{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T16:33:36Z","timestamp":1778690016228,"version":"3.51.4"},"reference-count":210,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"FCT\u2014Foundation for Science and Technology, I.P.\/MCTES through National Funds"},{"DOI":"10.13039\/501100001871","name":"scope of CISUC R&D Unit","doi-asserted-by":"publisher","award":["UIDP\/00326\/2020"],"award-info":[{"award-number":["UIDP\/00326\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Development Fund, Macau, SAR","award":["0044\/2022\/A1"],"award-info":[{"award-number":["0044\/2022\/A1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/comst.2024.3355222","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T13:39:09Z","timestamp":1705498749000},"page":"1748-1774","source":"Crossref","is-referenced-by-count":106,"title":["Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8722-5266","authenticated-orcid":false,"given":"Hadi","family":"Gharavi","sequence":"first","affiliation":[{"name":"Center for Informatics and Systems, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6714-1164","authenticated-orcid":false,"given":"Jorge","family":"Granjal","sequence":"additional","affiliation":[{"name":"Center for Informatics and Systems, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1615-2925","authenticated-orcid":false,"given":"Edmundo","family":"Monteiro","sequence":"additional","affiliation":[{"name":"Center for Informatics and Systems, University of Coimbra, Coimbra, Portugal"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Smart fridge freezer | Samsung family HubTM | Samsung U.K.","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0530-y"},{"key":"ref3","volume-title":"IoT connected devices worldwide 2019\u20132030","author":"Vailshery","year":"2023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212647"},{"key":"ref5","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102936"},{"key":"ref7","volume-title":"Helium\u2013Introducing the people\u2019s network","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051602"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2827203"},{"key":"ref12","volume-title":"Nexus: Connecting a decentralized world","year":"2023"},{"key":"ref13","volume-title":"QRL: The quantum resistant ledger","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040630"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-019-00079-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106585"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03625-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100174"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03380-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/iot2010005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3572771"},{"key":"ref27","article-title":"Preparation for postquantum era: A survey about blockchain schemes from a post-quantum perspective","author":"Ciulei","year":"2022"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/isdfs58141.2023.10131840"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1985.0070"},{"key":"ref30","volume-title":"Submission requirements and evaluation criteria for the postquantum cryptography standardization process","year":"2017"},{"key":"ref31","volume-title":"IBM\u2018s roadmap for scaling quantum technology","year":"2021"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.26421\/QIC3.4-3"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036"},{"key":"ref35","volume-title":"European project: PQCRYPTO ICT-645622","year":"2018"},{"key":"ref36","volume-title":"Announcing PQC candidates to be standardized, plus fourth round candidates\u2014CSRC\u2014csrc.nist.gov","year":"2022"},{"key":"ref37","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"44","author":"McEliece","year":"1978","journal-title":"Coding THV"},{"issue":"2","key":"ref38","first-page":"157","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"Niederreiter","year":"1986","journal-title":"Prob. Control Inform. Theory"},{"key":"ref39","volume-title":"Constructing digital signatures from a one way function","author":"Lamport","year":"1979"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38553-7_10"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2013.053435"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_39"},{"key":"ref45","volume-title":"PQCRainbow","year":"2024"},{"key":"ref46","volume-title":"Round 2 submissions-post-quantum cryptography | CSRC | CSRC","year":"2017"},{"key":"ref47","article-title":"Public-key cryptosystem based on isogenies","author":"Rostovtsev","year":"2006"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0016"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2943136"},{"key":"ref50","volume-title":"SIKE\u2013Supersingular isogeny key encapsulation","year":"2024"},{"key":"ref51","volume-title":"pqm4 library, benchmarking and testing framework","year":"2022"},{"key":"ref52","volume-title":"Kyber","author":"Schwabe","year":"2019"},{"key":"ref53","volume-title":"NTRU Prime Project","year":"2023"},{"key":"ref54","volume-title":"OpenSSH project","year":"2023"},{"key":"ref55","volume-title":"NewHope","author":"Osheter","year":"2019"},{"key":"ref56","volume-title":"Experimenting with post-quantum cryptography","year":"2023"},{"key":"ref57","volume-title":"libpqcrypto: Intro","year":"2023"},{"key":"ref58","volume-title":"Open quantum safe project: Open-source software for prototyping quantum-resistant cryptography","year":"2023"},{"key":"ref59","volume-title":"Pqc standardization process: Announcing four candidates to be standardized, plus fourth round candidates","year":"2022"},{"key":"ref60","first-page":"353","article-title":"CRYSTALS-Kyber: A CCA-secure module-latticebased KEM","volume-title":"Proc. IEEE Eur. Symp. Security Privacy (EuroS&P)","author":"Bos"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25360-2_4"},{"key":"ref63","volume-title":"Recommendation for stateful