On the Security of the Blockchain Technology

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Network Science".

Deadline for manuscript submissions: 31 October 2024 | Viewed by 3225

Special Issue Editor


E-Mail Website
Guest Editor
1. EPITA School of Engineering, 94270 Le Kremlin-Bicetre, France
2. Computer Science Department, New York University, 57 Bd Saint-Germain, 75005 Paris, France
Interests: security; cloud computing; network security; blockchain; information security; computer networks security; IT security; network communication; cyber security; wireless security; wireless computing

Special Issue Information

Dear Colleagues,

Blockchain technology was designed to enable decentralized and secure crypto-currency.

Numerous studies have explored the features of blockchains, such as scalability, resiliency, decentralization, reliability, and immutability in different use cases. Hence, blockchains are becoming a cornerstone for the development and deployment of other technologies such as decentralized applications (Dapp), the Internet of Things (IoT), digital supply chains (DSCs), cooperative intelligent transportation systems (C-ITSs), federated learning (FL), and many others.

Blockchain is still a growing technology, and it has the potential to disrupt numerous technologies in the future. However, as an evolving technology, it is suffering from many setbacks; the most severe are from the security perspective.

This Special Issue calls for research contributions on how blockchains can ensure the security of systems and environments, and the different security issues related to blockchain-based technologies and architectures. More precisely, the topics of interests in this Special Issue include, but are not limited to:

  • Blockchain-based approaches for the security of IT systems;
  • Blockchain-based approaches for intrusion detection;
  • Blockchain issues and trends;
  • Blockchain privacy;
  • Blockchain new design;
  • Cryptocurrency fraud;
  • Cryptocurrency fraud detection;
  • Smart contracts for the security of IT systems;
  • Smart contracts privacy and security issues.

Dr. Badis Hammi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • blockchain
  • security
  • blockchain-based security
  • cryptography
  • crypto-currency
  • fraud
  • IoT security

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

19 pages, 1103 KiB  
Review
A Quantum-Resistant Blockchain System: A Comparative Analysis
by P. Thanalakshmi, A. Rishikhesh, Joel Marion Marceline, Gyanendra Prasad Joshi and Woong Cho
Mathematics 2023, 11(18), 3947; https://doi.org/10.3390/math11183947 - 17 Sep 2023
Cited by 6 | Viewed by 2608
Abstract
Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantum signatures are required to preserve integrity and reliability. Furthermore, combining the [...] Read more.
Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantum signatures are required to preserve integrity and reliability. Furthermore, combining the InterPlanetary File System (IPFS) with blockchain provides a long-term strategy for data storage and sharing. This study investigates the integration of post-quantum signatures with the IPFS in a blockchain system, which can considerably enhance blockchain system efficiency. We increase security and efficiency by recording hash values of signatures and public keys within the blockchain and storing their actual content using the IPFS. The study compares NIST-recommended post-quantum signatures with the ECDSA in a Bitcoin exchange scheme to show how effective the system is in countering quantum threats while maintaining optimal performance. This research makes an important addition to the long-term viability and dependability of blockchain technology in the face of the growing landscape of quantum computing breakthroughs. Full article
(This article belongs to the Special Issue On the Security of the Blockchain Technology)
Show Figures

Figure 1

Back to TopTop