As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtim...As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems.展开更多
Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues...Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality.展开更多
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri...With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.展开更多
Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring ...Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.展开更多
The Internet of Things(IoT)and cloud computing have significantly contributed to the development of smart cities,enabling real-time monitoring,intelligent decision-making,and efficient resource management.These system...The Internet of Things(IoT)and cloud computing have significantly contributed to the development of smart cities,enabling real-time monitoring,intelligent decision-making,and efficient resource management.These systems,particularly in IoT networks,rely on numerous interconnected devices that handle time-sensitive data for critical applications.In related approaches,trusted communication and reliable device interaction have been overlooked,thereby lowering security when sharing sensitive IoT data.Moreover,it incurs additional energy consumption and overhead while addressing potential threats in the dynamic environment.In this research,an Artificial Intelligence(AI)recommended fault-tolerant framework is proposed that leverages blockchain technology,aiming to enhance device trustworthiness and ensure data privacy.In addition,the intelligence of the proposed framework enables more authentic and authorized device involvement in data routing,thereby enabling seamless transmission in smart cities integrated with lightweight computing.To evaluate dynamic network conditions,the proposed framework offers a timely decision-making system to ensure robust delivery of IoT-assisted services.Using simulations,the efficacy of the proposed framework is validated by comparing it with existing approaches across various network metrics,demonstrating remarkable performance while achieving energy efficiency and optimizing network resources.展开更多
In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,t...In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs.展开更多
With the rapid expansion of the Internet of Things(IoT),user data has experienced exponential growth,leading to increasing concerns about the security and integrity of data stored in the cloud.Traditional schemes rely...With the rapid expansion of the Internet of Things(IoT),user data has experienced exponential growth,leading to increasing concerns about the security and integrity of data stored in the cloud.Traditional schemes relying on untrusted third-party auditors suffer from both security and efficiency issues,while existing decentralized blockchain-based auditing solutions still face shortcomings in correctness and security.This paper proposes an improved blockchain-based cloud auditing scheme,with the following core contributions:Identifying critical logical contradictions in the original scheme,thereby establishing the foundation for the correctness of cloud auditing;Designing an enhanced mechanism that integrates multiple hashing with dynamic aggregate signatures,binding encrypted blocks through bilinear pairings and BLS signatures,and improving the scheme by setting parameters based on the Computational Diffie-Hellman(CDH)problem,significantly strengthening data integrity protection and anti-forgery capabilities;Introducing a random challenge mechanism and dynamic parameter adjustment strategy,effectively resisting various attacks such as forgery,tampering,and deletion,significantly improving the detection probability of malicious Cloud Service Providers(CSPs),and significantly reducing the proof generation overhead for CSPswhilemaintaining the same computational cost forDataOwners.Theoretical analysis and performance evaluation experiments demonstrate that the proposed scheme achieves significant improvements in both security and efficiency.Finally,the paper explores potential applications of the Enhanced Security Scheme in fields such as healthcare,drone swarms,and government office attendance systems,providing an effective approach for building secure,efficient,and decentralized cloud auditing systems.展开更多
Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic ...Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic Graph(DAG)structure often suffer from performance limitations.The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain,and only the node itself is allowed to update it.This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment.In this paper,we propose a blockchain architecture based on the DAG lattice structure,specifically designed for dynamically connected IoV.In the proposed system,nodes must obtain authorization from a trusted authority before joining,forming a permissioned blockchain.Each node is assigned an individual account chain,allowing vehicles with limited storage capacity to participate in the blockchain by storing transactions only from nearby vehicles’account chains.Every transmitted message is treated as a transaction and added to the blockchain,enablingmore efficient data transmission in a dynamic network environment.Areputation-based incentivemechanism is introduced to encourage nodes to behave normally.Experimental results demonstrate that the proposed architecture achieves better performance compared with traditional single-chain and DAG-based approaches in terms of average transmission delay and storage cost.展开更多
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further...With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.展开更多
The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significa...The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks.展开更多
