{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T03:04:54Z","timestamp":1771556694601,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,16]]},"DOI":"10.1109\/icecet58911.2023.10389558","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:28:53Z","timestamp":1705948133000},"page":"1-9","source":"Crossref","is-referenced-by-count":11,"title":["Towards Building Quantum Resistant Blockchain"],"prefix":"10.1109","author":[{"given":"Sumit","family":"Chauhan","sequence":"first","affiliation":[{"name":"Naoris Tech Inc.,New Caslte County,Delaware,USA"}]},{"given":"Vaghawan Prasad","family":"Ojha","sequence":"additional","affiliation":[{"name":"Mississippi State University,Department of Mathematics and Statistics,Starkville,MS,USA"}]},{"given":"Shantia","family":"Yarahmadian","sequence":"additional","affiliation":[{"name":"Mississippi State University,Department of Mathematics and Statistics,Starkville,MS,USA"}]},{"given":"David","family":"Carvalho","sequence":"additional","affiliation":[{"name":"Naoris Tech Inc.,New Caslte County,Delaware,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/61\/2\/002"},{"key":"ref2","volume-title":"Quantum Computing: Progress and Prospects","author":"Sciences","year":"2019"},{"key":"ref3","article-title":"Fast tracking quantum-computing tech","volume-title":"Nature Research Custom Media and Q.","year":"2023"},{"key":"ref4","volume-title":"Superposition and entanglement","year":"2023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jctc.2c00574"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-023-01692-9"},{"key":"ref7","author":"Beverland","year":"2022","journal-title":"Assessing requirements to scale to practical quantum advantage"},{"key":"ref8","article-title":"The early days of quantum computation","volume-title":"ArXiv Preprint","author":"Shor","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(97)81332-5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1226650"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref12","author":"Gheorghiu","year":"2019","journal-title":"Benchmarking the quan-tum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes"},{"key":"ref13","volume-title":"Modern Cryptography","author":"Zheng","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"ref15","volume-title":"Blockchain technology market size, share growth [2030]","author":"Insights","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_60601"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2018.127"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3296559"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2021.100065"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18235\/0003313"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_386"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/B978-0-12-383874-2.00001-1","article-title":"Chapter 1 - preliminaries","volume-title":"Classical and Quantum Information","author":"Marinescu","year":"2012"},{"key":"ref24","article-title":"Benefits of blockchain - ibm blockchain - ibm","volume-title":"IBM","year":"2023"},{"key":"ref25","volume-title":"[ep -7] the magic behind blockchain: Practical bft \u2014 naoris protocol","author":"Protocol","year":"2023"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","article-title":"Chapman & Hall\/Crc Cryptography and Network Security Series, Chapman & Hall\/CRC","author":"Katz","year":"2007","journal-title":"Introduction to Modern Cryptog-raphy"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052227"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/B978-0-12-386870-1.50022-8","article-title":"A digital signature scheme secure against adaptive chosen mes-sage attack: Extended abstract","volume-title":"Discrete Algorithms And Complexity","author":"Goldwasser","year":"1987"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref30","author":"Kaliski","year":"2023","journal-title":"The mathematics of the rsa public-key cryptosystem"},{"key":"ref31","volume-title":"Ecdsa: Elliptic curve signatures - practical cryptography for developers","year":"2023"},{"key":"ref32","author":"Wohlwend","year":"2016","journal-title":"Elliptic curve cryptography: Pre and post quantum"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8105"},{"key":"ref34","volume-title":"Pqcrypto ict-645622","year":"2023"},{"key":"ref35","volume-title":"Home - open quantum safe","year":"2023"},{"key":"ref36","volume-title":"Kyber","year":"2023"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref38","volume-title":"Saber: Lwr-based kem","year":"2023"},{"key":"ref39","volume-title":"Dilithium","year":"2023"},{"key":"ref40","volume-title":"Falcon","year":"2023"},{"key":"ref41","volume-title":"Pqcrainbow","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_14"},{"key":"ref43","author":"Li","year":"2022","journal-title":"A tutorial introduction to lattice-based cryptography and homomorphic encryption"},{"key":"ref44","volume-title":"Eip-2938: Account abstraction","year":"2023"},{"key":"ref45","article-title":"Constructing digital signatures from a one way function","volume-title":"Tech. Rep. CSL-98, October 1979. This paper was published by IEEE in the Proceedings of HICSS-43","author":"Lamport"},{"key":"ref46","volume-title":"Erc-2333: Bls12\u2013381 key generation","year":"2023"},{"key":"ref47","volume-title":"microsoft.github.io\/picnic\/","year":"2023"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.18235\/0003747","article-title":"Inter-American Develop-ment Bank","author":"Allende","year":"2021","journal-title":"LACChain Framework for Permissioned Public Blockchain Networks: From Blockchain Technol-ogy to Blockchain Networks"},{"key":"ref49","volume-title":"Lacchain","year":"2023"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b"}],"event":{"name":"2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Cape Town, South Africa","start":{"date-parts":[[2023,11,16]]},"end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10389177\/10389181\/10389558.pdf?arnumber=10389558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T01:59:51Z","timestamp":1706752791000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10389558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,16]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/icecet58911.2023.10389558","relation":{},"subject":[],"published":{"date-parts":[[2023,11,16]]}}}