{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:07:41Z","timestamp":1760148461444,"version":"build-2065373602"},"reference-count":41,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T00:00:00Z","timestamp":1683504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>A \u201cconfidential monetary value\u201d carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential monetary values\u2014large-sized blockchains with large verification times\u2014have the least scalability because they need to save and verify more information than those with \u201cplain-text monetary values\u201d. High scalability is an essential security requirement for decentralized blockchain payment systems because the more honest peers who can afford to verify the blockchain copies are, the higher the security. We propose a quantum-safe transaction protocol for confidential monetary blockchains, LACT+ (Lattice-based Aggregable Confidential Transactions), which is more scalable than previous post-quantum confidential blockchains, i.e., many input\/output transactions with logarithmic sized complexity.<\/jats:p>","DOI":"10.3390\/cryptography7020024","type":"journal-article","created":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T01:06:28Z","timestamp":1683594388000},"page":"24","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LACT+: Practical Post-Quantum Scalable Confidential Transactions"],"prefix":"10.3390","volume":"7","author":[{"given":"Jayamine","family":"Alupotha","sequence":"first","affiliation":[{"name":"School of Computer Science, Queensland University of Technology, Brisbane 4000, Australia"}]},{"given":"Xavier","family":"Boyen","sequence":"additional","affiliation":[{"name":"School of Computer Science, Queensland University of Technology, Brisbane 4000, Australia"}]},{"given":"Matthew","family":"McKague","sequence":"additional","affiliation":[{"name":"School of Computer Science, Queensland University of Technology, Brisbane 4000, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1049\/iet-ifs.2018.5491","article-title":"Implementing confidential transactions with lattice techniques","volume":"14","author":"Zhang","year":"2019","journal-title":"IET Inf. Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"17722","DOI":"10.1109\/ACCESS.2022.3149605","article-title":"Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies","volume":"10","author":"Alupotha","year":"2022","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.R. (2013). Proceedings of the Financial Cryptography and Data Security, Okinawa, Japan, 1\u20135 April 2013, Springer.","DOI":"10.1007\/978-3-642-39884-1"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Christin, N., and Safavi-Naini, R. (2014). Proceedings of the Financial Cryptography and Data Security, Okinawa, Japan, 1\u20135 April 2013, Springer.","DOI":"10.1007\/978-3-662-45472-5"},{"key":"ref_5","unstructured":"Fleder, M., Kester, M.S., and Pillai, S. (2015). Bitcoin transaction graph analysis. arXiv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Reid, F., and Harrigan, M. (2011, January 9\u201311). An Analysis of Anonymity in the Bitcoin System. Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, USA.","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., and Suri, N. (2015). Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Springer International Publishing.","DOI":"10.1007\/978-3-319-17016-9"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2543","DOI":"10.1109\/COMST.2018.2818623","article-title":"A survey on anonymity and privacy in bitcoin-like digital cash systems","volume":"20","author":"Khalilov","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","unstructured":"Morris, L. (2015). Anonymity Analysis of Cryptocurrencies. [Master\u2019s Thesis, Rochester Institute of Technology]. Available online: https:\/\/scholarworks.rit.edu\/theses\/8616\/."},{"key":"ref_10","unstructured":"Jedusor, T.E. (2023, January 10). Mimblewimble. Available online: https:\/\/docs.beam.mw\/Mimblewimble.pdf."},{"key":"ref_11","unstructured":"Poelstra, A. (2023, January 10). Mimblewimble. Available online: https:\/\/download.wpsoftware.net\/bitcoin\/wizardry\/mimblewimble.pdf."},{"key":"ref_12","unstructured":"Poelstra, A., Back, A., Friedenbach, M., Maxwell, G., and Wuille, P. (2018). Proceedings of the International Conference on Financial Cryptography and Data Security, Nieuwpoort, Cura\u00e7ao, 26 February\u20132 March 2018, Springer."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ishai, Y., and Rijmen, V. (2019). Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2019, Darmstadt, Germany, 19\u201323 May 2019, Springer.","DOI":"10.1007\/978-3-030-17653-2"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Krenn, S., Shulman, H., and Vaudenay, S. (2020). Proceedings of the Cryptology and Network Security, Vienna, Austria, 14\u201316 December 2020, Springer.","DOI":"10.1007\/978-3-030-65411-5"},{"key":"ref_15","unstructured":"IBM-Research (2022, March 21). IBM\u2019s Roadmap for Scaling Quantum Technology. Available online: https:\/\/research.ibm.com\/blog\/ibm-quantum-roadmap."},{"key":"ref_16","unstructured":"Nakamoto, S. (2023, January 10). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_17","unstructured":"Wood, G. (2014). Ethereum: A Secure Decentralised Generalised Transaction Ledger, Ethereum."