Aiming at the challenges of low throughput,excessive consensus latency and high communication complexity in the Practical Byzantine Fault Tolerance(PBFT)algorithm in blockchain networks,its application in identity ver...Aiming at the challenges of low throughput,excessive consensus latency and high communication complexity in the Practical Byzantine Fault Tolerance(PBFT)algorithm in blockchain networks,its application in identity verification for distributed networking of a drone cluster is limited.Therefore,a lightweight blockchainbased identity authentication model for UAV swarms is designed,and a Credit-score and Grouping-mechanism Practical Byzantine Fault Tolerance(CG-PBFT)algorithm is proposed.CG-PBFT introduces a reputation score evaluation mechanism,classifies the reputation levels of nodes in the network,and optimizes the consensus process based on grouping consensus and BLS aggregate signature technology.Experimental results demonstrate that under identical experimental conditions,compared with the PBFT algorithm,CG-PBFT achieves a 250%increase in average throughput,a 70%reduction in average latency,and simultaneous enhancement in security,thus making it more suitable for UAV swarm networks.展开更多
With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates...With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability.展开更多
In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic q...In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency.展开更多
Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work pr...Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.展开更多
Lightweight nodes are crucial for blockchain scalability,but verifying the availability of complete block data puts significant strain on bandwidth and latency.Existing data availability sampling(DAS)schemes either re...Lightweight nodes are crucial for blockchain scalability,but verifying the availability of complete block data puts significant strain on bandwidth and latency.Existing data availability sampling(DAS)schemes either require trusted setups or suffer from high communication overhead and low verification efficiency.This paper presents ISTIRDA,a DAS scheme that lets light clients certify availability by sampling small random codeword symbols.Built on ISTIR,an improved Reed–Solomon interactive oracle proof of proximity,ISTIRDA combines adaptive folding with dynamic code rate adjustment to preserve soundness while lowering communication.This paper formalizes opening consistency and prove security with bounded error in the random oracle model,giving polylogarithmic verifier queries and no trusted setup.In a prototype compared with FRIDA under equal soundness,ISTIRDA reduces communication by 40.65%to 80%.For data larger than 16 MB,ISTIRDA verifies faster and the advantage widens;at 128 MB,proofs are about 60%smaller and verification time is roughly 25%shorter,while prover overhead remains modest.In peer-to-peer emulation under injected latency and loss,ISTIRDA reaches confidence more quickly and is less sensitive to packet loss and load.These results indicate that ISTIRDA is a scalable and provably secure DAS scheme suitable for high-throughput,large-block public blockchains,substantially easing bandwidth and latency pressure on lightweight nodes.展开更多
The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EIS...The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security.展开更多
The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)...The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)and artificial intelligence(AI)techniques,have become standard practice.The need for Federated Learning(FL)for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques.However,the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference.Therefore,this research presents a novel blockchain-assisted improved cryptographic privacy-preserving federated learning(BICPPFL)model,with the help of ORAN,to safely carry out federated learning and protect privacy.This model improves on the conventional masking technique for sharing model parameters by adding new characteristics.These features include the choice of distributed aggregators,validation for final model aggregation,and individual validation for BSs.To manage the security and privacy of FL processes,a combined homomorphic proxy-reencryption(HPReE)and lattice-cryptographic method(HPReEL)has been used.The upgraded delegated proof of stake(Up-DPoS)consensus protocol,which will provide quick validation of model exchanges and protect against malicious attacks,is employed for effective consensus across blockchain nodes.Without sacrificing performance metrics,the BICPPFL model strengthens privacy and adds security layers while facilitating the transfer of sensitive data across several BSs.The framework is deployed on top of a Hyperledger Fabric blockchain to evaluate its effectiveness.The experimental findings prove the reliability and privacy-preserving capability of the BICPPFL model.展开更多
The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between...The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management,but also raise material concerns about the security and privacy of the user identity.In this paper,we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks.Specifically,we propose a blockchain-based Identity Management(IDM)architecture for 6G networks,which provides a practical method to secure digital identity management.Subsequently,we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute.In particular,the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data.Finally,we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance.The results demonstrate that our architecture ensures effective user digital identity management in 6G networks.展开更多
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo...The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas.展开更多
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields...Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.展开更多
基金funded by Multimedia University,Cyberjaya,Selangor,Malaysia(Grant Number:PostDoc(MMUI/240029)).
