{"id":"https://openalex.org/W4416366477","doi":"https://doi.org/10.1109/tce.2025.3635021","title":"Post-Quantum Traceable Anonymous Cross-Domain Authentication for Blockchain-Based IoT","display_name":"Post-Quantum Traceable Anonymous Cross-Domain Authentication for Blockchain-Based IoT","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416366477","doi":"https://doi.org/10.1109/tce.2025.3635021"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3635021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3635021","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091354942","display_name":"Deepak Kumar Khare","orcid":"https://orcid.org/0000-0003-4484-5374"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Deepak Kumar Khare","raw_affiliation_strings":["Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, M.P., India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]},{"raw_affiliation_string":"Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, M.P., India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031637260","display_name":"Dharmendra Dangi","orcid":"https://orcid.org/0000-0003-1531-024X"},"institutions":[{"id":"https://openalex.org/I176010741","display_name":"Indian Institute of Forest Management","ror":"https://ror.org/00jet1p36","country_code":"IN","type":"education","lineage":["https://openalex.org/I176010741"]},{"id":"https://openalex.org/I288749910","display_name":"Indian Institute of Science Education and Research, Bhopal","ror":"https://ror.org/02rb21j89","country_code":"IN","type":"education","lineage":["https://openalex.org/I288749910"]},{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dharmendra Dangi","raw_affiliation_strings":["Department of Information Technology, Indian Institute of Information Technology (IIIT), Bhopal, Madhya Pradesh, India","Department of Information Technology, Maulana Azad National Institute of TechnologyIndian Institute of Information Technology (IIIT), Bhopal, M.P., India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Indian Institute of Information Technology (IIIT), Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I288749910","https://openalex.org/I176010741"]},{"raw_affiliation_string":"Department of Information Technology, Maulana Azad National Institute of TechnologyIndian Institute of Information Technology (IIIT), Bhopal, M.P., India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019342905","display_name":"Amit Bhagat","orcid":"https://orcid.org/0000-0003-3704-2469"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Bhagat","raw_affiliation_strings":["Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, M.P., India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]},{"raw_affiliation_string":"Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, M.P., India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068141840","display_name":"Sunil Malviya","orcid":"https://orcid.org/0000-0001-6491-0431"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sunil Malviya","raw_affiliation_strings":["Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, M.P., India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I91277730"]},{"raw_affiliation_string":"Department of Mathematics Bioinformatics and Computer Applications, Maulana Azad National Institute of Technology, Bhopal, M.P., India","institution_ids":["https://openalex.org/I91277730"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071999923","display_name":"Dheeraj Kumar Dixit","orcid":null},"institutions":[{"id":"https://openalex.org/I191366470","display_name":"ITM University","ror":"https://ror.org/004pc5924","country_code":"IN","type":"education","lineage":["https://openalex.org/I191366470"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dheeraj Kumar Dixit","raw_affiliation_strings":["Department of Computer Science and Engineering, Madhav Institute of Science and Technology (Deemed University), Gwalior, India","Department of Computer Science and Engineering, Madhav Institute of Science and Technology, Deemed University, Gwalior, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Madhav Institute of Science and Technology (Deemed University), Gwalior, India","institution_ids":["https://openalex.org/I191366470"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Madhav Institute of Science and Technology, Deemed University, Gwalior, India","institution_ids":["https://openalex.org/I191366470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091354942"],"corresponding_institution_ids":["https://openalex.org/I91277730"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.48653763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1836","last_page":"1845"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.39739999175071716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.39739999175071716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.195700004696846,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.10450000315904617,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.580299973487854},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4984999895095825},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.453000009059906},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4350999891757965},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4246000051498413},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4129999876022339},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4129999876022339},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.3885999917984009},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.37369999289512634},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.35280001163482666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