{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:12:11Z","timestamp":1772892731497,"version":"3.50.1"},"reference-count":125,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.compeleceng.2026.111096","type":"journal-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T14:53:46Z","timestamp":1772808826000},"page":"111096","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A survey of quantum and blockchain security solutions for IoT-based Energy Internet"],"prefix":"10.1016","volume":"134","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8774-1263","authenticated-orcid":false,"given":"Chahrazed","family":"Benrebbouh","sequence":"first","affiliation":[]},{"given":"Houssem","family":"Mansouri","sequence":"additional","affiliation":[]},{"given":"Sarra","family":"Cherbal","sequence":"additional","affiliation":[]},{"given":"Mohamed-Lamine","family":"Messai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6572-3451","authenticated-orcid":false,"given":"Al-Sakib Khan","family":"Pathan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111096_b1","article-title":"Can the energy internet achieve carbon reduction?","volume":"12","author":"Li","year":"2024","journal-title":"Front Energy Res"},{"key":"10.1016\/j.compeleceng.2026.111096_b2","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.future.2018.01.029","article-title":"Cyber security framework for internet of things-based energy internet","volume":"93","author":"Sani","year":"2019","journal-title":"Future Gener Comput Syst"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111096_b3","first-page":"571","article-title":"A secure consensus mechanism for IoT-based energy internet using post-quantum blockchain","volume":"28","author":"Angague","year":"2025","journal-title":"Int J Comput Sci Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b4","article-title":"The PRISMA 2020 statement: an updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"Bmj"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111096_b5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3625094","article-title":"A systematic review of IoT security: Research potential, challenges, and future directions","volume":"56","author":"Fei","year":"2023","journal-title":"ACM Comput Surv"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b6","doi-asserted-by":"crossref","first-page":"3738","DOI":"10.1007\/s11227-023-05616-2","article-title":"Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing","volume":"80","author":"Cherbal","year":"2024","journal-title":"J Supercomput"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b7","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1109\/COMST.2024.3355222","article-title":"Post-quantum blockchain security for the internet of things: Survey and research directions","volume":"26","author":"Gharavi","year":"2024","journal-title":"IEEE Commun Surv Tutorials"},{"key":"10.1016\/j.compeleceng.2026.111096_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101254","article-title":"Blockchain application for internet of things and future prospect\u2014A survey","volume":"27","author":"Khan","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111096_b9","article-title":"Privacy-preserving security of IoT networks: A comparative analysis of methods and applications","volume":"3","author":"Wakili","year":"2025","journal-title":"Cyber Secur Appl"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111096_b10","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1007\/s13369-022-07380-6","article-title":"A systematic literature review of blockchain technology for internet of drones security","volume":"48","author":"Harbi","year":"2023","journal-title":"Arab J Sci Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b11","article-title":"Internet of drones security: Taxonomies, open issues, and future directions","volume":"39","author":"Derhab","year":"2023","journal-title":"Veh Commun"},{"key":"10.1016\/j.compeleceng.2026.111096_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100809","article-title":"Security issues in internet of vehicles (IoV): A comprehensive survey","volume":"22","author":"Taslimasa","year":"2023","journal-title":"Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111096_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2023.100547","article-title":"A comprehensive review on blockchains for internet of vehicles: Challenges and directions","volume":"48","author":"Hildebrand","year":"2023","journal-title":"Comput Sci Rev"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111096_b14","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1049\/stg2.12090","article-title":"Smart