文摘As healthcare systems increasingly embrace digitalization,effective management of electronic health records(EHRs)has emerged as a critical priority,particularly in inpatient settings where data sensitivity and realtime access are paramount.Traditional EHR systems face significant challenges,including unauthorized access,data breaches,and inefficiencies in tracking follow-up appointments,which heighten the risk of misdiagnosis and medication errors.To address these issues,this research proposes a hybrid blockchain-based solution for securely managing EHRs,specifically designed as a framework for tracking inpatient follow-ups.By integrating QR codeenabled data access with a blockchain architecture,this innovative approach enhances privacy protection,data integrity,and auditing capabilities,while facilitating swift and real-time data retrieval.The architecture adheres to Role-Based Access Control(RBAC)principles and utilizes robust encryption techniques,including SHA-256 and AES-256-CBC,to secure sensitive information.A comprehensive threat model outlines trust boundaries and potential adversaries,complemented by a validated data transmission protocol.Experimental results demonstrate that the framework remains reliable in concurrent access scenarios,highlighting its efficiency and responsiveness in real-world applications.This study emphasizes the necessity for hybrid solutions in managing sensitive medical information and advocates for integrating blockchain technology and QR code innovations into contemporary healthcare systems.
文摘Location-Based Services(LBS)have greatly improved efficiency and functionality in various domains,but privacy and security concerns remain due to the centralized nature of many existing systems.To address these issues,this paper introduces the V-Track system,a decentralized architecture using blockchain technology for reliable vehicle location verification.By integrating GPS devices(Spark Fun GPS NEO-M9),IoT-enabled sensors,and a Cosmos blockchain-based ledger(network of interconnected blockchains),V-Track aims to solve centralized LBS problems.Through rigorous simulation experiments,this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy.This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems,enhancing reliability and trustworthiness through blockchain integration,improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy,and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology.These advancements hold promise for applications across multiple sectors,including logistics,supply chain management,urban planning,and emerging fields such as autonomous vehicles and augmented reality.
基金supported by the National Natural Science Foundation of China under Grant No.62472075the Innovation Theory and Technology Group Fund of the Southwest China Institute of Electronic Technology under Grant No.2024jsq0207.
文摘With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication.
文摘Industrial Cyber-Physical Systems(ICPSs)play a vital role in modern industries by providing an intellectual foundation for automated operations.With the increasing integration of information-driven processes,ensuring the security of Industrial Control Production Systems(ICPSs)has become a critical challenge.These systems are highly vulnerable to attacks such as denial-of-service(DoS),eclipse,and Sybil attacks,which can significantly disrupt industrial operations.This work proposes an effective protection strategy using an Artificial Intelligence(AI)-enabled Smart Contract(SC)framework combined with the Heterogeneous Barzilai-Borwein Support Vector(HBBSV)method for industrial-based CPS environments.The approach reduces run time and minimizes the probability of attacks.Initially,secured ICPSs are achieved through a comprehensive exchange of views on production plant strategies for condition monitoring using SC and blockchain(BC)integrated within a BC network.The SC executes the HBBSV strategy to verify the security consensus.The Barzilai-Borwein Support Vectorized algorithm computes abnormal attack occurrence probabilities to ensure that components operate within acceptable production line conditions.When a component remains within these conditions,no security breach occurs.Conversely,if a component does not satisfy the condition boundaries,a security lapse is detected,and those components are isolated.The HBBSV method thus strengthens protection against DoS,eclipse,and Sybil attacks.Experimental results demonstrate that the proposed HBBSV approach significantly improves security by enhancing authentication accuracy while reducing run time and authentication time compared to existing techniques.
基金funded by the Deanship of Graduate Studies and Scientific Research at Jouf University under grant No.(DGSSR-2024-02-02152).
文摘The Internet of Things(IoT)and cloud computing have significantly contributed to the development of smart cities,enabling real-time monitoring,intelligent decision-making,and efficient resource management.These systems,particularly in IoT networks,rely on numerous interconnected devices that handle time-sensitive data for critical applications.In related approaches,trusted communication and reliable device interaction have been overlooked,thereby lowering security when sharing sensitive IoT data.Moreover,it incurs additional energy consumption and overhead while addressing potential threats in the dynamic environment.In this research,an Artificial Intelligence(AI)recommended fault-tolerant framework is proposed that leverages blockchain technology,aiming to enhance device trustworthiness and ensure data privacy.In addition,the intelligence of the proposed framework enables more authentic and authorized device involvement in data routing,thereby enabling seamless transmission in smart cities integrated with lightweight computing.To evaluate dynamic network conditions,the proposed framework offers a timely decision-making system to ensure robust delivery of IoT-assisted services.Using simulations,the efficacy of the proposed framework is validated by comparing it with existing approaches across various network metrics,demonstrating remarkable performance while achieving energy efficiency and optimizing network resources.
