Scholar] [CrossRef]
  21. Barreno, M.; Nelson, B.; Joseph, A.D.; Tygar, J.D. The security of machine learning. Mach. Learn. 2010, 81, 121–148. [Google Scholar] [CrossRef]
  22. Goodfellow, I.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. arXiv 2014, arXiv:1412.6572. [Google Scholar]
  23. Lei, K.; Zhang, Q.; Xu, L.; Qi, Z. Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain. In Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Singapore, 11–13 December 2018; pp. 604–611. [Google Scholar]
  24. Chen, J.; Zhang, X.; Shangguan, P. Improved PBFT Algorithm Based on Reputation and Voting Mechanism. Proc. J. Phys. Conf. Ser. 2020, 1486, 032023. [Google Scholar] [CrossRef]
  25. Wang, T.; Guo, J.; Ai, S.; Cao, J. RBT: A Distributed Reputation System for Blockchain-Based Peer-to-Peer Energy Trading with Fairness Consideration. Appl. Energy 2021, 295, 117056. [Google Scholar] [CrossRef]
  26. Gu, R.; Chen, B.; Huang, D. Primary Node Selection Algorithm of PBFT Based on Anomaly Detection and Reputation Model. In Proceedings of the 11th International Conference on Computer Engineering and Networks, Beijing, China, 9–11 December 2022; Springer: Singapore, 2022; pp. 1613–1622. [Google Scholar]
  27. Biggio, B.; Corona, I.; Maiorca, D.; Nelson, B.; Šrndić, N.; Laskov, P.; Giacinto, G.; Roli, F. Evasion attacks against machine learning at test time. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Prague, Czech Republic, 23–27 September 2013; pp. 387–402. [Google Scholar]
  28. Niu, K.; Yao, Z.; Si, X. Improved PBFT Consensus Algorithm Based on Reputation Value for IoT. In Proceedings of the 4th International Conference on Blockchain Technology and Information Security (ICBCTIS), Wuhan, China, 17–19 August 2024; IEEE: New York, NY, USA, 2024; pp. 185–190. [Google Scholar]
  29. Gura, N.; Patel, A.; Wander, A.; Eberle, H.; Shantz, S.C. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems (CHES), Cambridge, MA, USA, 11–13 August 2004; pp. 119–132. [Google Scholar]
  30. Cascudo, I.; David, B. SCRAPE: Scalable Randomness Attested by Public Entities. In Proceedings of the International Conference on Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3–7 December 2017; Springer: Cham, Switzerland, 2017; pp. 3–32. [Google Scholar]
  31. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Yellick, J. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In Proceedings of the 13th EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
  32. Kietzmann, P.; Schmidt, T.C.; Wählisch, M. A guideline on pseudorandom number generation (PRNG) in the IoT. arXiv 2020, arXiv:2007.11839. [Google Scholar] [CrossRef]
  33. Seo, H.; Azarderakhsh, R. Efficient Curve448 on Cortex-M4. IACR Cryptology ePrint Archive. Report 2021/1355, 2021. Available online: https://eprint.iacr.org/2021/1355 (accessed on 25 April 2025).
  34. Zhang, Q.; Wang, S.; Zhang, D.; Wang, J.; Sun, J. FortunChain: EC-VRF-Based Scalable Blockchain System for Realizing State Sharding. IEEE Trans. Netw. Serv. Manag. 2023, 20, 4340–4353. [Google Scholar] [CrossRef]
  35. Jiang, C.; Guo, C.; Shan, C.; Zhang, Y. VPBFT: Improved PBFT Consensus Algorithm Based on VRF and PageRank Algorithm. In Proceedings of the International Conference on Blockchain and Trustworthy Systems, Haikou, China, 8–10 August 2023; Springer Nature: Singapore, 2023; pp. 237–251. [Google Scholar]
  36. Chen, P.; Chen, Y.; Tan, C.; Yang, Y.; Li, B.; Huang, J. Slicing PBFT Consensus Algorithm Based on VRF. In Proceedings of the IEEE International Conference on Blockchain, Copenhagen, Denmark, 19–22 August 2024; IEEE: New York, NY, USA, 2024; pp. 569–574. [Google Scholar]
  37. Benet, J. IPFS—Content Addressed, Versioned, P2P File System. arXiv 2014, arXiv:1407.3561. [Google Scholar]
  38. Pass, R.; Seeman, L.; Shelat, A. Analysis of the Blockchain Protocol in Asynchronous Networks. In Advances in Cryptology—EUROCRYPT 2017, Proceedings 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, 30 April–4 May 2017; Springer: Cham, Switzerland, 2017; pp. 643–673. [Google Scholar]
Figure 1. System model diagram.
Figure 1. System model diagram.
Electronics 14 02020 g001
Figure 2. Algorithm flowchart.
Figure 2. Algorithm flowchart.
Electronics 14 02020 g002
Figure 3. Sketch of security proofing based on VRF.
Figure 3. Sketch of security proofing based on VRF.
Electronics 14 02020 g003
Figure 4. Average transaction latency.
Figure 4. Average transaction latency.
Electronics 14 02020 g004
Figure 5. Transaction throughput.
Figure 5. Transaction throughput.
Electronics 14 02020 g005
Figure 6. Average replica vs. rounds.
Figure 6. Average replica vs. rounds.
Electronics 14 02020 g006
Figure 7. Average replica vs. nodes.
Figure 7. Average replica vs. nodes.
Electronics 14 02020 g007
Figure 8. Overhead vs. nodes.
Figure 8. Overhead vs. nodes.
Electronics 14 02020 g008
Figure 9. Overhead vs. rounds.
Figure 9. Overhead vs. rounds.
Electronics 14 02020 g009
Figure 10. Credibility vs. nodes.
Figure 10. Credibility vs. nodes.
Electronics 14 02020 g010
Figure 11. Credibility vs. rounds.
Figure 11. Credibility vs. rounds.
Electronics 14 02020 g011
Figure 12. Successful DOS attack vs. number of nodes.
Figure 12. Successful DOS attack vs. number of nodes.
Electronics 14 02020 g012
Figure 13. Audit speed metrics vs. number of nodes.
Figure 13. Audit speed metrics vs. number of nodes.
Electronics 14 02020 g013
Table 1. Comparison of different algorithms under various indicators.
Table 1. Comparison of different algorithms under various indicators.
Evaluation MetricVS-PBFTPBFTGR-PBFTNAC-PBFTPOWPOS
High Transaction Throughput××
Low Transaction Latency×××
Good Scalability×××
Strong Security×××
High Fault Tolerance×××
Low Resource Consumption×××
Low Communication Overhead×××
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, S.; Zhang, Y.; Zhao, Y. Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms. Electronics 2025, 14, 2020. https://doi.org/10.3390/electronics14102020

AMA Style

Liu S, Zhang Y, Zhao Y. Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms. Electronics. 2025; 14(10):2020. https://doi.org/10.3390/electronics14102020

Chicago/Turabian Style

Liu, Shizhuang, Yang Zhang, and Yating Zhao. 2025. "Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms" Electronics 14, no. 10: 2020. https://doi.org/10.3390/electronics14102020

APA Style

Liu, S., Zhang, Y., & Zhao, Y. (2025). Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms. Electronics, 14(10), 2020. https://doi.org/10.3390/electronics14102020

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop