{"id":"https://openalex.org/W7104914132","doi":"https://doi.org/10.1109/tce.2025.3631827","title":"Blockchain-Enabled Quantum Signature Scheme for Securing Consumer Electronics-Centric IoT Networks","display_name":"Blockchain-Enabled Quantum Signature Scheme for Securing Consumer Electronics-Centric IoT Networks","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7104914132","doi":"https://doi.org/10.1109/tce.2025.3631827"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3631827","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3631827","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sunil Prajapat","orcid":"https://orcid.org/0000-0001-9343-5182"},"institutions":[{"id":"https://openalex.org/I3132999081","display_name":"Marwadi University","ror":"https://ror.org/030dn1812","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132999081"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sunil Prajapat","raw_affiliation_strings":["Department of Computer Engineering-AI &#x0026; Big Data, Marwadi University, Rajkot, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering-AI &#x0026; Big Data, Marwadi University, Rajkot, India","institution_ids":["https://openalex.org/I3132999081"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Seong Oun Hwang","orcid":"https://orcid.org/0000-0003-4240-6255"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seong Oun Hwang","raw_affiliation_strings":["Department of Computer Engineering, Gachon University, Seongnam-si, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Gachon University, Seongnam-si, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]}]},{"author_position":"last","author":{"id":null,"display_name":"M. Shamim Hossain","orcid":"https://orcid.org/0000-0001-5906-9422"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"M. Shamim Hossain","raw_affiliation_strings":["Research Chair of Pervasive and Mobile Computing, Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Research Chair of Pervasive and Mobile Computing, Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I3132999081"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77651735,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1904","last_page":"1914"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.2012999951839447,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.2012999951839447,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.18799999356269836,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13052","display_name":"Molecular Communication and Nanonetworks","score":0.12449999898672104,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5889999866485596},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5403000116348267},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4659999907016754},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.43389999866485596},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4172999858856201},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4059000015258789},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.3971000015735626},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.3822000026702881},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3797999918460846}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7494999766349792},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5889999866485596},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5403000116348267},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5382000207901001},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4659999907016754},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.43389999866485596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4246000051498413},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4172999858856201},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4059000015258789},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3971000015735626},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3856000006198883},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3797999918460846},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3797000050544739},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.373199999332428},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3492000102996826},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.3310000002384186},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3230000138282776},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.2937999963760376},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2563999891281128},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.25529998540878296},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.25130000710487366},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25110000371932983}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3631827","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3631827","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.641315758228302}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,91,142,165],"rapid":[1],"proliferation":[2],"of":[3,6,15,36,50,62,119,152,158,174],"Consumer-Centric":[4],"Internet":[5],"Things":[7],"(CCIoT)":[8],"devices":[9],"has":[10],"resulted":[11],"in":[12,131],"massive":[13],"volumes":[14],"data":[16,84],"being":[17],"generated":[18],"and":[19,23,29,86,108,113,125,140,155,172],"transmitted":[20],"across":[21],"edge":[22],"cloud":[24],"infrastructures.":[25],"However,":[26],"limited":[27],"computational":[28,150],"memory":[30],"resources,":[31],"coupled":[32],"with":[33],"the":[34,48,60,117,120,134,168],"vulnerabilities":[35],"open":[37],"communication":[38,156],"networks,":[39],"expose":[40],"CCIoT":[41,67,89,185],"ecosystems":[42],"to":[43,81],"severe":[44],"security":[45,111,181],"threats.":[46],"With":[47],"advent":[49],"quantum":[51,63,126,136,180],"computing,":[52],"traditional":[53],"cryptographic":[54],"schemes":[55],"risk":[56],"becoming":[57],"obsolete,":[58],"necessitating":[59],"integration":[61],"cryptography":[64],"into":[65],"edge-assisted":[66],"protocols.":[68],"In":[69],"this":[70],"paper,":[71],"we":[72],"propose":[73],"a":[74,94,149,178],"blockchain-enabled":[75],"quantum-designated":[76],"verifier":[77],"signature":[78,137],"protocol":[79,92,138],"designed":[80],"ensure":[82],"secure":[83],"transmission":[85],"storage":[87],"within":[88],"networks.":[90],"leverages":[93],"private":[95],"blockchain,":[96],"where":[97],"peer":[98],"nodes":[99],"generate":[100],"blocks":[101],"from":[102],"service-provider":[103],"data,":[104],"thereby":[105],"enhancing":[106],"confidentiality":[107],"integrity.":[109],"Informal":[110],"verification":[112],"informal":[114],"analysis":[115],"confirm":[116],"robustness":[118],"scheme":[121],"against":[122],"both":[123],"classical":[124],"adversaries.":[127],"Extensive":[128],"experiments,":[129],"implemented":[130],"Python,":[132],"evaluate":[133],"proposed":[135],"theoretically":[139],"practically.":[141],"results":[143],"demonstrate":[144],"strong":[145],"encryption":[146],"performance,":[147],"achieving":[148],"cost":[151],"41.5":[153],"ms":[154],"overhead":[157],"834":[159],"bits,":[160],"outperforming":[161],"recent":[162],"benchmark":[163],"schemes.":[164],"findings":[166],"highlight":[167],"superior":[169],"reliability,":[170],"scalability,":[171],"efficiency":[173],"our":[175],"approach,":[176],"offering":[177],"viable":[179],"solution":[182],"for":[183],"future":[184],"ecosystems.":[186]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-12T00:00:00"}