grid security: Attacks and defence techniques","volume":"6","author":"Kim","year":"2023","journal-title":"IET Smart Grid"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111096_b15","doi-asserted-by":"crossref","first-page":"2497","DOI":"10.11591\/eei.v14i4.8956","article-title":"Blockchain for future smart grid: a comprehensive survey","volume":"14","author":"Shamaseen","year":"2025","journal-title":"Bull Electr Eng Informatics"},{"key":"10.1016\/j.compeleceng.2026.111096_b16","doi-asserted-by":"crossref","first-page":"2449","DOI":"10.1007\/s10586-021-03423-z","article-title":"A survey on internet of energy security: related fields, challenges, threats and emerging technologies","volume":"25","author":"Mogadem","year":"2022","journal-title":"Clust Comput"},{"key":"10.1016\/j.compeleceng.2026.111096_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.egyai.2023.100306","article-title":"Towards next generation internet of energy system: Framework and trends","volume":"14","author":"Farhan","year":"2023","journal-title":"Energy AI"},{"key":"10.1016\/j.compeleceng.2026.111096_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108847","article-title":"Industrial internet of things enabled technologies, challenges, and future directions","volume":"110","author":"Ahmed","year":"2023","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b19","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.comcom.2023.06.020","article-title":"Cybersecurity for industrial IoT (IIoT): Threats, countermeasures, challenges and future directions","volume":"208","author":"Mekala","year":"2023","journal-title":"Comput Commun"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111096_b20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3645087","article-title":"An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT","volume":"56","author":"Shahidinejad","year":"2024","journal-title":"ACM Comput Surv"},{"key":"10.1016\/j.compeleceng.2026.111096_b21","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.comcom.2020.01.014","article-title":"Blockchain for internet of energy management: Review, solutions, and challenges","volume":"151","author":"Miglani","year":"2020","journal-title":"Comput Commun"},{"key":"10.1016\/j.compeleceng.2026.111096_b22","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2020.109840","article-title":"An internet of energy framework with distributed energy resources, prosumers and small-scale virtual power plants: An overview","volume":"127","author":"Mahmud","year":"2020","journal-title":"Renew Sustain Energy Rev"},{"key":"10.1016\/j.compeleceng.2026.111096_b23","doi-asserted-by":"crossref","first-page":"4179","DOI":"10.1016\/j.rser.2017.11.004","article-title":"Integration of electric vehicles and management in the internet of energy","volume":"82","author":"Mahmud","year":"2018","journal-title":"Renew Sustain Energy Rev"},{"key":"10.1016\/j.compeleceng.2026.111096_b24","article-title":"Internet of energy (IoE) adoption for a secure semi-decentralized renewable energy distribution","volume":"57","author":"El Hafdaoui","year":"2023","journal-title":"Sustain Energy Technol Assessments"},{"issue":"19","key":"10.1016\/j.compeleceng.2026.111096_b25","doi-asserted-by":"crossref","first-page":"6903","DOI":"10.3390\/en16196903","article-title":"Energy management systems in sustainable smart cities based on the internet of energy: A technical review","volume":"16","author":"Mishra","year":"2023","journal-title":"Energies"},{"key":"10.1016\/j.compeleceng.2026.111096_b26","series-title":"2022 4th international conference on advanced science and engineering","first-page":"107","article-title":"Future security issues in internet of energy","author":"Benrebbouh","year":"2022"},{"issue":"20","key":"10.1016\/j.compeleceng.2026.111096_b27","doi-asserted-by":"crossref","first-page":"13180","DOI":"10.3390\/su142013180","article-title":"Identifying key components in implementation of internet of energy (IoE) in Iran with a combined approach of meta-synthesis and structural analysis: A systematic review","volume":"14","author":"Taghavi","year":"2022","journal-title":"Sustainability"},{"key":"10.1016\/j.compeleceng.2026.111096_b28","first-page":"3297","article-title":"How will the internet of energy (IoE) revolutionize the electricity sector? A techno-economic review","volume":"72","author":"Laroussi","year":"2023","journal-title":"Mater Today: Proc"},{"issue":"7","key":"10.1016\/j.compeleceng.2026.111096_b29","doi-asserted-by":"crossref","first-page":"2604","DOI":"10.3390\/en15072604","article-title":"Power electronics converters for the internet of energy: A