Skip Content
You are currently on the new version of our website. Access the old version .

90 Results Found

  • Review
  • Open Access
2 Citations
3,910 Views
30 Pages

Theory and Applications of Quantum Hashing

  • Farid Ablayev,
  • Kamil Khadiev,
  • Alexander Vasiliev and
  • Mansur Ziiatdinov

We review recent results on quantum one-way functions, including quantum fingerprinting or quantum hashing (we use these two terms as synonyms even though they have very small difference). This includes the analysis of their properties, different mod...

  • Article
  • Open Access
6 Citations
1,567 Views
13 Pages

Hybrid Classical–Quantum Text Search Based on Hashing

  • Farid Ablayev,
  • Nailya Salikhova and
  • Marat Ablayev

14 June 2024

The paper considers the problem of finding a given substring in a text. It is known that the complexity of a classical search query in an unordered database is linear in the length of the text and a given substring. At the same time, Grover’s q...

  • Article
  • Open Access
6 Citations
2,768 Views
13 Pages

27 October 2022

Grover’s search algorithm accelerates the key search on the symmetric key cipher and the pre-image attack on the hash function. To conduct Grover’s search algorithm, the target cipher algorithm should be efficiently implemented in a quant...

  • Feature Paper
  • Article
  • Open Access
1 Citations
4,105 Views
20 Pages

An Analysis of Existing Hash-Based Post-Quantum Signature Schemes

  • Cristina Maria Pacurar,
  • Razvan Bocu and
  • Maksim Iavich

10 June 2025

The rapid development of quantum computing poses challenges to the foundations of traditional cryptography. The threats are significant in terms of both asymmetric cryptography (which exposes schemes like RSA and ECC to efficient attacks) and symmetr...

  • Review
  • Open Access
800 Views
18 Pages

18 December 2025

Hash tables embody a paradox of deterministic structure that emerges from controlled randomness. They have evolved from simple associative arrays into algorithmic engines that operate near the physical and probabilistic limits of computation. This re...

  • Article
  • Open Access
6 Citations
2,927 Views
23 Pages

A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates

  • Xiayu Wang,
  • Yineng Chen,
  • Xinghui Zhu,
  • Cheng Li and
  • Kui Fang

18 January 2024

Applying chameleon hash functions to redactable blockchains is still challenging work. Most redactable blockchain solutions using this technique have potential problems, such as too weak decentralization performance and trapdoors with exposure risks....

  • Article
  • Open Access
9 Citations
4,560 Views
14 Pages

Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1

  • Kunbolat Algazy,
  • Kairat Sakan,
  • Ardabek Khompysh and
  • Dilmukhanbet Dyusenbayev

16 January 2024

The distinguishing feature of hash-based algorithms is their high confidence in security. When designing electronic signature schemes, proofs of security reduction to certain properties of cryptographic hash functions are used. This means that if the...

  • Article
  • Open Access
4 Citations
2,442 Views
26 Pages

24 November 2022

In order to solve various security risks faced by image privacy protection, we propose a 3D cuboid image encryption scheme based on message-encoded controlled alternate quantum walks. Firstly, we calculated the initial parameters of the quantum syste...

  • Article
  • Open Access
13 Citations
8,293 Views
12 Pages

Developing a New Collision-Resistant Hashing Algorithm

  • Larissa V. Cherckesova,
  • Olga A. Safaryan,
  • Nikita G. Lyashenko and
  • Denis A. Korochentsev

4 August 2022

Today, cryptographic hash functions have numerous applications in different areas. At the same time, new collision attacks have been developed recently, making some widely used algorithms like SHA-1 vulnerable and unreliable. This article is aiming a...

  • Article
  • Open Access
6 Citations
4,285 Views
25 Pages

QUMA: Quantum Unified Medical Architecture Using Blockchain

  • Akoramurthy Balasubramaniam and
  • B. Surendiran

A significant increase in the demand for quality healthcare has resulted from people becoming more aware of health issues. With blockchain, healthcare providers may safely share patient information electronically, which is especially important given...

  • Article
  • Open Access
3 Citations
3,101 Views
11 Pages

High-Speed Variable Polynomial Toeplitz Hash Algorithm Based on FPGA

  • Si-Cheng Huang,
  • Shan Huang,
  • Hua-Lei Yin,
  • Qing-Li Ma and
  • Ze-Jie Yin

11 April 2023

In the Quantum Key Distribution (QKD) network, authentication protocols play a critical role in safeguarding data interactions among users. To keep pace with the rapid advancement of QKD technology, authentication protocols must be capable of process...

