{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T01:14:35Z","timestamp":1772327675422,"version":"3.50.1"},"reference-count":190,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/jproc.2024.3520803","type":"journal-article","created":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T18:44:23Z","timestamp":1737657863000},"page":"1686-1715","source":"Crossref","is-referenced-by-count":8,"title":["Building Resilient Web 3.0 Infrastructure With Quantum Information Technologies and Blockchain: An Ambilateral View"],"prefix":"10.1109","volume":"112","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3166-1405","authenticated-orcid":false,"given":"Xiaoxu","family":"Ren","sequence":"first","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8203-8146","authenticated-orcid":false,"given":"Minrui","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science (CCDS), Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science (CCDS), Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-3490","authenticated-orcid":false,"given":"Jiawen","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Tampines, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2224-2292","authenticated-orcid":false,"given":"Chao","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1391-7363","authenticated-orcid":false,"given":"Haipeng","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7223-1030","authenticated-orcid":false,"given":"Xiaofei","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3217565"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3143147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-07449-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.22331\/q-2021-04-15-433"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-12412-0"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2022.0130167"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3397166.3412802"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.32604\/jqc.2019.06715"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/quantum1010002"},{"key":"ref12","article-title":"Quantum solutions to possible challenges of blockchain technology","author":"Dey","year":"2021","journal-title":"arXiv:2110.05321"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18235\/0003313"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3355222"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.134.2200578"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-021-00993-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.042334"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3000734"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102361"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.032316"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.042312"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IIPHDW.2019.8755433"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2018.8441990"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref26","article-title":"In-edge AI: Intelligentizing mobile edge computing, caching and communication by federated learning","author":"Wang","year":"2018","journal-title":"arXiv:1809.07857"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14763\/2021.2.1556"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"issue":"1","key":"ref29","first-page":"1","article-title":"PPCoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"King","year":"2012","journal-title":"Self-Published Paper, August"},{"key":"ref30","first-page":"1","article-title":"PBFT vs proof-of-authority: Applying the cap theorem to permissioned blockchain","volume-title":"CEUR Workshop Proc.","author":"De Angelis"},{"key":"ref31","volume-title":"Token Economy: How the Web3 Reinvents the Internet","volume":"2","author":"Voshmgir","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2022.06.002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2022.3181504"},{"key":"ref34","article-title":"Exploring Web3 from the view of blockchain","author":"Wang","year":"2022","journal-title":"arXiv:2206.08821"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3348449"},{"key":"ref36","volume-title":"Explore the Growth Potential of Digital Assets","year":"2024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.004.2200473"},{"key":"ref38","article-title":"Web3 challenges and opportunities for the market","author":"Sheridan","year":"2022","journal-title":"arXiv:2209.02446"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3228530"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2007.22"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2015.154"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0400-50"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1126\/science.282.5389.706"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.81.1301"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1038\/npjqi.2016.25"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.81.3283"},{"key":"ref47","article-title":"Explainer: What is quantum communication?","author":"Giles","year":"2021","journal-title":"MIT Technology Review"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.81.2594"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1038\/35106500"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2009.231"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1038\/nature07127"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1126\/science.aam9288"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-01835-3"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1126\/science.aax0578"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2416\/1\/012001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/61\/2\/002"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.1334"},{"key":"ref58","article-title":"Quantum computing and the entanglement frontier","author":"Preskill","year":"2012","journal-title":"arXiv:1203.5813"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.833672"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.127.180501"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-023-00599-8"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PIERS.2016.7735503"},{"key":"ref63","article-title":"Efficient quantum algorithm for solving travelling salesman problem: An IBM quantum experience","author":"Srinivasan","year":"2018","journal-title":"arXiv:1805.10928"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100619"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3572771"},{"key":"ref66","article-title":"Post-quantum cryptography for Internet of Things: A survey on performance and optimization","author":"Liu","year":"2024","journal-title":"arXiv:2401.17538"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_6"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2015.7315144"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4018\/ADMDM"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3208123"},{"key":"ref73","article-title":"Quantum-enhanced logic-based blockchain I: Quantum honest-success Byzantine agreement and qulogicoin","author":"Sun","year":"2018","journal-title":"arXiv:1805.06768"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107693"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/e21090887"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.01.0024"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.bdr.2021.100268"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-5652-4_7"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0945-8_17"},{"key":"ref80","first-page":"1","article-title":"RQPoA: A random quantum PoA consensus mechanism in blockchain based on quantum methods","author":"WANG","year":"2024","journal-title":"Res. Square"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3203316"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/e22101152"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3539604"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT47744.2019.9001979"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms11712"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2019.143"},{"key":"ref87","article-title":"Efficient quantum non-fungible tokens for