Advances in Blockchain Security and Post-Quantum Cryptography

The field of blockchain security and post-quantum cryptography is rapidly evolving, with a focus on developing innovative solutions to address the challenges of privacy, scalability, and quantum resistance. Recent research has explored the use of attribute-based access control, digital signatures, and post-quantum cryptographic primitives to enhance the security and integrity of blockchain-based systems. Notably, the development of lightweight hardware accelerators and efficient algorithms has improved the performance and feasibility of post-quantum cryptography in resource-constrained environments. Furthermore, the integration of blockchain technology with other fields, such as online learning and 6G networks, has highlighted the need for secure and quantum-resilient authentication mechanisms. Overall, the field is moving towards the development of more secure, efficient, and scalable solutions that can withstand the challenges of quantum computing and other emerging threats. Noteworthy papers include: QAE-BAC, which proposes a formal anonymity model and Entropy-Weighted Path Tree to optimize policy structure and reduce policy matching complexity. RejSCore, which presents a lightweight hardware accelerator for rejection sampling in post-quantum cryptography. Authentication Against Insecure Bootstrapping for 5G Networks, which proposes a transitional authentication solution based on a Hierarchical Identity-Based Threshold Signature scheme. Quantum-Resilient Threat Modelling for Secure RIS-Assisted ISAC in 6G UAV Corridors, which integrates post-quantum cryptographic primitives and RIS-coded scene watermarking to enhance security sensing. A Study on Privacy-Preserving Scholarship Evaluation Based on Decentralized Identity and Zero-Knowledge Proofs, which proposes a scholarship evaluation system that aggregates multidimensional Zero-Knowledge Proofs off-chain and verifies compliance with evaluation criteria without revealing raw scores or computational details.

Sources

QAE-BAC: Achieving Quantifiable Anonymity and Efficiency in Blockchain-Based Access Control with Attribute

Blockchain Signatures to Ensure Information Integrity and Non-Repudiation in the Digital Era: A comprehensive study

RejSCore: Rejection Sampling Core for Multivariate-based Public key Cryptography

Authentication Against Insecure Bootstrapping for 5G Networks: Feasibility, Resiliency, and Transitional Solutions in Post-Quantum Era

Mask-Robust Face Verification for Online Learning via YOLOv5 and Residual Networks

Quantum-Resilient Threat Modelling for Secure RIS-Assisted ISAC in 6G UAV Corridors

A Study on Privacy-Preserving Scholarship Evaluation Based on Decentralized Identity and Zero-Knowledge Proofs

Foundations of Fiat-Denominated Loans Collateralized by Cryptocurrencies

Who Moved My Transaction? Uncovering Post-Transaction Auditability Vulnerabilities in Modern Super Apps

Built with on top of