8008000254631042},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6787999868392944},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.580299973487854},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4984999895095825},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.453000009059906},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4350999891757965},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4246000051498413},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4129999876022339},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4129999876022339},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3885999917984009},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.37369999289512634},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.35280001163482666},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.3456999957561493},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3452000021934509},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.31610000133514404},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.31450000405311584},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.31290000677108765},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.31150001287460327},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3084000051021576},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.3012000024318695},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.29420000314712524},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.29019999504089355},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.2791999876499176},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2777000069618225},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.27219998836517334},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.2721000015735626},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2687999904155731},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.25450000166893005},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.25380000472068787},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3635021","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3635021","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2890851917","https://openalex.org/W2922452168","https://openalex.org/W2952334088","https://openalex.org/W2979253248","https://openalex.org/W3089076483","https://openalex.org/W3120302498","https://openalex.org/W3148186433","https://openalex.org/W3173693125","https://openalex.org/W3203334519","https://openalex.org/W4210421291","https://openalex.org/W4380839239","https://openalex.org/W4388240306","https://openalex.org/W4394744117","https://openalex.org/W4394862690","https://openalex.org/W4395014386","https://openalex.org/W4395447360","https://openalex.org/W4399585033","https://openalex.org/W4399728471","https://openalex.org/W4401786227","https://openalex.org/W4404843630","https://openalex.org/W4405786479","https://openalex.org/W4405844796","https://openalex.org/W4407364004","https://openalex.org/W4409236131","https://openalex.org/W4410091085","https://openalex.org/W4410359322","https://openalex.org/W4410639375","https://openalex.org/W4411446615","https://openalex.org/W4411465461"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,48,153,166,180],"proliferation":[2],"of":[3,5,50,142],"Internet":[4],"Things":[6],"(IoT)":[7],"applications,":[8],"secure":[9],"and":[10,79,111,140,148,158,176],"efficient":[11],"cross-domain":[12,19,66],"information":[13],"sharing":[14],"has":[15],"become":[16],"essential.":[17],"Traditional":[18],"authentication":[20,67,181],"approaches":[21],"that":[22],"rely":[23],"on":[24,70],"real":[25,132],"device":[26,138],"identities":[27,95],"pose":[28],"significant":[29],"privacy":[30,139],"risks,":[31],"while":[32],"fully":[33],"anonymous":[34,65],"schemes":[35],"often":[36],"lack":[37],"accountability":[38],"for":[39,116],"malicious":[40,143],"behavior.":[41],"Additionally,":[42],"emerging":[43],"quantum":[44,87],"computing":[45],"capabilities":[46],"threaten":[47],"security":[49,146,172],"classical":[51,157,164],"cryptographic":[52],"systems.":[53],"To":[54],"address":[55],"these":[56],"challenges,":[57],"this":[58],"paper":[59],"proposes":[60],"a":[61,123],"post-quantum":[62,98,171],"secure,":[63],"traceable":[64],"scheme":[68,74,168],"based":[69],"blockchain":[71],"technology.":[72],"The":[73,134],"incorporates":[75],"lattice-based":[76],"certificateless":[77],"cryptography":[78],"quantum-resistant":[80],"hash":[81],"functions":[82],"to":[83,107],"ensure":[84],"resilience":[85],"against":[86,156],"attacks.":[88],"Devices":[89],"are":[90,114],"assigned":[91],"multiple":[92],"unlinkable":[93],"pseudonymous":[94],"with":[96,162,173],"corresponding":[97],"public-private":[99],"key":[100,124],"pairs.":[101],"A":[102],"dynamic":[103],"accumulator":[104],"is":[105],"employed":[106],"update":[108],"domain":[109],"information,":[110],"distinct":[112],"pseudonyms":[113],"used":[115],"each":[117],"authentication.":[118],"Cross-domain":[119],"credentials":[120],"issued":[121],"by":[122],"generation":[125],"center":[126],"enable":[127],"identity":[128],"verification":[129],"without":[130],"exposing":[131],"identities.":[133],"system":[135],"ensures":[136],"both":[137],"traceability":[141],"actors.":[144],"Formal":[145],"proofs":[147],"BAN":[149],"logic":[150],"analysis":[151],"confirm":[152],"scheme\u2019s":[154],"robustness":[155],"quantum-era":[159],"threats.":[160],"Compared":[161],"existing":[163],"approaches,":[165],"proposed":[167],"achieves":[169],"strong":[170],"reduced":[174],"computational":[175],"communication":[177],"overhead":[178],"during":[179],"process.":[182]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-19T00:00:00"}