hash-based signature schemes","author":"Cooper","year":"2023"},{"key":"ref64","volume-title":"IOTA: A distributed ledger project","year":"2024"},{"key":"ref65","volume-title":"Dilithium-signature","author":"Schwabe","year":"2024"},{"issue":"5","key":"ref66","first-page":"1","article-title":"Falcon: Fast-Fourier lattice-based compact signatures over NTRU","volume":"36","author":"Fouque","year":"2018","journal-title":"Submission NIST\u2019s Post-Quant. Cryptogr. Standardization Process"},{"key":"ref67","author":"Schwabe","year":"2023","journal-title":"SPHINCS+: A stateless hash-based signature scheme"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"ref69","first-page":"327","article-title":"Post-quantum key exchange\u2014A new hope","volume-title":"Proc. 25th USENIX Security Symp.","author":"Alkim"},{"key":"ref70","volume-title":"Sphincs+ submission to the NIST postquantum project, v.3.1","author":"Aumasson","year":"2022"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"ref72","first-page":"4","article-title":"Requirements for post-quantum cryptography on embedded devices in the IoT","volume-title":"Proc. NIST PQC Conf.","author":"Atkins"},{"key":"ref73","first-page":"1","article-title":"A hardware evaluation study of nist post-quantum cryptographic signature schemes","volume-title":"Proc. 2nd PQC Standardization Conf.","author":"Soni"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/s22072484"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538766"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488023"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.07.104"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"ref80","volume-title":"FrodoKEM-practical quantum-secure key encapsulation from generic lattices","year":"2024"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_15"},{"key":"ref82","volume-title":"NTRU: A submission to the NIST post-quantum standardization effort","author":"Schwabe","year":"2024"},{"key":"ref83","volume-title":"SABER: LWR-based KEM","year":"2024"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/s22020489"},{"key":"ref85","first-page":"1","article-title":"Feasibility and performance of PQC algorithms on microcontrollers","volume-title":"Proc. NIST PQC Standardization Conf.","author":"Hession"},{"key":"ref86","volume-title":"ThreeBears: Post-quantum encryption algorithms","year":"2024"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0467-3"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2020.103276"},{"key":"ref90","volume-title":"Welcome to ethereum project","year":"2024"},{"key":"ref91","volume-title":"Home\u2013EOSIO blockchain software & services","year":"2024"},{"key":"ref92","volume-title":"Corda: scalable, permissioned peer-to-peer (P2P) distributed ledger technology","year":"2024"},{"key":"ref93","volume-title":"Crypto solutions for business | ripple","year":"2024"},{"key":"ref94","volume-title":"Lto Network-Start Your Journey: Next-Gen Blockchain for B2B, Identities, Privacy, Ownership and Digital Collectibles","year":"2024"},{"key":"ref95","volume-title":"Holochain: App framework with P2P networking","year":"2024"},{"key":"ref96","volume-title":"Multichain: Enterprise blockchain platform to build and deploy blockchain applications with speed","year":"2024"},{"key":"ref97","volume-title":"Hyperledger\u2013Open source blockchain technologies","year":"2024"},{"key":"ref98","volume-title":"ConsenSys quorum: Build on quorum, the complete open source blockchain platform for business","year":"2024"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.3390\/s21093001"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.019"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"ref103","volume-title":"Oracle Blockchain Quick Start Guide: A Practical Approach to Implementing Blockchain in Your Enterprise","author":"Acharya","year":"2019"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3048853"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/icce.2019.8662009"},{"key":"ref106","volume-title":"proof-of-coverage | helium documentation","year":"2024"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287023"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref110","volume-title":"IoTeX-building the connected world","year":"2024"},{"key":"ref111","volume-title":"MXC foundation: Building a crowdsourced IoT network","year":"2024"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377385"},{"key":"ref113","volume-title":"Reapchain project","year":"2021"},{"key":"ref114","volume-title":"CPChain\u2014A new distributed infrastructure for next generation IoT","year":"2024"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSBA.2018.00045"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5597679"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2018.12.024"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22482-0_16"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-020-0214-5"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2018.8531125"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33506-9_70"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00880-z"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162759"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.3390\/s21154955"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2998159"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98911-2_3"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878406"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3141490"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964880"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2020.106610"},{"key":"ref135","first-page":"1","article-title":"Product lifecycle management (PLM)","volume-title":"Product Lifecycle Management","volume":"1","author":"Stark","year":"2020"},{"key":"ref136","volume-title":"Bitcoin post-quantum","year":"2024"},{"key":"ref137","volume-title":"EIP-4844: Shard blob