review","volume":"15","author":"Granata","year":"2022","journal-title":"Energies"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b30","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/s21010028","article-title":"Proof-of-puf enabled blockchain: Concurrent data and device security for internet-of-energy","volume":"21","author":"Asif","year":"2020","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111096_b31","first-page":"1789","article-title":"Towards an internet of energy for smart and distributed generation: applications, strategies, and challenges","volume":"9","author":"Gu","year":"2022","journal-title":"J Comput Des Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b32","doi-asserted-by":"crossref","DOI":"10.1016\/j.jclepro.2020.120630","article-title":"An overview of \u201cenergy+ internet\u201d in China","volume":"258","author":"Feng","year":"2020","journal-title":"J Clean Prod"},{"key":"10.1016\/j.compeleceng.2026.111096_b33","doi-asserted-by":"crossref","first-page":"3970","DOI":"10.1016\/j.egyr.2023.10.051","article-title":"Recent advancement of energy internet for emerging energy management technologies: Key features, potential applications, methods and open issues","volume":"10","author":"Hannan","year":"2023","journal-title":"Energy Rep"},{"key":"10.1016\/j.compeleceng.2026.111096_b34","article-title":"The future energy internet for utility energy service and demand-side management in smart grid: Current practices, challenges and future directions","volume":"53","author":"Parvin","year":"2022","journal-title":"Sustain Energy Technol Assessments"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b35","doi-asserted-by":"crossref","first-page":"2403","DOI":"10.1109\/JSYST.2016.2639820","article-title":"A survey on energy internet: Architecture, approach, and emerging technologies","volume":"12","author":"Wang","year":"2017","journal-title":"IEEE Syst J"},{"key":"10.1016\/j.compeleceng.2026.111096_b36","doi-asserted-by":"crossref","first-page":"215787","DOI":"10.1109\/ACCESS.2020.3041031","article-title":"Smart grid to energy internet: A systematic review of transitioning electricity systems","volume":"8","author":"Joseph","year":"2020","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111096_b37","doi-asserted-by":"crossref","first-page":"881","DOI":"10.3390\/en13040881","article-title":"Blockchain technology for information security of the energy internet: Fundamentals, features, strategy and application","volume":"13","author":"Zeng","year":"2020","journal-title":"Energies"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111096_b38","doi-asserted-by":"crossref","first-page":"95","DOI":"10.3390\/network1020007","article-title":"Can blockchain strengthen the energy internet?","volume":"1","author":"Yapa","year":"2021","journal-title":"Network"},{"issue":"21","key":"10.1016\/j.compeleceng.2026.111096_b39","doi-asserted-by":"crossref","first-page":"8397","DOI":"10.3390\/s22218397","article-title":"Energy internet opportunities in distributed peer-to-peer energy trading reveal by blockchain for future smart grid 2.0","volume":"22","author":"Zafar","year":"2022","journal-title":"Sensors"},{"issue":"9","key":"10.1016\/j.compeleceng.2026.111096_b40","doi-asserted-by":"crossref","first-page":"972","DOI":"10.3390\/electronics8090972","article-title":"Internet of things applications as energy internet in smart grids and smart environments","volume":"8","author":"Kabalci","year":"2019","journal-title":"Electronics"},{"key":"10.1016\/j.compeleceng.2026.111096_b41","doi-asserted-by":"crossref","DOI":"10.3389\/fenrg.2022.999589","article-title":"A review of energy internet research considering interactive energy: The blockchain perspective","volume":"10","author":"Wang","year":"2022","journal-title":"Front Energy Res"},{"key":"10.1016\/j.compeleceng.2026.111096_b42","series-title":"Cyber security of industrial control systems in the future internet environment","first-page":"248","article-title":"Energy internet: Architecture, emerging technologies, and security issues","author":"Rakas","year":"2020"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b43","first-page":"1","article-title":"Energy internet-decentralized systems contributing to reduction of greenhouse gas emissions","volume":"7","author":"Biega\u0144ska","year":"2024","journal-title":"J Auton Intell"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111096_b44","first-page":"228","article-title":"From smart grids to an energy internet: A review paper on key features of an energy internet","volume":"8","author":"Surani","year":"2019","journal-title":"Int J Eng Res Technol"},{"key":"10.1016\/j.compeleceng.2026.111096_b45","series-title":"The