文摘In recent years,Blockchain Technology has become a paradigm shift,providing Transparent,Secure,and Decentralized platforms for diverse applications,ranging from Cryptocurrency to supply chain management.Nevertheless,the optimization of blockchain networks remains a critical challenge due to persistent issues such as latency,scalability,and energy consumption.This study proposes an innovative approach to Blockchain network optimization,drawing inspiration from principles of biological evolution and natural selection through evolutionary algorithms.Specifically,we explore the application of genetic algorithms,particle swarm optimization,and related evolutionary techniques to enhance the performance of blockchain networks.The proposed methodologies aim to optimize consensus mechanisms,improve transaction throughput,and reduce resource consumption.Through extensive simulations and real-world experiments,our findings demonstrate significant improvements in network efficiency,scalability,and stability.This research offers a thorough analysis of existing optimization techniques,introduces novel strategies,and assesses their efficacy based on empirical outputs.
基金funded by the National Natural Science Foundation of China(New Design and Analysis of Fully Homomorphic Signatures,Grant No.62172436).
文摘With the rapid expansion of the Internet of Things(IoT),user data has experienced exponential growth,leading to increasing concerns about the security and integrity of data stored in the cloud.Traditional schemes relying on untrusted third-party auditors suffer from both security and efficiency issues,while existing decentralized blockchain-based auditing solutions still face shortcomings in correctness and security.This paper proposes an improved blockchain-based cloud auditing scheme,with the following core contributions:Identifying critical logical contradictions in the original scheme,thereby establishing the foundation for the correctness of cloud auditing;Designing an enhanced mechanism that integrates multiple hashing with dynamic aggregate signatures,binding encrypted blocks through bilinear pairings and BLS signatures,and improving the scheme by setting parameters based on the Computational Diffie-Hellman(CDH)problem,significantly strengthening data integrity protection and anti-forgery capabilities;Introducing a random challenge mechanism and dynamic parameter adjustment strategy,effectively resisting various attacks such as forgery,tampering,and deletion,significantly improving the detection probability of malicious Cloud Service Providers(CSPs),and significantly reducing the proof generation overhead for CSPswhilemaintaining the same computational cost forDataOwners.Theoretical analysis and performance evaluation experiments demonstrate that the proposed scheme achieves significant improvements in both security and efficiency.Finally,the paper explores potential applications of the Enhanced Security Scheme in fields such as healthcare,drone swarms,and government office attendance systems,providing an effective approach for building secure,efficient,and decentralized cloud auditing systems.
基金funded in part by the Supported by Natural Science Foundation of Inner Mongolia Autonomous Region of China under Grants 2024QN06022 and 2023QN06008in part by the First-Class Discipline Research Special Project under Grant YLXKZX-NGD-015in part by the Inner Mongolia University of Technology Scientific Research Start-Up Project under Grant BS2024067.
文摘Blockchain offers a promising solution to the security challenges faced by the Internet of Vehicles(IoV).However,due to the dynamic connectivity of IoV,blockchain based on a single-chain structure or Directed Acyclic Graph(DAG)structure often suffer from performance limitations.The DAG lattice structure is a novel blockchain model in which each node maintains its own account chain,and only the node itself is allowed to update it.This feature makes the DAG lattice structure particularly suitable for addressing the challenges in dynamically connected IoV environment.In this paper,we propose a blockchain architecture based on the DAG lattice structure,specifically designed for dynamically connected IoV.In the proposed system,nodes must obtain authorization from a trusted authority before joining,forming a permissioned blockchain.Each node is assigned an individual account chain,allowing vehicles with limited storage capacity to participate in the blockchain by storing transactions only from nearby vehicles’account chains.Every transmitted message is treated as a transaction and added to the blockchain,enablingmore efficient data transmission in a dynamic network environment.Areputation-based incentivemechanism is introduced to encourage nodes to behave normally.Experimental results demonstrate that the proposed architecture achieves better performance compared with traditional single-chain and DAG-based approaches in terms of average transmission delay and storage cost.