transactions","year":"2024"},{"key":"ref138","volume-title":"IoTex security considerations","year":"2024"},{"key":"ref139","volume-title":"Cardano (ADA) is getting prepared for the age of quantum computing","year":"2024"},{"key":"ref140","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-208","article-title":"Recommendation for stateful hash-based signature schemes","author":"Cooper","year":"2020"},{"key":"ref141","volume-title":"Komodo integrates dilithium: A quantum-secure digital signature scheme","year":"2019"},{"key":"ref142","volume-title":"Tidecoin post-quantum safe cryptocurrency\u2013Tidecoin","year":"2024"},{"key":"ref143","volume-title":"Abelian foundation: Post-quantum layer-1 blockchain","year":"2024"},{"key":"ref144","volume-title":"Lacchain: A global alliance made up of different actors in the blockchain environment","year":"2024"},{"key":"ref145","volume-title":"QANplatform | QAN blockchain platform","year":"2003"},{"key":"ref146","volume-title":"Hcash: A decentralised and open-source cross-platform cryptocurrency","year":"2024"},{"key":"ref147","volume-title":"Bid lab: Innovation laboratory of the inter-american development bank group","year":"2024"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3116896"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886554"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.032"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_32"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354200"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93944-1_21"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8987-1_23"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102780"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3243588"},{"key":"ref159","volume-title":"Securing communication with transport layer security (TLS)\u2014Hyperledger-fabricdocs main documentation","year":"2023"},{"key":"ref160","volume-title":"Use TLS-Quorum key manager","year":"2024"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-32701-6"},{"key":"ref162","volume-title":"ImperialViolet-CECPQ1 results","year":"2016"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"ref164","volume-title":"Post-quantum Cryptography","year":"2014"},{"key":"ref165","volume-title":"Protecting chrome traffic with hybrid kyber KEM","year":"2023"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423350"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography6030032"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.3390\/e21090887"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.3390\/e23091120"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3064053"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3095192"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3144785"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-96466-5_2"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ICIBT52874.2022.9807757"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106581"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0279429"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2100148"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2022-spring54318.2022.9860421"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473524"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49033.2022.9700534"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.3390\/s22072604"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.3390\/s22197535"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013321"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756673"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936278"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944400"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3152546"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103275"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102504"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref193","volume-title":"The monero project","year":"2024"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7748"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_10"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03092-1"},{"key":"ref197","volume-title":"Zcash: Privacy-protecting digital currency","year":"2024"},{"key":"ref198","article-title":"Efficient and post-quantum zero-knowledge proofs for blockchain confidential transaction protocols","author":"Shang","year":"2021"},{"key":"ref199","article-title":"Toward a postquantum zero-knowledge verifiable credential system for self-sovereign identity","author":"Dutto","year":"2022"},{"key":"ref200","article-title":"Isogeny-based quantumresistant undeniable blind signature scheme","author":"Srinath","year":"2016"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102686"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_7"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134028"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_25"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586131"},{"key":"ref207","first-page":"150","article-title":"A hybrid lattice-reduction and meet-in-themiddle attack against NTRU","volume-title":"Proc. 27th Annu. Int. Cryptol. Conf. Adv. Cryptol.","author":"Howgrave-Graham"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3227394"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_9"},{"key":"ref210","volume-title":"Synchronization Solana docs","year":"2017"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10643726\/10401941.pdf?arnumber=10401941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T00:30:46Z","timestamp":1725064246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10401941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":210,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3355222","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.22821692","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.22821692.v1","asserted-by":"object"}]},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}