third industrial revolution: How lateral power is transforming energy, the economy, and the world","isbn-type":"print","author":"Rifkin","year":"2011","ISBN":"https:\/\/id.crossref.org\/isbn\/9780230115217"},{"key":"10.1016\/j.compeleceng.2026.111096_b46","first-page":"4","article-title":"Leading the way to the third industrial revolution","volume":"1","author":"Rifkin","year":"2008","journal-title":"Eur Energ Rev"},{"key":"10.1016\/j.compeleceng.2026.111096_b47","series-title":"2008 SICE annual conference","first-page":"399","article-title":"Inventing energy internet the role of anticipation in human-centered energy distribution and utilization","author":"Tsoukalas","year":"2008"},{"key":"10.1016\/j.compeleceng.2026.111096_b48","series-title":"2008 third international conference on electric utility deregulation and restructuring and power technologies","first-page":"94","article-title":"From smart grids to an energy internet: Assumptions, architectures and requirements","author":"Tsoukalas","year":"2008"},{"key":"10.1016\/j.compeleceng.2026.111096_b49","series-title":"2019 5th conference on knowledge based engineering and innovation","first-page":"627","article-title":"Internet of energy (IoE) in smart power systems","author":"Shahinzadeh","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111096_b50","doi-asserted-by":"crossref","first-page":"6530","DOI":"10.1016\/j.egyr.2021.09.112","article-title":"Survey on blockchain for future smart grids: Technical aspects, applications, integration challenges and future research","volume":"7","author":"Yapa","year":"2021","journal-title":"Energy Rep"},{"key":"10.1016\/j.compeleceng.2026.111096_b51","doi-asserted-by":"crossref","DOI":"10.1186\/s40294-020-00070-w","article-title":"False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure","volume":"8","author":"Ahmed","year":"2020","journal-title":"Complex Adapt Syst Model"},{"key":"10.1016\/j.compeleceng.2026.111096_b52","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108638","article-title":"False data injection attack in smart grid cyber physical system: Issues, challenges, and future direction","volume":"107","author":"Habib","year":"2023","journal-title":"Comput Electr Eng"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b53","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1186\/s42400-023-00200-w","article-title":"Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges","volume":"7","author":"Achaal","year":"2024","journal-title":"Cybersecurity"},{"key":"10.1016\/j.compeleceng.2026.111096_b54","first-page":"19","article-title":"Innovations of phishing defense: The mechanism, measurement and defense strategies","volume":"10","author":"Thakur","year":"2018","journal-title":"Int J Commun Networks Inf Secur"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111096_b55","doi-asserted-by":"crossref","first-page":"662","DOI":"10.3390\/jcp3040031","article-title":"Cyberattacks in smart grids: Challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process","volume":"3","author":"Bouramdane","year":"2023","journal-title":"J Cybersecur Priv"},{"key":"10.1016\/j.compeleceng.2026.111096_b56","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.101037","article-title":"A survey on security and cryptographic perspective of industrial-internet-of-things","volume":"25","author":"Mishra","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111096_b57","article-title":"Authentication, access control and scalability models in internet of things security\u2013A review","volume":"3","author":"Kokila","year":"2025","journal-title":"Cyber Secur Appl"},{"key":"10.1016\/j.compeleceng.2026.111096_b58","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101227","article-title":"Verify and trust: A multidimensional survey of zero-trust security in the age of IoT","volume":"27","author":"Azad","year":"2024","journal-title":"Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111096_b59","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108759","article-title":"Scpuak: Smart card-based secure protocol for remote user authentication and key agreement","volume":"109","author":"Cherbal","year":"2023","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b60","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11277-019-06405-y","article-title":"A review of security in internet of things","volume":"108","author":"Harbi","year":"2019","journal-title":"Wirel Pers Commun"},{"key":"10.1016\/j.compeleceng.2026.111096_b61","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Bus Rev"},{"key":"10.1016\/j.compeleceng.2026.111096_b62","article-title":"A