{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:29:14Z","timestamp":1770154154809,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_19","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:49Z","timestamp":1770109069000},"page":"333-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-quantum Blockchain Transaction Model Based on Dilithium"],"prefix":"10.1007","author":[{"given":"Guangxia","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yannan","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"19_CR1","unstructured":"Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin. 4(2), 15 (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fernandez-Carames","year":"2020","unstructured":"Fernandez-Carames, T.M., Fraga-Lamas, P.: Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8, 21091\u201321116 (2020)","journal-title":"IEEE Access"},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA)]. Int. J. Inf. Secur. 1, 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Annual International Cryptology Conference, pp. 129\u2013140. . Springer, Heidelberg (1991)","DOI":"10.1007\/3-540-46766-1_9"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Z., Nguyen, K., Yang, G., et al.: A lattice-based linkable ring signature supporting stealth addresses. In: Computer Security-ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, 23\u201327 September 2019, Proceedings, Part I 24, pp. 726\u2013746. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-29959-0_35"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, P., Wang, L., Wang, W., et al.: A blockchain system based on quantum\u2010resistant digital signature. Secur. Commun. Netw. 2021(1), 1\u201313, 6671648 (2021)","DOI":"10.1155\/2021\/6671648"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"5393","DOI":"10.1109\/ACCESS.2017.2788411","volume":"6","author":"W Yin","year":"2018","unstructured":"Yin, W., Wen, Q., Li, W., et al.: An anti-quantum transaction authentication approach in blockchain. IEEE Access 6, 5393\u20135401 (2018)","journal-title":"IEEE Access"},{"issue":"6","key":"19_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., et al.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. (CSUR) 51(6), 1\u201341 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"19_CR10","unstructured":"Bruinderink, L.G., Lange, T., H\u00fclsing, A., et al.: Towards post-quantum bitcoin. Leon Groot Bruinderink\u2013Master\u2019s thesis (2016)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Alghamdi, S., Almuhammadi, S.: The future of cryptocurrency blockchains in the quantum era. In: 2021 IEEE International Conference on Blockchain (Blockchain), pp. 544\u2013551. IEEE (2021)","DOI":"10.1109\/Blockchain53845.2021.00082"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Mingxiao, D., Xiaofeng, M., Zhe, Z., et al.: A review on consensus algorithm of blockchain. In: 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2567\u20132572. IEEE (2017)","DOI":"10.1109\/SMC.2017.8123011"},{"issue":"19","key":"19_CR13","doi-asserted-by":"publisher","first-page":"195302","DOI":"10.1088\/1751-8121\/aa67cd","volume":"50","author":"N Tsimakuridze","year":"2017","unstructured":"Tsimakuridze, N., Ghne, O.: Graph states and local unitary transformations beyond local Clifford operations. J. Phys. A: Mathe. Theor. 50(19), 195302 (2017)","journal-title":"J. Phys. A: Mathe. Theor."},{"issue":"7671","key":"19_CR14","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188\u2013194 (2017)","journal-title":"Nature"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Aggarwal, D., Brennen, G.K., Lee, T., et al.: Quantum attacks on Bitcoin, and how to protect against them. arXiv preprint arXiv:1710.10377 (2017)","DOI":"10.5195\/ledger.2018.127"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Percival, C., Josefsson, S.: The scrypt password-based key derivation function (2016)","DOI":"10.17487\/RFC7914"},{"issue":"265","key":"19_CR17","first-page":"532","volume":"58","author":"J Chen","year":"2021","unstructured":"Chen, J., Gan, W., Hu, M., et al.: On the construction of a post-quantum blockchain for smart city. J. Inf. Secur. Appl. 58(265), 532\u2013533 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"19_CR18","unstructured":"Chen, L., Chen, L., Jordan, S., et al.: Report on post-quantum cryptography Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology (2016)"},{"key":"19_CR19","unstructured":"Bernstein, D.J., Chou, T., Lange, T., et al.: Classic McEliece: conservative code-based cryptography (2017). Project documentation: https:\/\/classic.mceliece.org\/nist\/mceliece-20190331.pdf"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Miller, A., Kosba, A., Katz, J., et al.: Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. In: 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 680\u2013691 (2015)","DOI":"10.1145\/2810103.2813621"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Holcomb, A., Pereira, G., Das, B., et al.: PQFabric: a permissioned blockchain secure from both classical and quantum attacks. In: IEEE International Conference on Blockchain and Cryptocurrency (ICBC), vol. 21, no. 158, pp. 268\u2013270 (2021)","DOI":"10.1109\/ICBC51069.2021.9461070"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Heninger, N., Lou, P., et al.: Post-quantum RSA. In: Post-Quantum Cryptography: 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, 26\u201328 June 2017, Proceedings 8, pp. 311\u2013329. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-59879-6_18"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:57:55Z","timestamp":1770109075000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}