Implementing Quantum Resistant Algorithm in Blockchain-Based Applications DOI Open Access
Sonali Ridhorkar,

Mr. Setu Sagar Mishra

International Journal of Advanced Research in Science Communication and Technology, Journal Year: 2024, Volume and Issue: unknown, P. 650 - 659

Published: April 30, 2024

With quantum computing evolving very fast as we speak, the security and integrity of blockchain-based applications will become most crucial aspect. A proposal is raised to use blockchain technology a platform for writing probating ‘wills’. Blockchain in drafting wills makes them safe from manipulations, highly secure, transparent. It also dramatically decreases time required without catering challenges created by current system. [9] This paper presents new method transfer inheritance management implementing quantum-resistant algorithms architecture decentralized application (DApp). The system uses IPFS Network data storage quantum-safe retrieval sending algorithms. includes Quantum-Resistant Dilithium Signatures Merkle trees fundamental components safeguarding transfers assets claims inheritance. offer an unbreakable shield against attacks that are expected happen, which turn safeguards privacy authenticity transactions. While responsible organization effective tamper-proof manner, introduced incorporates smart contracts address execution case, adding more automation asset distribution process. ensures robust framework integrating at core DApp instance, sending. research great significance emerging future because it addresses existing threat showing feasibility using practical applications. As established findings, besides trees, systems within networks enhanced terms safety reliability. Hence, paving road creation secure trustworthy digital systems.

Language: Английский

A literature review on V2X communications security: Foundation, solutions, status, and future DOI Creative Commons
Zuobin Ying, Kaichao Wang, Jinbo Xiong

et al.

IET Communications, Journal Year: 2024, Volume and Issue: unknown

Published: June 14, 2024

Abstract With the refinement and development of Vehicle to Everything (V2X) concept, its security issues have gradually come fore, revealing many risks increasing requirements for V2X, protective measures likewise emerged. The article first introduces history past Internet Vehicles(IoV), summarizes some common V2X threats, surveys technologies used communication, outlines each technology proposed protocols in last 3 years. Due different advantages disadvantages previous protection schemes, idea using National Cryptography supplement scheme or designing a new based on Algorithms((AKA SM algorithms) is proposed. survey then SM2, SM3, SM9, ZUC algorithms, describes application commercial algorithm recent years, finally, statistics part process currently IoV regarding algorithms gives prospects.

Language: Английский

Citations

1

Implementing Quantum Resistant Algorithm in Blockchain-Based Applications DOI Open Access
Sonali Ridhorkar,

Mr. Setu Sagar Mishra

International Journal of Advanced Research in Science Communication and Technology, Journal Year: 2024, Volume and Issue: unknown, P. 650 - 659

Published: April 30, 2024

With quantum computing evolving very fast as we speak, the security and integrity of blockchain-based applications will become most crucial aspect. A proposal is raised to use blockchain technology a platform for writing probating ‘wills’. Blockchain in drafting wills makes them safe from manipulations, highly secure, transparent. It also dramatically decreases time required without catering challenges created by current system. [9] This paper presents new method transfer inheritance management implementing quantum-resistant algorithms architecture decentralized application (DApp). The system uses IPFS Network data storage quantum-safe retrieval sending algorithms. includes Quantum-Resistant Dilithium Signatures Merkle trees fundamental components safeguarding transfers assets claims inheritance. offer an unbreakable shield against attacks that are expected happen, which turn safeguards privacy authenticity transactions. While responsible organization effective tamper-proof manner, introduced incorporates smart contracts address execution case, adding more automation asset distribution process. ensures robust framework integrating at core DApp instance, sending. research great significance emerging future because it addresses existing threat showing feasibility using practical applications. As established findings, besides trees, systems within networks enhanced terms safety reliability. Hence, paving road creation secure trustworthy digital systems.

Language: Английский

Citations

0