comprehensive survey on blockchain technology","volume":"52","author":"Rajasekaran","year":"2022","journal-title":"Sustain Energy Technol Assessments"},{"key":"10.1016\/j.compeleceng.2026.111096_b63","article-title":"Blockchain technology and privacy regulation: Reviewing frictions and synthesizing opportunities","volume":"76","author":"Akanfe","year":"2024","journal-title":"Int J Inf Manage"},{"key":"10.1016\/j.compeleceng.2026.111096_b64","article-title":"How can blockchain technology support patent management? A systematic literature review","volume":"68","author":"Denter","year":"2023","journal-title":"Int J Inf Manage"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111096_b65","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-023-3113-x","article-title":"The governance technology for blockchain systems: a survey","volume":"18","author":"Zhu","year":"2024","journal-title":"Front Comput Sci"},{"key":"10.1016\/j.compeleceng.2026.111096_b66","series-title":"2024 6th international conference on pattern analysis and intelligent systems","first-page":"1","article-title":"Authentication scheme based on blockchain and proof-of-work for IoT","author":"Adjeroud","year":"2024"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b67","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1186\/s42400-023-00163-y","article-title":"Evolution of blockchain consensus algorithms: a review on the latest milestones of blockchain consensus algorithms","volume":"6","author":"Hussein","year":"2023","journal-title":"Cybersecurity"},{"key":"10.1016\/j.compeleceng.2026.111096_b68","series-title":"International conference on Asia Pacific advanced network","first-page":"86","article-title":"Towards true decentralization: Development, testing and evaluation of a novel blockchain consensus protocol","author":"Wimal","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111096_b69","first-page":"636","article-title":"Proof of contribution: A modification of proof of work to increase mining efficiency","volume":"vol. 1","author":"Xue","year":"2018"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b70","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1093\/rfs\/hhaa075","article-title":"Blockchain without waste: Proof-of-stake","volume":"34","author":"Saleh","year":"2021","journal-title":"Rev Financ Stud"},{"key":"10.1016\/j.compeleceng.2026.111096_b71","doi-asserted-by":"crossref","unstructured":"Fan Xinxin, Chai Qi. Roll-DPoS: a randomized delegated proof of stake scheme for scalable blockchain-based internet of things systems. In: Proceedings of the 15th EAI international conference on mobile and ubiquitous systems: computing, networking and services. 2018, p. 482\u20134.","DOI":"10.1145\/3286978.3287023"},{"key":"10.1016\/j.compeleceng.2026.111096_b72","series-title":"International conference on emerging global trends in engineering and technology","first-page":"501","article-title":"An enhanced blockchain consensus mechanism using proof-of-work and proof-of-stake","author":"Kalita","year":"2022"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b73","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MITP.2022.3225429","article-title":"HADPoS: Improvement of dpos consensus mechanism based on heat attenuation","volume":"25","author":"You","year":"2023","journal-title":"IT Prof"},{"key":"10.1016\/j.compeleceng.2026.111096_b74","series-title":"Proof-of-burn","author":"Karantias","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111096_b75","series-title":"2018 23rd international conference on engineering of complex computer systems","first-page":"197","article-title":"Formal analysis of a proof-of-stake blockchain","author":"Thin","year":"2018"},{"issue":"18","key":"10.1016\/j.compeleceng.2026.111096_b76","doi-asserted-by":"crossref","first-page":"6607","DOI":"10.3390\/app10186607","article-title":"Proof of adjourn (poaj): A novel approach to mitigate blockchain attacks","volume":"10","author":"Sayeed","year":"2020","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2026.111096_b77","series-title":"A smart contract-based blockchain solution for key revocation in IoT networks","author":"Bettayeb","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111096_b78","series-title":"Handbook of blockchain, digital finance, and inclusion","first-page":"145","article-title":"Blockchain \u2013 from public to private","author":"Lai","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111096_b79","doi-asserted-by":"crossref","first-page":"123711","DOI":"10.1109\/ACCESS.2020.3005663","article-title":"Consortium blockchain-based decentralized stock exchange