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5195\/ledger.2016.34","article-title":"Ring confidential transactions","volume":"1","author":"Noether","year":"2016","journal-title":"Ledger"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Foley, S.N., Gollmann, D., and Snekkenes, E. (2017). Proceedings of the Computer Security\u2014ESORICS 2017, Oslo, Norway, 11\u201315 September 2017, Springer.","DOI":"10.1007\/978-3-319-66399-9"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Esgin, M.F., Zhao, R.K., Steinfeld, R., Liu, J.K., and Liu, D. (2019, January 11\u201315). MatRiCT: Efficient, scalable and post-quantum blockchain confidential transactions protocol. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK.","DOI":"10.1145\/3319535.3354200"},{"key":"ref_21","unstructured":"Jang-Jaccard, J., and Guo, F. Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. Proceedings of the Information Security and Privacy, Prague, Czech Republic, 23\u201325 February 2019."},{"key":"ref_22","first-page":"1","article-title":"MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments","volume":"545","author":"Esgin","year":"2021","journal-title":"Cryptol. ePrint Arch."},{"key":"ref_23","unstructured":"Grin tech.org (2021, January 27). Minimal Implementation of the MimbleWimble Protocol. Available online: https:\/\/github.com\/mimblewimble\/grin."},{"key":"ref_24","unstructured":"(2021, January 27). Scalable Confidential Cryptocurrency\u2014MimbleWimble Implementation. Available online: https:\/\/www.beam.mw\/."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Alupotha, J. (2023, January 11). LACT+: Post-Quantum Aggregable Confidential Transactions. Available online: https:\/\/github.com\/jaymine\/LACTv2.","DOI":"10.3390\/cryptography7020024"},{"key":"ref_26","unstructured":"Chen, Y., Genise, N., and Mukherjee, P. (2019). Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8\u201312 December 2019, Springer."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J. ACM"},{"key":"ref_28","unstructured":"Ajtai, M. (1996). Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22\u201324 May 1996, ACM."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"81454","DOI":"10.1109\/ACCESS.2021.3085413","article-title":"Origami Store: UC-Secure Foldable Datachains for The Quantum Era","volume":"9","author":"Alupotha","year":"2021","journal-title":"IEEE Access"},{"key":"ref_30","unstructured":"Noether, S., and Noether, S. (2023, January 11). Monero Is Not That Mysterious. Technical Report. Available online: https:\/\/web.getmonero.org\/ru\/resources\/research-lab\/pubs\/MRL-0003.pdf."},{"key":"ref_31","unstructured":"Maxwell, G. (2023, January 11). Confidential Transactions. Available online: https:\/\/people.xiph.org\/greg\/confidential_values.txt."},{"key":"ref_32","unstructured":"Odlyzko, A.M. (1987, January 1). How To Prove Yourself: Practical Solutions to Identification and Signature Problems. Proceedings of the Advances in Cryptology\u2014CRYPTO\u2019 86, Santa Barbara, CA, USA."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","article-title":"Security arguments for digital signatures and blind signatures","volume":"13","author":"Pointcheval","year":"2000","journal-title":"J. Cryptol."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R. (2002). Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2002, Amsterdam, The Netherlands, 28 April\u20132 May 2002, Springer.","DOI":"10.1007\/3-540-46035-7"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Cramer, R. (2008, January 9\u201312). Lattice-Based Identification Schemes Secure Under Active Attacks. Proceedings of the Public Key Cryptography\u2014PKC 2008, Barcelona, Spain.","DOI":"10.1007\/978-3-540-78440-1"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Matsui, M. (2009). Proceedings of the Advances in Cryptology\u2014ASIACRYPT 2009, Tokyo, Japan, 6\u201310 December 2009, Springer.","DOI":"10.1007\/978-3-642-10366-7"},{"key":"ref_37","unstructured":"Albrecht, M.R. (2021, October 22). LWE Estimator. Available online: https:\/\/lwe-estimator.readthedocs.io\/en\/latest\/readme_link.html."},{"key":"ref_38","unstructured":"Gleen, M.L. (2004). Device for and Method of One-Way Cryptographic Hashing. (6829355), U.S. Patent."},{"key":"ref_39","first-page":"265","article-title":"Nachlass: Theoria interpolationis methodo nova tractata","volume":"3","author":"Gauss","year":"1866","journal-title":"Carl Friedrich Gauss Werke"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","article-title":"Modular multiplication without trial division","volume":"44","author":"Montgomery","year":"1985","journal-title":"Math. Comput."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Gentleman, W.M., and Sande, G. (1966, January 7\u201310). Fast Fourier transforms: For fun and profit. Proceedings of the Fall Joint Computer Conference, San Francisco, CA, USA.","DOI":"10.1145\/1464291.1464352"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:31:44Z","timestamp":1760124704000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,8]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020024"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020024","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2023,5,8]]}}}