{"id":"https://openalex.org/W7084050309","doi":"https://doi.org/10.1109/icbc64466.2025.11114696","title":"Towards Building Post-Quantum Secure Ethereum","display_name":"Towards Building Post-Quantum Secure Ethereum","publication_year":2025,"publication_date":"2025-06-02","ids":{"openalex":"https://openalex.org/W7084050309","doi":"https://doi.org/10.1109/icbc64466.2025.11114696"},"language":"en","primary_location":{"id":"doi:10.1109/icbc64466.2025.11114696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc64466.2025.11114696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Howell Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Howell Liu","raw_affiliation_strings":["Imperial College London,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Imperial College London,United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zhipeng Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zhipeng Wang","raw_affiliation_strings":["Imperial College London,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Imperial College London,United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"last","author":{"id":null,"display_name":"William Knottenbelt","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"William Knottenbelt","raw_affiliation_strings":["Imperial College London,United Kingdom"],"affiliations":[{"raw_affiliation_string":"Imperial College London,United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.59004075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T13141","display_name":"Statistical Methods and Applications","score":0.018200000748038292,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13141","display_name":"Statistical Methods and Applications","score":0.018200000748038292,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12946","display_name":"Fractal and DNA sequence analysis","score":0.016200000420212746,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13297","display_name":"History and advancements in chemistry","score":0.01360000018030405,"subfield":{"id":"https://openalex.org/subfields/1606","display_name":"Physical and Theoretical Chemistry"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6697999835014343},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6035000085830688},{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.451200008392334},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.4496000111103058},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.42730000615119934},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.41359999775886536},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.41130000352859497},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.40450000762939453}],"concepts":[{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6697999835014343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6165000200271606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6115000247955322},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6035000085830688},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.451200008392334},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.4496000111103058},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.42730000615119934},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.41359999775886536},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.41130000352859497},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.40450000762939453},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3822999894618988},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.35409998893737793},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34929999709129333},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.3393999934196472},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.32199999690055847},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.2994999885559082},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C124968333","wikidata":"https://www.wikidata.org/wiki/Q1465057","display_name":"Schnorr signature","level":5,"score":0.2856999933719635},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.2630999982357025},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.25949999690055847},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.25780001282691956}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icbc64466.2025.11114696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc64466.2025.11114696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/52e60b4b-ff3a-4c89-ae81-ca20ee7c18e5","is_oa":false,"landing_page_url":"https://research.manchester.ac.uk/en/publications/52e60b4b-ff3a-4c89-ae81-ca20ee7c18e5","pdf_url":null,"source":{"id":"https://openalex.org/S4306400662","display_name":"Research Explorer (The University of Manchester)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28407311","host_organization_name":"University of Manchester","host_organization_lineage":["https://openalex.org/I28407311"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Liu, H, Wang, Z & Knottenbelt, W 2025, Towards Building Post-Quantum Secure Ethereum. in 2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/icbc64466.2025.11114696","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.4060859680175781,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2167334956","https://openalex.org/W2895182117","https://openalex.org/W3000833961","https://openalex.org/W3023478445","https://openalex.org/W3150096732","https://openalex.org/W4387789909"],"related_works":[],"abstract_inverted_index":{"Public":[0],"blockchains,":[1],"such":[2],"as":[3],"Ethereum":[4,87,183],"and":[5,60,77,94,113,122,138],"Bitcoin,":[6],"use":[7],"the":[8,39,50,57,86,92,164],"Elliptic":[9],"Curve":[10],"Digital":[11],"Signature":[12],"Algorithm":[13],"(ECDSA),":[14],"specifically":[15],"Secp256k1,":[16],"to":[17,20,30,82,136],"enable":[18],"users":[19],"authenticate":[21],"transactions.":[22],"However,":[23],"this":[24,70,98,139],"cryptographic":[25,159],"system":[26],"is":[27,106],"relatively":[28],"vulnerable":[29],"quantum":[31,44],"attacks,":[32],"which":[33,161],"may":[34],"become":[35],"truly":[36],"feasible":[37],"in":[38,85,117,175],"next":[40],"few":[41],"years":[42],"through":[43],"computing":[45],"advances.":[46],"Existing":[47],"studies":[48],"recognize":[49],"importance":[51],"of":[52,62,97,151],"post-quantum":[53,63,78,146,179],"secure":[54,64,79,147],"signatures,":[55],"but":[56],"actual":[58],"implementation":[59],"transition":[61],"blockchains":[65],"still":[66],"require":[67],"further":[68,185],"investigation.In":[69],"work,":[71],"we":[72],"leverage":[73],"pk-FALCON512,":[74],"a":[75],"lattice-based":[76],"signature":[80,120,123,127],"scheme,":[81],"replace":[83],"Secp256k1":[84,116],"execution":[88],"client.":[89],"We":[90],"analyze":[91],"performance":[93],"storage":[95],"implications":[96],"replacement.":[99],"Our":[100],"evaluation":[101],"results":[102,172],"show":[103,173],"that":[104],"pk-FALCON512":[105,153],"approximately":[107,169],"23,000\u00d7":[108],",":[109],"28\u00d7":[110],"3\u00d7":[111],"slower,":[112],"times":[114],"than":[115],"key":[118],"generation,":[119,121],"verification,":[124,128],"respectively.":[125],"Specifically,":[126],"critical":[129],"for":[130,144,177,184],"on-chain":[131],"operations,":[132],"increases":[133],"from":[134],"24\u00b5s":[135],"74\u00b5s,":[137],"indicates":[140],"an":[141],"acceptable":[142],"trade-off":[143],"adopting":[145],"signatures.":[148],"In":[149],"terms":[150],"storage,":[152],"needs":[154],"15\u00d7":[155],"more":[156],"space":[157],"with":[158],"elements,":[160],"might":[162],"increase":[163],"average":[165],"block":[166],"size":[167],"by":[168],"3.85\u00d7.":[170],"These":[171],"feasibility":[174],"practice":[176],"integrating":[178],"cryptography":[180],"schemes":[181],"into":[182],"research.":[186]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