platform","volume":"8","author":"Al-Shaibani","year":"2020","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111096_b80","first-page":"765","article-title":"A multi-transaction mode consortium blockchain","volume":"14","author":"Zhang","year":"2018","journal-title":"Int J Perform Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b81","series-title":"2018 2nd IEEE conference on energy internet and energy system integration (EI2)","first-page":"1","article-title":"A blockchain based access authentication scheme of energy internet","author":"Chen","year":"2018"},{"key":"10.1016\/j.compeleceng.2026.111096_b82","doi-asserted-by":"crossref","first-page":"173817","DOI":"10.1109\/ACCESS.2019.2957211","article-title":"Blockchain-based distributed energy trading in energy internet: An SDN approach","volume":"7","author":"Lu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111096_b83","doi-asserted-by":"crossref","unstructured":"Lu Xin, Guan Zhitao. A blockchain-based trading matching scheme in energy Internet. In: Proceedings of the 2nd ACM international symposium on blockchain and secure critical infrastructure. 2020, p. 142\u201350.","DOI":"10.1145\/3384943.3409430"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111096_b84","doi-asserted-by":"crossref","first-page":"5689","DOI":"10.1109\/TII.2021.3133458","article-title":"A peer-2-peer management and secure policy of the energy internet in smart microgrids","volume":"18","author":"Ding","year":"2021","journal-title":"IEEE Trans Ind Informatics"},{"key":"10.1016\/j.compeleceng.2026.111096_b85","series-title":"2021 international conference on intelligent technology and embedded systems","first-page":"164","article-title":"Electricity decentralized transaction framework of community energy internet cluster based on blockchain","author":"Wang","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111096_b86","first-page":"1011","article-title":"Blockchain-based privacy protection scheme for smart park multi-energy fusion system","volume":"vol. 4","author":"Si","year":"2021"},{"key":"10.1016\/j.compeleceng.2026.111096_b87","series-title":"2022 international conference on business analytics for technology and security","first-page":"1","article-title":"Blockchain networks for solar PV electric vehicles charging station to support and foster clean energy transition","author":"Hassan","year":"2022"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b88","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/3488977","article-title":"A multi-blockchain-based cross-domain authentication and authorization scheme for energy internet","volume":"2023","author":"Liu","year":"2023","journal-title":"Wirel Commun Mob Comput"},{"key":"10.1016\/j.compeleceng.2026.111096_b89","series-title":"2023 3rd international conference on intelligent technologies","first-page":"1","article-title":"Energy trading in the internet of energy using ethereum smart contracts and smart energy meters","author":"Sai","year":"2023"},{"key":"10.1016\/j.compeleceng.2026.111096_b90","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110289","article-title":"PrGChain: A privacy-preserving blockchain-enabled energy trading system","volume":"123","author":"Berkani","year":"2025","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111096_b91","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109330","article-title":"A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security","volume":"118","author":"Adeniyi","year":"2024","journal-title":"Comput Electr Eng"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111096_b92","doi-asserted-by":"crossref","first-page":"6117","DOI":"10.1007\/s40747-024-01477-1","article-title":"A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records","volume":"10","author":"Alsubai","year":"2024","journal-title":"Complex Intell Syst"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b93","doi-asserted-by":"crossref","first-page":"2294","DOI":"10.1109\/TSG.2021.3138393","article-title":"PF-DA: Pairing free and secure data aggregation for energy internet-based smart meter-to-grid communication","volume":"13","author":"Verma","year":"2021","journal-title":"IEEE Trans Smart Grid"},{"key":"10.1016\/j.compeleceng.2026.111096_b94","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s11235-021-00826-6","article-title":"A secure and efficient key agreement framework for critical energy infrastructure using mobile device","volume":"78","author":"Khan","year":"2021","journal-title":"Telecommun Syst"},{"key":"10.1016\/j.compeleceng.2026.111096_b95","article-title":"A secure and energy efficient key agreement framework for vehicle-grid