{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T08:09:56Z","timestamp":1748851796937,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":53,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_17","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:17Z","timestamp":1741867937000},"page":"349-369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PQS-BC: Comparative Analysis of\u00a0NIST Post-quantum Signatures for\u00a0Blockchain"],"prefix":"10.1007","author":[{"given":"Wan Kai","family":"Wong","sequence":"first","affiliation":[]},{"given":"Naipeng","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Cong Minh","family":"Dinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"17_CR1","unstructured":"Blockchain technology market size, share and industry anslysis, by component, by type, by application, by deployment, by industry and regional forcast, 2024-2032. https:\/\/www.fortunebusinessinsights.com\/industry-reports\/blockchain-market-100072"},{"key":"17_CR2","unstructured":"The quantum computer and its implications for public-key crypto systems. Tech. rep. (2020). https:\/\/www.entrust.com\/-\/media\/documentation\/whitepapers\/sl20-1026-001-ssl_quantumcomputers-wp.pdf"},{"key":"17_CR3","unstructured":"PQC-blockchain-assessment (2024). https:\/\/github.com\/pqc78999\/pqc-blockchain-assessment.git. Accessed 01 Jul 2024"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Alagic, G., et\u00a0al.: Status report on the first round of the NIST post-quantum cryptography standardization process (2019)","DOI":"10.6028\/NIST.IR.8240"},{"key":"17_CR5","volume-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","author":"G Alagic","year":"2022","unstructured":"Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST (2022)"},{"key":"17_CR6","unstructured":"Aumasson, J.P., et\u00a0al.: Sphincs. Tech. rep., Stanford Univ., Tech. Rep (2019)"},{"key":"17_CR7","unstructured":"Bai, S., et al.: CRYSTALS-Dilithium: Algorithm specifications and supporting documentation (version 3.1). NIST Post-Quantum Cryptography Standardization Round 3 (2021)"},{"issue":"7671","key":"17_CR8","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188\u2013194 (2017)","journal-title":"Nature"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Beullens, W.: Mayo: practical post-quantum signatures from oil-and-vinegar maps. In: International Conference on Selected Areas in Cryptography, pp. 355\u2013376. Springer (2021)","DOI":"10.1007\/978-3-030-99277-4_17"},{"key":"17_CR10","volume-title":"Algorithm Specifications and Supporting Documentation","author":"C Chen","year":"2019","unstructured":"Chen, C., et al.: Algorithm Specifications and Supporting Documentation. Brown University and Onboard security company, Wilmington USA (2019)"},{"key":"17_CR11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105","volume-title":"Report on Post-Quantum Cryptography","author":"L Chen","year":"2016","unstructured":"Chen, L., et al.: Report on Post-Quantum Cryptography, vol. 12. National Institute of Standards and Technology, US Department of Commerce (2016)"},{"key":"17_CR12","unstructured":"Chen, L., Moody, D., Regenscheid, A., Robinson, A.: Digital signature standard (DSS) (2023)"},{"key":"17_CR13","unstructured":"Dang, V.B., Farahmand, F., Andrzejczak, M., Mohajerani, K., Nguyen, D.T., Gaj, K.: Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software\/hardware co-design approaches. Cryptology ePrint Archive: Report 2020\/795 (2020)"},{"issue":"12","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571071","volume":"55","author":"J Dey","year":"2023","unstructured":"Dey, J., Dutta, R.: Progress in multivariate cryptography: systematic review, challenges, and research directions. ACM Comput. Surv. 55(12), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: International Conference on Applied Cryptography and Network Security, pp. 164\u2013175. Springer (2005)","DOI":"10.1007\/11496137_12"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Ducas, L., et al.: CRYSTALS-Dilithium: a lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 238\u2013268 (2018)","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Dudley, R.M.: Central limit theorems for empirical measures. The Annals of Probability pp. 899\u2013929 (1978)","DOI":"10.1214\/aop\/1176995384"},{"issue":"1","key":"17_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01665-w","volume":"2020","author":"W Fang","year":"2020","unstructured":"Fang, W., Chen, W., Zhang, W., Pei, J., Gao, W., Wang, G.: Digital signature scheme for information non-repudiation in blockchain: a state of the art review. EURASIP J. Wirel. Commun. Netw. 2020(1), 1\u201315 (2020)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fernandez-Carames","year":"2020","unstructured":"Fernandez-Carames, T.M., Fraga-Lamas, P.: Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE access 8, 21091\u201321116 (2020)","journal-title":"IEEE access"},{"issue":"2","key":"17_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3390\/cryptography8020021","volume":"8","author":"G Fitzgibbon","year":"2024","unstructured":"Fitzgibbon, G., Ottaviani, C.: Constrained device performance benchmarking with the implementation of post-quantum cryptography. Cryptography 8(2), 21 (2024)","journal-title":"Cryptography"},{"issue":"5","key":"17_CR21","first-page":"1","volume":"36","author":"PA Fouque","year":"2018","unstructured":"Fouque, P.A., et al.: Falcon: fast-fourier lattice-based compact signatures over NTRU. Submission NIST\u2019s Post-Quantum Crypt. Stand. Process 36(5), 1\u201375 (2018)","journal-title":"Submission NIST\u2019s Post-Quantum Crypt. Stand. Process"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Gonzalez, R., et al.: Verifying post-quantum signatures in 8 kB of RAM. In: Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20\u201322, 2021, Proceedings 12. pp. 215\u2013233. Springer (2021)","DOI":"10.1007\/978-3-030-81293-5_12"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J.H., Whyte, W.: NTRUSign: digital signatures using the NTRU lattice. In: Cryptographers\u2019 track at the RSA conference, pp. 122\u2013140. Springer (2003)","DOI":"10.1007\/3-540-36563-X_9"},{"key":"17_CR24","unstructured":"Holmes, S.A.: Impact of post-quantum signatures on blockchain and DLT systems (2023)"},{"key":"17_CR25","unstructured":"Hopwood, D., Bowe, S., Hornby, T., Wilcox, N., et\u00a0al.: Zcash protocol specification. GitHub: San Francisco, CA, USA 4(220), 32 (2016)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Howe, J., P\u00f6ppelmann, T., O\u2019neill, M., O\u2019sullivan, E., G\u00fcneysu, T.: Practical lattice-based digital signature schemes. ACM Trans. Embed. Comput. Syst. (TECS) 14(3), 1\u201324 (2015)","DOI":"10.1145\/2724713"},{"key":"17_CR27","unstructured":"Huang, T.P., Postlethwaite, E.W., Prest, T., Pulles, L.N., van Woerden, W.: Hawk version 1.0.1 https:\/\/hawk-sign.info"},{"issue":"2","key":"17_CR28","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1049\/ise2.12092","volume":"17","author":"Y Ikematsu","year":"2023","unstructured":"Ikematsu, Y., Nakamura, S., Takagi, T.: Recent progress in the security evaluation of multivariate public-key cryptography. IET Inf. Secur. 17(2), 210\u2013226 (2023)","journal-title":"IET Inf. Secur."},{"key":"17_CR29","unstructured":"Kannwischer, M.J., Krausz, M., Petri, R., Yang, S.Y.: pqm4: Benchmarking NIST additional post-quantum signature schemes on microcontrollers. Cryptology ePrint Archive (2024)"},{"issue":"1","key":"17_CR30","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s42400-023-00198-1","volume":"7","author":"F Liu","year":"2024","unstructured":"Liu, F., et al.: A survey on lattice-based digital signature. Cybersecurity 7(1), 7 (2024)","journal-title":"Cybersecurity"},{"key":"17_CR31","unstructured":"Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., Vishwakarma, S.K.L.P.: From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv preprint arXiv:2307.01155 (2023)"},{"key":"17_CR32","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"17_CR33","unstructured":"National Institute of Standards and Technology: Post-quantum cryptography (PQC) forum. https:\/\/groups.google.com\/a\/list.nist.gov\/g\/pqc-forum"},{"key":"17_CR34","unstructured":"National Institute of Standards and Technology: Post-quantum cryptography: Round 1 additional digital signature schemes. https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-1-additional-signatures"},{"key":"17_CR35","unstructured":"National Institute of Standards and Technology: PQC \u2013 known answer tests and test vectors. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/example-files\/kat.pdf"},{"key":"17_CR36","unstructured":"National Institute of Standards and Technology: Round 1 additional signatures (2023). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-1-additional-signatures"},{"key":"17_CR37","unstructured":"National Institute of Standards and Technology: Post-quantum cryptography FAQs (2024). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/faqs"},{"issue":"6","key":"17_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. (CSUR) 51(6), 1\u201341 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"17_CR39","unstructured":"NIST CFP: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016)"},{"key":"17_CR40","unstructured":"Okupski, K.: Bitcoin developer reference. Eindhoven, pp.\u00a03\u20134 (2014)"},{"key":"17_CR41","unstructured":"Pooja, M., Yadav, M.: Digital signature. Int. J. Sci. Res. Comput. Sci., Eng. Inf. Technol. (IJSRCSEIT) 3(6), 71\u201375 (2018)"},{"issue":"3","key":"17_CR42","first-page":"30","volume":"1","author":"S Popov","year":"2018","unstructured":"Popov, S.: The tangle. White Pap. 1(3), 30 (2018)","journal-title":"White Pap."},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Proos, J., Zalka, C.: Shor\u2019s discrete logarithm quantum algorithm for elliptic curves. arXiv preprint quant-ph\/0301141 (2003)","DOI":"10.26421\/QIC3.4-3"},{"key":"17_CR44","unstructured":"QByte: Qbyte quantum risk calculator. https:\/\/qbyte.btq.com\/"},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Raavi, M., Wuthier, S., Chandramouli, P., Balytskyi, Y., Zhou, X., Chang, S.Y.: Security comparisons and performance analyses of post-quantum signature algorithms. In: International Conference on Applied Cryptography and Network Security, pp. 424\u2013447. Springer (2021)","DOI":"10.1007\/978-3-030-78375-4_17"},{"key":"17_CR46","doi-asserted-by":"crossref","unstructured":"Ravi, P., Sundar, V.K., Chattopadhyay, A., Bhasin, S., Easwaran, A.: Authentication protocol for secure automotive systems: benchmarking post-quantum cryptography. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp.\u00a01\u20135. IEEE (2020)","DOI":"10.1109\/ISCAS45731.2020.9180847"},{"issue":"2","key":"17_CR47","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"9","key":"17_CR48","doi-asserted-by":"publisher","first-page":"14025","DOI":"10.1109\/TITS.2021.3131668","volume":"23","author":"KA Shim","year":"2021","unstructured":"Shim, K.A.: A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Trans. Intell. Transp. Syst. 23(9), 14025\u201314042 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"17_CR49","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"17_CR50","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. Cryptology ePrint Archive (2020)","DOI":"10.14722\/ndss.2020.24203"},{"key":"17_CR51","unstructured":"Soni, D., Basu, K., Nabeel, M., Karri, R.: A hardware evaluation study of NIST post-quantum cryptographic signature schemes. In: Second PQC Standardization Conference. NIST (2019)"},{"key":"17_CR52","unstructured":"Wang, L.C., Tseng, P.E., Kuan, Y.L., Chou, C.Y.: A simple noncommutative UOV scheme. Cryptology ePrint Archive (2022)"},{"key":"17_CR53","unstructured":"Yakovenko, A.: Solana: A new architecture for a high performance blockchain v0. 8.13. Whitepaper (2018)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:12:33Z","timestamp":1741867953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}