{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:15:34Z","timestamp":1777634134635,"version":"3.51.4"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Brazilian National Council for Scientific and Technological Development CNPq","award":["309335\/2017-5"],"award-info":[{"award-number":["309335\/2017-5"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tsc.2021.3116896","type":"journal-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T20:39:31Z","timestamp":1633034371000},"page":"1-1","source":"Crossref","is-referenced-by-count":48,"title":["A Blockchain Framework in Post-Quantum Decentralization"],"prefix":"10.1109","author":[{"given":"Rahul","family":"Saha","sequence":"first","affiliation":[]},{"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Tannishtha","family":"Devgun","sequence":"additional","affiliation":[]},{"given":"William","family":"Buchanan","sequence":"additional","affiliation":[]},{"given":"Reji","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Mamoun","family":"Alazab","sequence":"additional","affiliation":[]},{"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2009"},{"key":"ref2","article-title":"The future of blockchain in 8 charts","author":"Allidina","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2928178"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957660"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8775-3_8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902501"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.12.019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.103409"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"ref10","first-page":"124","volume-title":"Proc. Annu. Symp. Found. Comput. Sci.","author":"Shor"},{"key":"ref11","article-title":"Quantum computing: The risk to existing encryption methods","author":"Kirsch","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2016.1226650"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-008-0055-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S1007-0214(09)70101-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_139"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.03.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.037"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.060"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.12.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.076"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(15)60691-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_39"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.032"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329826"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-75"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.035"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.086"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.11.035"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.12.018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.12.003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102429"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2971342"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCCE48743.2019.00155"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2943379"},{"key":"ref38","volume-title":"Blockchain for Dummies-IBM Limited Edition","author":"Gupta","year":"2017"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886554"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/quantum1010002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b"},{"key":"ref42","article-title":"Lattice-based Cryptography","author":"Micciancio","year":"2021"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.46586\/tches.v2021.i3.334-359","article-title":"Attacking and defending masked polynomial comparison for Lattice-based cryptography","author":"Bhasin","year":"2021"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97916-8_19"},{"key":"ref45","article-title":"Aggregation of gamma-signatures and applications to bitcoin","author":"Zhao","year":"2018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847411"},{"key":"ref47","article-title":"Comparing proofs of security for lattice-based encryption","author":"Bernstein","year":"2019"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.12.003"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/4629387\/09555239.pdf?arnumber=9555239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:37:44Z","timestamp":1705016264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9555239\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tsc.2021.3116896","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}