system","volume":"68","author":"Khan","year":"2022","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b96","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1007\/s12083-022-01305-8","article-title":"An authentication and key agreement scheme for smart grid","volume":"15","author":"Safkhani","year":"2022","journal-title":"Peer-To-Peer Netw Appl"},{"key":"10.1016\/j.compeleceng.2026.111096_b97","series-title":"2022 IEEE 10th international conference on information, communication and networks","first-page":"217","article-title":"Multi-dimensional user data security aggregation in energy internet","author":"Rao","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111096_b98","series-title":"2022 IEEE 10th international conference on information, communication and networks","first-page":"236","article-title":"An identity based key update scheme for energy internet edge devices","author":"Mao","year":"2022"},{"key":"10.1016\/j.compeleceng.2026.111096_b99","article-title":"A robust ECC-based authentication framework for energy internet (EI)-based vehicle to grid communication system","volume":"41","author":"Itoo","year":"2023","journal-title":"Veh Commun"},{"key":"10.1016\/j.compeleceng.2026.111096_b100","article-title":"A provably secure identity-based access control scheme for renewable energy internet of things","volume":"313","author":"Zhang","year":"2024","journal-title":"Energy"},{"key":"10.1016\/j.compeleceng.2026.111096_b101","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124151","article-title":"A survey of the fusion of traditional data security technology and blockchain","volume":"252","author":"Xu","year":"2024","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.compeleceng.2026.111096_b102","article-title":"Lightweight three-party key agreement for V2G networks with physical unclonable function","volume":"47","author":"Shui","year":"2024","journal-title":"Veh Commun"},{"key":"10.1016\/j.compeleceng.2026.111096_b103","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.08.031","article-title":"Provably secure certificate-based proxy blind signature scheme from pairings","volume":"468","author":"Verma","year":"2018","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111096_b104","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2020.106121","article-title":"PALK: Password-based anonymous lightweight key agreement framework for smart grid","volume":"121","author":"Khan","year":"2020","journal-title":"Int J Electr Power Energy Syst"},{"key":"10.1016\/j.compeleceng.2026.111096_b105","series-title":"IBM\u2019s roadmap for scaling quantum technology","author":"IBM Quantum website","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111096_b106","article-title":"A survey about post quantum cryptography methods","volume":"10","author":"Nithila","year":"2024","journal-title":"EAI Endorsed Trans Internet Things"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111096_b107","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1007\/s11401-023-0053-6","article-title":"Lattice-based cryptography: A survey","volume":"44","author":"Wang","year":"2023","journal-title":"Chin Ann Math Ser B"},{"key":"10.1016\/j.compeleceng.2026.111096_b108","series-title":"Post-quantum cryptography","author":"NIST website","year":"2024"},{"key":"10.1016\/j.compeleceng.2026.111096_b109","doi-asserted-by":"crossref","first-page":"39417","DOI":"10.1109\/ACCESS.2024.3374645","article-title":"Compact hybrid signature for secure transition to post-quantum era","volume":"12","author":"Kwon","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111096_b110","series-title":"2017 IEEE conference on energy internet and energy system integration (EI2)","first-page":"1","article-title":"Test analysis of practical quantum VPN gateway for electric power telecommunication security in energy internet","author":"Gao","year":"2017"},{"key":"10.1016\/j.compeleceng.2026.111096_b111","series-title":"2019 4th international conference on intelligent green building and smart grid","first-page":"54","article-title":"Research and applications of key technologies of quantum secure communication in energy internet","author":"Jia","year":"2019"},{"key":"10.1016\/j.compeleceng.2026.111096_b112","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1016\/j.ins.2020.09.004","article-title":"Access control encryption without sanitizers for internet of energy","volume":"546","author":"Wang","year":"2021","journal-title":"Inform Sci"},{"issue":"19","key":"10.1016\/j.compeleceng.2026.111096_b113","doi-asserted-by":"crossref","first-page":"7214","DOI":"10.3390\/s22197214","article-title":"A system-on-a-chip implementation of a post-quantum cryptography