  • Article
  • Open Access
11 Citations
2,982 Views
20 Pages

10 August 2021

It is well known that conventional digital signature algorithms such as RSA and ECDSA are vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as post-quantum signature schemes in that it is possible to calculate the q...

  • Article
  • Open Access
2 Citations
2,225 Views
23 Pages

Post-Quantum Digital Signature: Verkle-Based HORST

  • Maksim Iavich,
  • Tamari Kuchukhidze and
  • Razvan Bocu

The security of commonly used cryptographic systems like RSA and ECC might be threatened by the future development of quantum computing. Verkle-based HORST decreases the size of signatures by 75% (from 12.8 KB to 3.2 KB) and enables O(1)-sized proofs...

  • Article
  • Open Access
11 Citations
4,036 Views
15 Pages

A Hash-Based Quantum-Resistant Chameleon Signature Scheme

  • P. Thanalakshmi,
  • R. Anitha,
  • N. Anbazhagan,
  • Woong Cho,
  • Gyanendra Prasad Joshi and
  • Eunmok Yang

16 December 2021

As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash...

  • Article
  • Open Access
955 Views
17 Pages

Ethernet Passive Mutual Authentication Scheme on Quantum Networks

  • Jianuo Tian,
  • Panke Qin,
  • Zongqu Zhao and
  • Baodong Qin

27 January 2025

In the context of increasing demand for secure and efficient communication networks, addressing the issue of mutual authentication in ethernet passive optical networks (EPONs) has become both valuable and practically significant. This paper proposes...

  • Article
  • Open Access
5 Citations
2,112 Views
25 Pages

Nowadays, quantum computing is developing at an unprecedented speed. This will pose a serious threat to the security of widely used public-key cryptosystems in the near future. Scientists are actively looking for ways to protect against quantum attac...

  • Article
  • Open Access
7 Citations
3,837 Views
15 Pages

Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH

  • Yujin Oh,
  • Kyungbae Jang,
  • Anubhab Baksi and
  • Hwajeong Seo

27 April 2024

Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to es...

  • Article
  • Open Access
1,942 Views
42 Pages

DGMT: A Fully Dynamic Group Signature from Symmetric-Key Primitives

  • Mojtaba Fadavi,
  • Sabyasachi Karati,
  • Aylar Erfanian and
  • Reihaneh Safavi-Naini

A group signature scheme allows a user to sign a message anonymously on behalf of a group and provides accountability by using an opening authority who can “open” a signature and reveal the signer’s identity. Group signature schemes...

  • Article
  • Open Access
97 Citations
5,937 Views
14 Pages

28 March 2019

The paper proposes a lossless quantum image encryption scheme based on substitution tables (S-box) scrambling, mutation operation and general Arnold transform with keys. First, the key generator builds upon the foundation of SHA-256 hash with plain-i...

  • Article
  • Open Access
7 Citations
3,073 Views
17 Pages

Syrga2: Post-Quantum Hash-Based Signature Scheme

  • Kunbolat Algazy,
  • Kairat Sakan,
  • Saule Nyssanbayeva and
  • Oleg Lizunov

This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures. The proposed Syrga2 scheme belongs to the class of multi-use signatures wit...

  • Article
  • Open Access
11 Citations
3,014 Views
12 Pages

A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme

  • P. Thanalakshmi,
  • R. Anitha,
  • N. Anbazhagan,
  • Chulho Park,
  • Gyanendra Prasad Joshi and
  • Changho Seo

11 May 2022

Digital signatures are unsuitable for specific applications that are sensitive on a personal or commercial level because they are universally verifiable. Jakobsson et al. proposed the Designated Verifier Signature (DVS) system, which only allows the...

  • Article
  • Open Access
1,988 Views
32 Pages

Post-Quantum Linkable Hash-Based Ring Signature Scheme for Off-Chain Payments in IoT

  • Linlin He,
  • Xiayi Zhou,
  • Dongqin Cai,
  • Xiao Hu and
  • Shuanggen Liu

18 July 2025

Off-chain payments in the Internet of Things (IoT) enhance the efficiency and scalability of blockchain transactions. However, existing privacy mechanisms face challenges, such as the disclosure of payment channels and transaction traceability. Addit...

  • Article
  • Open Access
20 Citations
3,403 Views
19 Pages

A Novel Blockchain and Bi-Linear Polynomial-Based QCP-ABE Framework for Privacy and Security over the Complex Cloud Data

  • Kranthi Kumar Singamaneni,
  • Kadiyala Ramana,
  • Gaurav Dhiman,
  • Saurabh Singh and
  • Byungun Yoon

2 November 2021

As a result of the limited resources available in IoT local devices, the large scale cloud consumer’s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy,...

