{"id":"https://openalex.org/W7077851724","doi":"https://doi.org/10.48550/arxiv.2508.17071","title":"Post-Quantum Blockchain: Challenges and Opportunities","display_name":"Post-Quantum Blockchain: Challenges and Opportunities","publication_year":2025,"publication_date":"2025-08-23","ids":{"openalex":"https://openalex.org/W7077851724","doi":"https://doi.org/10.48550/arxiv.2508.17071"},"language":"en","primary_location":{"id":"doi:10.48550/arxiv.2508.17071","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.17071","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2508.17071","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Al-Janabi, Sufyan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Al-Janabi, Sufyan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6434000134468079,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.6434000134468079,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.025100000202655792,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14311","display_name":"Electrical and Electromagnetic Research","score":0.021199999377131462,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7472000122070312},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6603000164031982},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5608000159263611},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5582000017166138},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5307000279426575},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4586000144481659},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.44940000772476196},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.3865000009536743},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3853999972343445}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7472000122070312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6973999738693237},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6603000164031982},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.588100016117096},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5608000159263611},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5582000017166138},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5307000279426575},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4586000144481659},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.44940000772476196},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.3865000009536743},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3853999972343445},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.3467000126838684},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.33219999074935913},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3301999866962433},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3181000053882599},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.30640000104904175},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C78203541","wikidata":"https://www.wikidata.org/wiki/Q2566969","display_name":"BB84","level":5,"score":0.2849000096321106},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.28459998965263367},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.28349998593330383},{"id":"https://openalex.org/C515488857","wikidata":"https://www.wikidata.org/wiki/Q936407","display_name":"Financial cryptography","level":4,"score":0.2802000045776367},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.27959999442100525},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.2761000096797943},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.2685000002384186},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.26030001044273376}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2508.17071","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.17071","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2508.17071","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.17071","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Blockchain":[0,26],"is":[1,100],"a":[2,62,101],"Distributed":[3],"Ledger":[4],"Technology":[5],"(DLT)":[6],"that":[7],"offers":[8],"numerous":[9],"benefits":[10],"including":[11],"decentralization,":[12],"transparency,":[13],"efficiency,":[14],"and":[15,34,49,73,88,135,151],"reduced":[16],"costs.":[17],"Hence,":[18],"blockchain":[19,68,133,143],"has":[20,51],"been":[21],"included":[22],"in":[23,93,114,157],"many":[24,39,56],"fields.":[25],"relies":[27],"on":[28,131,139,148],"cryptographic":[29],"protocols":[30],"(especially":[31],"public-key":[32],"cryptography":[33],"hash":[35],"functions)":[36],"to":[37,111,123,142],"achieve":[38],"essential":[40],"sub-routines.":[41],"However,":[42],"the":[43,53,66,74,94,125,149],"increased":[44],"progress":[45],"of":[46,55,153],"quantum":[47,91,107,129],"computation":[48],"algorithms":[50,92],"threatened":[52],"security":[54,141],"traditional":[57],"cryptosystems.":[58],"Therefore,":[59],"this":[60,120,158],"represents":[61],"serious":[63],"risk":[64],"for":[65,104],"existing":[67],"technology.":[69],"For":[70],"example,":[71],"SHA-256":[72],"Elliptic":[75],"Curve":[76],"Digital":[77],"Signature":[78],"Algorithm":[79],"(ECDSA)":[80],"cryptosystems":[81],"can":[82],"be":[83],"compromised":[84],"by":[85,128],"Shor":[86],"s":[87,90],"Grover":[89],"foreseeable":[95],"future.":[96],"Post-Quantum":[97,116],"Cryptography":[98],"(PQC)":[99],"basic":[102],"solution":[103],"resisting":[105],"these":[106],"attacks.":[108],"Applying":[109],"PQC":[110],"blockchains":[112],"results":[113],"creating":[115],"Blockchains":[117],"(PQB).":[118],"Thus,":[119],"paper":[121,146],"aims":[122],"review":[124],"threats":[126],"imposed":[127],"computers":[130],"classical":[132],"technology":[134],"provide":[136],"useful":[137],"guidelines":[138],"PQB":[140],"researchers.":[144],"The":[145],"focuses":[147],"challenges":[150],"opportunities":[152],"future":[154],"work":[155],"direction":[156],"field.":[159]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