scheme for smart meter data communications","volume":"22","author":"Costa","year":"2022","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111096_b114","doi-asserted-by":"crossref","first-page":"5149","DOI":"10.1109\/TNSM.2024.3357103","article-title":"Q-secure-P2-SMA: Quantum-secure privacy-preserving smart meter authentication for unbreakable security in smart grid","volume":"21","author":"Prateek","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"6","key":"10.1016\/j.compeleceng.2026.111096_b115","doi-asserted-by":"crossref","first-page":"6810","DOI":"10.1109\/TNSM.2024.3445972","article-title":"Qska: A quantum secured privacy-preserving mutual authentication scheme for energy internet-based vehicle-to-grid communication","volume":"21","author":"Prateek","year":"2024","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10.1016\/j.compeleceng.2026.111096_b116","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1016\/j.future.2019.09.027","article-title":"Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach","volume":"110","author":"Guan","year":"2020","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"10.1016\/j.compeleceng.2026.111096_b117","doi-asserted-by":"crossref","first-page":"7495","DOI":"10.1109\/TVT.2021.3094907","article-title":"The blockchain solution for the security of internet of energy and electric vehicle interface","volume":"70","author":"Saha","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"issue":"13","key":"10.1016\/j.compeleceng.2026.111096_b118","doi-asserted-by":"crossref","first-page":"1992","DOI":"10.3390\/electronics11131992","article-title":"Editable and verifiable anonymous authentication incorporating blockchain in the internet of energy","volume":"11","author":"Zhang","year":"2022","journal-title":"Electronics"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b119","article-title":"A practical anonymous voting scheme based on blockchain for internet of energy","volume":"2022","author":"Hu","year":"2022","journal-title":"Secur Commun Networks"},{"key":"10.1016\/j.compeleceng.2026.111096_b120","series-title":"2023 5th international conference on pattern analysis and intelligent systems","first-page":"1","article-title":"Enhancing security and authentication in IoT-based energy internet using post-quantum blockchain","author":"Benrebbouh","year":"2023"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b121","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1504\/IJSNET.2023.133813","article-title":"A lightweight security scheme to defend against quantum attack in IoT-based energy internet","volume":"43","author":"Benrebbouh","year":"2023","journal-title":"Int J Sens Networks"},{"key":"10.1016\/j.compeleceng.2026.111096_b122","series-title":"2023 6th international conference on information communication and signal processing","first-page":"711","article-title":"BCACP-IoE: A novel blockchain-based security access control protocol for internet of energy","author":"Chen","year":"2023"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111096_b123","first-page":"6323","article-title":"A secure energy internet scheme for IoV based on post-quantum blockchain","volume":"75","author":"Zhang","year":"2023","journal-title":"Comput Mater Contin"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111096_b124","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/s12083-023-01580-z","article-title":"Enhanced secure and efficient mutual authentication protocol in iot-based energy internet using blockchain","volume":"17","author":"Benrebbouh","year":"2024","journal-title":"Peer-To-Peer Netw Appl"},{"issue":"15","key":"10.1016\/j.compeleceng.2026.111096_b125","doi-asserted-by":"crossref","first-page":"29570","DOI":"10.1109\/JIOT.2025.3569699","article-title":"Attribute-based policy-hiding redactable blockchain with authorizable verification for energy internet","volume":"12","author":"Xue","year":"2025","journal-title":"IEEE Internet Things J"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001680?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001680?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T17:28:56Z","timestamp":1772818136000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626001680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":125,"alternative-id":["S0045790626001680"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111096","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A survey of quantum and blockchain security solutions for IoT-based Energy Internet","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111096","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111096"}}