blockchain","author":"Pandey","year":"2022","journal-title":"arXiv:2209.02449"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.284"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941153"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/e23111520"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00901-w"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/e23091120"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8772700"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413-upd1"},{"key":"ref95","first-page":"69","article-title":"Status report on the second round of the NIST post-quantum cryptography standardization process","volume":"2","author":"Alagic","year":"2020"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_22"},{"key":"ref97","first-page":"288","article-title":"Cryptanalysis of HFEv and internal perturbation of HFE","volume-title":"Public Key Cryptography","volume":"3386","author":"Ding","year":"2005"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref99","first-page":"327","article-title":"Post-quantum key exchange\u2014A new hope","volume-title":"Proc. USENIX Secur. Symp.","author":"Alkim"},{"key":"ref100","volume-title":"Google Blog Google\u2019s Experiments With a Hybrid Cryptosystem","year":"2024"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-020-10272-1"},{"key":"ref102","article-title":"Quantum digital signatures","author":"Gottesman","year":"2001","journal-title":"arXiv:quant-ph\/0105032"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2827203"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788411"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886554"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_31"},{"key":"ref107","first-page":"1","article-title":"QChain: Quantum-resistant and decentralized PKI using blockchain","volume-title":"Proc. Symp. Cryptogr. Inf. Secur. (SCIS)","author":"An"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.080504"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033221"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.873601"},{"key":"ref111","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"4244","author":"McEliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_16"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.12.045"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3260579"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2010.14"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-012-0398-3"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-016-3266-6"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-017-3464-x"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-021-03126-9"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-019-04024-8"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3929-6"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_5"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-017-1805-6"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-015-1202-y"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.3390\/e22121377"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.167039"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TQE.2022.3207111"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.7498\/aps.58.7668"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.22331\/q-2020-07-16-297"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102673"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.3390\/math8122218"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503089"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2886016"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771830"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055530"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30429-4_11"},{"key":"ref140","article-title":"Loading classical data into a quantum computer","author":"Cortese","year":"2018","journal-title":"arXiv:1803.01958"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09372-x"},{"key":"ref142","article-title":"Component mixers and a hardness result for counterfeiting quantum money","author":"Lutomirski","year":"2011","journal-title":"arXiv:1107.0321"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05616-2"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3383668"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04412-8"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4245-9"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2432800"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051362"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2012.2222404"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417266"},{"key":"ref153","article-title":"Non-fungible token (NFT): Overview, evaluation, opportunities and challenges","author":"Wang","year":"2021","journal-title":"arXiv:2105.07447"},{"key":"ref154","volume-title":"Quantum Technology\u2019s Impact on the Metaverse","year":"2024"},{"key":"ref155","volume-title":"Does Quantum Computing Have a Role to Play in the Metaverse","year":"2024"},{"key":"ref156","volume-title":"British Security Company Quantum Dice","year":"2024"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM57956.2023.00075"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102549"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102780"},{"key":"ref160","first-page":"1171","article-title":"Post-quantum blockchain for a scalable smart city post-quantum blockchain for a scalable smart city","volume":"21","author":"el Azzaoui","year":"2020","journal-title":"J. Internet Technol."},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2775180"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA54161.2022.9870964"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.09.028"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3288199"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3378922"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103304"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07388-x"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/s13132-023-01560-x"},{"key":"ref169","article-title":"Anonymous voting scheme using quantum assisted blockchain","author":"Mishra","year":"2022","journal-title":"arXiv:2206.03182"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935895"},{"key":"ref171","first-page":"236","article-title":"Certificateless ring signatures","volume":"2007","author":"Chow","year":"2007","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1504\/ijes.2021.10044056"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3138753"},{"key":"ref174","volume-title":"IBM Quantum","year":"2024"},{"key":"ref175","volume-title":"Think Quantum","year":"2024"},{"key":"ref176","article-title":"Alibaba cloud quantum development platform: Surface code simulations with crosstalk","author":"Huang","year":"2020","journal-title":"arXiv:2002.08918"},{"key":"ref177","volume-title":"Qanplatform Launches the Quantum-resistant Private Blockchain: The New Era for Web 3.0 Os","year":"2024"},{"key":"ref178","volume-title":"Ethereum Virtual Machine (EVM)","year":"2024"},{"key":"ref179","volume-title":"The Quantum Secure Blockchain Platform","year":"2024"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1364\/OE.396461"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.89.015004"},{"key":"ref182","volume-title":"Falcon Github","year":"2024"},{"key":"ref183","volume-title":"Eip-155","year":"2024"},{"key":"ref184","volume-title":"W3c Did Standard","year":"2024"},{"key":"ref185","volume-title":"The Road to Account Abstraction on Ethereum","year":"2024"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD51990.2021.9458982"},{"key":"ref187","volume-title":"IBM\u2019s \u2018condor\u2019 Quantum Computer Has More Than 1000 Qubits","year":"2024"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.275"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1080\/13873954.2019.1677725"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-03869-3"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5\/10870449\/10850749.pdf?arnumber=10850749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T18:55:18Z","timestamp":1738781718000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10850749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":190,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2024.3520803","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}