基金supported by the National Natural Science Foundation of China under Grant 62471493supported by the Natural Science Foundation of Shandong Province under Grant ZR2023LZH017,ZR2024MF066。
文摘With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.
基金derived from a research grant“Cybersecurity Research and Innovation Pioneers Grants Initiative”funded by The National Program for RDI in Cybersecurity(National Cybersecurity Authority)-Kingdom of Saudi Arabia-with grant number(CRPG-25-3168)supported by EIAS Data Science and Blockchain Lab,CCIS,Prince Sultan University.
文摘The growing developments in 5G and 6G wireless communications have revolutionized communications technologies,providing faster speeds with reduced latency and improved connectivity to users.However,it raises significant security challenges,including impersonation threats,data manipulation,distributed denial of service(DDoS)attacks,and privacy breaches.Traditional security measures are inadequate due to the decentralized and dynamic nature of next-generation networks.This survey provides a comprehensive review of how Federated Learning(FL),Blockchain,and Digital Twin(DT)technologies can collectively enhance the security of 5G and 6G systems.Blockchain offers decentralized,immutable,and transparent mechanisms for securing network transactions,while FL enables privacy-preserving collaborative learning without sharing raw data.Digital Twins create virtual replicas of network components,enabling real-time monitoring,anomaly detection,and predictive threat analysis.The survey examines major security issues in emerging wireless architectures and analyzes recent advancements that integrate FL,Blockchain,and DT to mitigate these threats.Additionally,it presents practical use cases,synthesizes key lessons learned,and identifies ongoing research challenges.Finally,the survey outlines future research directions to support the development of scalable,intelligent,and robust security frameworks for next-generation wireless networks.
基金supported by the following projects:Fund for technical areas of infrastructure strengthening plan projects under Grant 2023-JCJQ-JJ-0772.
文摘Aiming at the challenges of low throughput,excessive consensus latency and high communication complexity in the Practical Byzantine Fault Tolerance(PBFT)algorithm in blockchain networks,its application in identity verification for distributed networking of a drone cluster is limited.Therefore,a lightweight blockchainbased identity authentication model for UAV swarms is designed,and a Credit-score and Grouping-mechanism Practical Byzantine Fault Tolerance(CG-PBFT)algorithm is proposed.CG-PBFT introduces a reputation score evaluation mechanism,classifies the reputation levels of nodes in the network,and optimizes the consensus process based on grouping consensus and BLS aggregate signature technology.Experimental results demonstrate that under identical experimental conditions,compared with the PBFT algorithm,CG-PBFT achieves a 250%increase in average throughput,a 70%reduction in average latency,and simultaneous enhancement in security,thus making it more suitable for UAV swarm networks.
基金funded by the National Key Research and Development Program of China(Grant No.2024YFE0209000)the NSFC(Grant No.U23B2019)。
文摘With the development of sharded blockchains,high cross-shard rates and load imbalance have emerged as major challenges.Account partitioning based on hashing and real-time load faces the issue of high cross-shard rates.Account partitioning based on historical transaction graphs is effective in reducing cross-shard rates but suffers from load imbalance and limited adaptability to dynamic workloads.Meanwhile,because of the coupling between consensus and execution,a target shard must receive both the partitioned transactions and the partitioned accounts before initiating consensus and execution.However,we observe that transaction partitioning and subsequent consensus do not require actual account data but only need to determine the relative partition order between shards.Therefore,we propose a novel sharded blockchain,called HATLedger,based on Hybrid Account and Transaction partitioning.First,HATLedger proposes building a future transaction graph to detect upcoming hotspot accounts and making more precise account partitioning to reduce transaction cross-shard rates.In the event of an impending overload,the source shard employs simulated partition transactions to specify the partition order across multiple target shards,thereby rapidly partitioning the pending transactions.The target shards can reach consensus on received transactions without waiting for account data.The source shard subsequently sends the account data to the corresponding target shards in the order specified by the previously simulated partition transactions.Based on real transaction history from Ethereum,we conducted extensive sharding scalability experiments.By maintaining low cross-shard rates and a relatively balanced load distribution,HATLedger achieves throughput improvements of 2.2x,1.9x,and 1.8x over SharPer,Shard Scheduler,and TxAllo,respectively,significantly enhancing efficiency and scalability.