  • Article
  • Open Access
10 Citations
15,147 Views
15 Pages

Quantum Bitcoin Mining

  • Robert Benkoczi,
  • Daya Gaur,
  • Naya Nagy,
  • Marius Nagy and
  • Shahadat Hossain

24 February 2022

This paper studies the effect of quantum computers on Bitcoin mining. The shift in computational paradigm towards quantum computation allows the entire search space of the golden nonce to be queried at once by exploiting quantum superpositions and en...

  • Review
  • Open Access
7 Citations
10,022 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

  • Article
  • Open Access
2 Citations
1,454 Views
25 Pages

Optimizing SPHINCS+ for Low-Power Devices

  • Alexander Magyari and
  • Yuhua Chen

29 August 2025

Different optimization techniques for the SHAKE variant of SPHINCS+ are explored on an FPGA with the means to find a power-efficient model for resource-constrained devices. This work explores multiple hashing implementations, such as registering inpu...

  • Article
  • Open Access
1,700 Views
26 Pages

23 September 2025

Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing. While the Ascon family, selected by the National Institute of Standards and...

  • Article
  • Open Access
1 Citations
1,323 Views
19 Pages

30 July 2024

In the current landscape where quantum algorithms pose a significant threat to conventional digital signature algorithms, code-based digital signature algorithms have emerged as the primary focus of ongoing research in post-quantum cryptography. Digi...

  • Article
  • Open Access
5 Citations
2,645 Views
15 Pages

Optimized Implementation and Analysis of CHAM in Quantum Computing

  • Yujin Yang,
  • Kyungbae Jang,
  • Anubhab Baksi and
  • Hwajeong Seo

20 April 2023

A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions. Recently,...

  • Article
  • Open Access
9 Citations
4,302 Views
32 Pages

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme

  • Sagarika Ghosh,
  • Marzia Zaman,
  • Gary Sakauye and
  • Srinivas Sampalli

26 February 2021

The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12. Therefore, researchers are developing various security schemes based on either...

  • Article
  • Open Access
123 Views
45 Pages

Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios

  • Shuanggen Liu,
  • Ya Nan Du,
  • Xu An Wang,
  • Xinyue Hu and
  • Hui En Su

23 January 2026

As a core support for the integration of new energy and smart grids, Vehicle-to-Grid (V2G) networks face a core contradiction between user privacy protection and transaction security traceability—a dilemma that is further exacerbated by issues...

  • Article
  • Open Access
4 Citations
3,226 Views
15 Pages

31 August 2023

As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security issues related to MCIS have become increasingly important. Therefore, the development and research of security technologies for mobile communication and internet sys...

  • Review
  • Open Access
1 Citations
2,159 Views
22 Pages

30 September 2025

As quantum computing advances, traditional digital forensic techniques face significant risks due to the vulnerability of classical cryptographic algorithms to quantum attacks. This review explores the emerging field of quantum digital forensics, wit...

  • Article
  • Open Access
493 Views
21 Pages

Quantum Enabled Data Authentication Without Classical Control Interaction

  • Piotr Zawadzki,
  • Grzegorz Dziwoki,
  • Marcin Kucharczyk,
  • Jan Machniewski,
  • Wojciech Sułek,
  • Jacek Izydorczyk,
  • Weronika Izydorczyk,
  • Piotr Kłosowski,
  • Adam Dustor and
  • Anna Zawadzka
  • + 2 authors

14 October 2025

We present a quantum-assisted data authentication protocol that integrates classical information-theoretic security with quantum communication techniques. We assume only that the participants have access to open classical and quantum channels, and sh...

  • Article
  • Open Access
1 Citations
3,290 Views
34 Pages

Study About the Performance of Ascon in Arduino Devices

  • Ventura Sarasa Laborda,
  • Luis Hernández-Álvarez,
  • Luis Hernández Encinas,
  • José Ignacio Sánchez García  and
  • Araceli Queiruga-Dios

7 April 2025

In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in res...

  • Article
  • Open Access
7 Citations
8,407 Views
10 Pages

In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires that the two legitimate users share a random secret key, which is at least twice as long as the t...

  • Article
  • Open Access
2 Citations
7,083 Views
21 Pages

Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations

  • Manohar Raavi,
  • Qaiser Khan,
  • Simeon Wuthier,
  • Pranav Chandramouli,
  • Yaroslav Balytskyi and
  • Sang-Yoon Chang

Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year st...

