{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:05:20Z","timestamp":1763345120641,"version":"3.45.0"},"reference-count":28,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067078","type":"journal-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T07:42:27Z","timestamp":1752219747000},"page":"875-903","source":"Crossref","is-referenced-by-count":0,"title":["Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi"],"prefix":"10.32604","volume":"85","author":[{"given":"Ahmed I.","family":"Alutaibi","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA); 2023 Aug 3\u20135","first-page":"1196","article-title":"Secure digital identity using non-fungible tokens","author":"Agarkhed","year":"2023"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"18660","DOI":"10.1109\/ACCESS.2025.3529309","article-title":"Blockchain-enabled zero trust architecture for privacy-preserving cybersecurity in IoT environments","volume":"13","author":"Aleisa","year":"2025","journal-title":"IEEE Access"},{"journal-title":"The digital transformation of logistics: demystifying impacts of the fourth industrial revolution","year":"2021","author":"Ar\u00e1nguiz","key":"ref3"},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"Baseri Y, Hafid A, Shahsavari Y, Makrakis D, Khodaiemehr H. Blockchain security risk assessment in quantum era, migration strategies and proactive defense. arXiv:2501.11798. 2025.","DOI":"10.1109\/COMST.2025.3621113"},{"key":"ref5","series-title":"2023 IEEE International Workshop on Sport, Technology and Research (STAR); 2023 Sep 14\u201316","first-page":"85","article-title":"Event management evolution through non-fungible tokens","volume":"2023","author":"Calderone"},{"key":"ref6","series-title":"2022 International Conference on Blockchain Technology and Information Security (ICBCTIS); 2022 Jul 15\u201317","first-page":"138","article-title":"The secure data sharing and interchange model based on blockchain for single window in trade facilitation","volume":"2022","author":"Dong"},{"key":"ref7","series-title":"2024 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE); 2024 Feb 16\u201317","first-page":"389","article-title":"Blockchain-powered KYC in a CBDC world: the E-rupee experience","volume":"2024","author":"Dumbre"},{"key":"ref8","series-title":"2024 International Conference on Emerging Research in Computational Science (ICERCS); 2024 Dec 12\u201314","first-page":"1","article-title":"Quantum-safe federated learning: enhancing data privacy and security","volume":"2024","author":"Kannan"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4493","DOI":"10.1109\/TNSE.2024.3428916","article-title":"Novel blockchain-integrated quantum-resilient self-certified authentication protocol for cross-industry communications","volume":"11","author":"Ghaemi","year":"2024","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref10","series-title":"14th International Conference on Computer Engineering and Systems (ICCES); 2019 Dec 17","first-page":"112","article-title":"Quantum attacks and defenses for proof-of-stake","volume":"2019","author":"Khalifa"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1109\/TII.2020.3047840","article-title":"Toward smart manufacturing using spiral digital twin framework and twinchain","volume":"18","author":"Khan","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref12","first-page":"1","article-title":"Quantum-secure hybrid blockchain system for DID-based verifiable random function with NTRU linkable ring signature","volume":"13","author":"Kim","year":"2023","journal-title":"Int J Cryptogr Inf Secur"},{"key":"ref13","series-title":"2023 20th Annual International Conference on Privacy, Security and Trust (PST); 2023 Aug 21\u201323","first-page":"1","article-title":"Course-correct to DeFi lacking default deficiency","volume":"2023","author":"Kravitz"},{"key":"ref14","series-title":"2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies; 2023 Mar 22\u201323","first-page":"1","article-title":"Using blockchain technology for transparent and secure financial transactions in the contemporary business landscape","volume":"2024","author":"L"},{"key":"ref15","series-title":"2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS); 2024 Aug 23\u201324","first-page":"1","article-title":"Decentralized online marketplace using blockchain technology for sustainable development","volume":"2024","author":"N"},{"key":"ref16","series-title":"2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS); 2024 Nov 7\u20139","first-page":"1","article-title":"Enhancing decentralized finance for scalability, interoperability, and user experience","volume":"2024","author":"Nalini"},{"key":"ref17","series-title":"2024 IEEE International Conference and Expo on Real Time Communications at IIT (RTC); 2024 Oct 8\u20139","first-page":"23","article-title":"Enhanced DeFi security on XRPL with zero-knowledge proofs and speaker verification","volume":"2024","author":"Pantiukhov"},{"key":"ref18","series-title":"4th International Conference on Hot Information-Centric Networking (HotICN); 2021 Nov 25\u201327","first-page":"7","article-title":"Research on cross-chain communication based on decentralized identifier","volume":"2021","author":"Peng"},{"key":"ref19","series-title":"2023 13th International Symposium on Advanced Topics in Electrical Engineering (ATEE); 2023 Mar 23\u201325","first-page":"1","article-title":"A practical implementation of a digital document signature system using blockchain","volume":"2023","author":"Petcu"},{"key":"ref20","series-title":"2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT); 2024 Jul 4\u20135","first-page":"1","article-title":"Investigation of decentralized autonomous blockchain enabled platform for crowd funding","volume":"2024","author":"Rajmohan"},{"key":"ref21","unstructured":"Ranjan R, Gupta S, Singh SN. Loka protocol: a decentralized framework for trustworthy and ethical AI agent ecosystems. arXiv:2504.10915. 2025."},{"key":"ref22","series-title":"2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL); 2025 Feb 18\u201320","first-page":"453","article-title":"A review on the role of blockchain technology for decentralized identity management: a future without passwords","volume":"2025","author":"Raut"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/JPROC.2024.3520803","article-title":"Building resilient web 3.0 infrastructure with quantum information technologies and blockchain: an ambilateral view","volume":"112","author":"Ren","year":"2024","journal-title":"Proc IEEE"},{"key":"ref24","series-title":"2024 International Conference on Automation and Computation (AUTOCOM); 2024 Mar 14\u201316","first-page":"325","article-title":"Qualitative analysis and quantitative analysis of decentralized file storage technologies for pharmaceutical records","volume":"2024","author":"Sharma"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"7876","DOI":"10.1109\/JSTARS.2025.3540905","article-title":"A novel hybrid quantum-crypto standard to enhance security and resilience in 6G-enabled IoT networks","volume":"18","author":"Singamaneni","year":"2025","journal-title":"IEEE J Sel Top Appl Earth Obs Remote Sens"},{"key":"ref26","series-title":"2024 International Conference on Inventive Computation Technologies (ICICT); 2024 Apr 24\u201326","first-page":"1536","article-title":"Blockchain-based cryptocurrency security analysis technology\u2014a review","volume":"2024","author":"Thakre"},{"key":"ref27","series-title":"2024 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE); 2024 Feb 16\u201317","first-page":"109","article-title":"Unlocking borderless identity: B-passport and the blockchain revolution","volume":"2024","author":"Tonoy"},{"key":"ref28","series-title":"2022 4th International Conference on Advancements in Computing (ICAC); 2022 Dec 9\u201310","first-page":"328","article-title":"Decentralized property registration and management platform","volume":"2022","author":"Yasas"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_67078\/TSP_CMC_67078.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:01:12Z","timestamp":1763344872000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067078","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}