  • Proceeding Paper
  • Open Access
2 Citations
2,723 Views
5 Pages

Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital s...

  • Article
  • Open Access
12 Citations
4,670 Views
9 Pages

On the Performance of Interleavers for Quantum Turbo Codes

  • Josu Etxezarreta Martinez,
  • Pedro M. Crespo and
  • Javier Garcia-Frías

27 June 2019

Quantum turbo codes (QTC) have shown excellent error correction capabilities in the setting of quantum communication, achieving a performance less than 1 dB away from their corresponding hashing bounds. Existing QTCs have been constructed using unifo...

  • Article
  • Open Access
1 Citations
953 Views
23 Pages

Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate....

  • Article
  • Open Access
2 Citations
3,354 Views
28 Pages

In an age of AI-generated content and deepfakes, fake news and disinformation are increasingly spread using manipulated or fabricated images. To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the au...

  • Article
  • Open Access
3 Citations
2,651 Views
14 Pages

Design and Implementation of a Quantum-Assisted Digital Signature

  • Marta Irene García-Cid,
  • Rodrigo Martín,
  • David Domingo,
  • Vicente Martín and
  • Laura Ortiz

We propose a new quantum-assisted digital signature (Q-DS) protocol based on the composite of truly random symmetric keys generated by quantum key distribution with secure standardized hash functions, which allows for high parameterization to provide...

  • Article
  • Open Access
1 Citations
4,422 Views
24 Pages

13 July 2023

The efficient generation of high-quality random numbers is essential in the operation of cryptographic modules. The quality of a random number generator is evaluated by the min-entropy of its entropy source. The typical method used to achieve high mi...

  • Article
  • Open Access
4 Citations
2,982 Views
33 Pages

Network control of autonomous robotic devices involves a vast number of secured data coding, verification, and identification procedures to provide reliable work of distant agents. Blockchain scheme provides here the model of the extended linked list...

  • Article
  • Open Access
11 Citations
3,682 Views
12 Pages

A Post-Quantum Digital Signature Using Verkle Trees and Lattices

  • Maksim Iavich,
  • Tamari Kuchukhidze and
  • Razvan Bocu

6 December 2023

Research on quantum computers has advanced significantly in recent years. If humanity ever creates an effective quantum computer, many of the present public key cryptosystems can be compromised. These cryptosystems are currently found in many commerc...

  • Article
  • Open Access
7 Citations
7,582 Views
19 Pages

Improving Classical Authentication over a Quantum Channel

  • Francisco M. Assis,
  • Aleksandar Stojanovic,
  • Paulo Mateus and
  • Yasser Omar

11 December 2012

We propose a quantum protocol to authenticate classical messages that can be used to replace Wegman–Carter’s classical authentication scheme in quantum key distribution (QKD) protocols. We show that the proposed scheme achieves greater conditional en...

  • Review
  • Open Access
37 Citations
17,183 Views
19 Pages

A Quantum-Resistant Blockchain System: A Comparative Analysis

  • P. Thanalakshmi,
  • A. Rishikhesh,
  • Joel Marion Marceline,
  • Gyanendra Prasad Joshi and
  • Woong Cho

17 September 2023

Blockchain transactions are decentralized, secure, and transparent, and they have altered industries. However, the emergence of quantum computing presents a severe security risk to the traditional encryption algorithms used in blockchain. Post-quantu...

  • Review
  • Open Access
25 Citations
23,229 Views
23 Pages

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

  • Kanza Cherkaoui Dekkaki,
  • Igor Tasic and
  • Maria-Dolores Cano

As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehens...

  • Article
  • Open Access
756 Views
18 Pages

14 September 2025

Smart grids leverage smart terminal devices to collect information from the user side, achieving accurate load forecasting and optimized dispatching of power systems, effectively improving power supply efficiency and reliability while reducing energy...

  • Article
  • Open Access
461 Views
14 Pages

AI-Enhanced Perceptual Hashing with Blockchain for Secure and Transparent Digital Copyright Management

  • Zhaoxiong Meng,
  • Rukui Zhang,
  • Bin Cao,
  • Meng Zhang,
  • Yajun Li,
  • Huhu Xue and
  • Meimei Yang

This study presents a novel framework for digital copyright management that integrates AI-enhanced perceptual hashing, blockchain technology, and digital watermarking to address critical challenges in content protection and verification. Traditional...

of 2