基金supported in part by the National Natural Science Foundation of China under Grant 62262073in part by the Yunnan Provincial Ten Thousand People Program for Young Top Talents under Grant YNWR-QNBJ-2019-237in part by the Yunnan Provincial Major Science and Technology Special Program under Grant 202402AD080002.
文摘In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency.
文摘Federated Learning(FL)enables joint training over distributed devices without data exchange but is highly vulnerable to attacks by adversaries in the form of model poisoning and malicious update injection.This work proposes Secured-FL,a blockchain-based defensive framework that combines smart contract-based authentication,clustering-driven outlier elimination,and dynamic threshold adjustment to defend against adversarial attacks.The framework was implemented on a private Ethereum network with a Proof-of-Authority consensus algorithm to ensure tamper-resistant and auditable model updates.Large-scale simulation on the Cyber Data dataset,under up to 50%malicious client settings,demonstrates Secured-FL achieves 6%-12%higher accuracy,9%-15%lower latency,and approximately 14%less computational expense compared to the PPSS benchmark framework.Additional tests,including confusion matrices,ROC and Precision-Recall curves,and ablation tests,confirm the interpretability and robustness of the defense.Tests for scalability also show consistent performance up to 500 clients,affirming appropriateness to reasonably large deployments.These results make Secured-FL a feasible,adversarially resilient FL paradigm with promising potential for application in smart cities,medicine,and other mission-critical IoT deployments.
基金supported in part by the Research Fund of Key Lab of Education Blockchain and Intelligent Technology,Ministry of Education(EBME25-F-08).
文摘Lightweight nodes are crucial for blockchain scalability,but verifying the availability of complete block data puts significant strain on bandwidth and latency.Existing data availability sampling(DAS)schemes either require trusted setups or suffer from high communication overhead and low verification efficiency.This paper presents ISTIRDA,a DAS scheme that lets light clients certify availability by sampling small random codeword symbols.Built on ISTIR,an improved Reed–Solomon interactive oracle proof of proximity,ISTIRDA combines adaptive folding with dynamic code rate adjustment to preserve soundness while lowering communication.This paper formalizes opening consistency and prove security with bounded error in the random oracle model,giving polylogarithmic verifier queries and no trusted setup.In a prototype compared with FRIDA under equal soundness,ISTIRDA reduces communication by 40.65%to 80%.For data larger than 16 MB,ISTIRDA verifies faster and the advantage widens;at 128 MB,proofs are about 60%smaller and verification time is roughly 25%shorter,while prover overhead remains modest.In peer-to-peer emulation under injected latency and loss,ISTIRDA reaches confidence more quickly and is less sensitive to packet loss and load.These results indicate that ISTIRDA is a scalable and provably secure DAS scheme suitable for high-throughput,large-block public blockchains,substantially easing bandwidth and latency pressure on lightweight nodes.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)-Information Technology Research Center(ITRC)under Grant No.IITP-2025-RS-2023-00259004the Basic Science Research Program through the National Research Foundation of Korea(NRF)under Grant No.RS-2025-25434261.
文摘The intelligent transportation systems require secure,low-latency,and reliable communication architectures to enable the real-time vehicular application.This paper proposes an edge-intelligent semantic aggregation(EISA)framework for 6G unmanned aerial vehicle(UAV)-assisted Internet of vehicles(IoV)networks that integrates task-driven semantic communication,deep reinforcement learning(DRL)-based edge intelligence,and blockchain-based semantic validation across 6G terahertz(THz)links.UAVs in the proposed architecture serve as adaptive edge nodes that receive semantically vital information about the vehicle at any given stage,optimize aggregation and transmission parameters dynamically,and guarantee data integrity through a structured,lightweight consortium blockchain that signs semantically detailed representations rather than raw packets.Simulation results from a hybrid NS-3,MATLAB,and Python environment indicate that the proposed framework can achieve up to 45%reduction in end-to-end latency,an approximately 70%increase in throughput,and semantic efficiency with blockchain verification delays of less than 20 ms(more than 98%).These findings support the effectiveness of the proposed co-design for achieving context-aware,energy-efficient,and reliable communication under heavy-traffic conditions.The proposed framework provides a flexible and scalable foundation for next-generation 6G-enabled automotive networks,with subsequent growth toward federated learning-based collaborative intelligence,digital-twinassisted traffic modeling,and quantum-safe blockchain mechanisms to enhance scalability,intelligence,and long-term security.
文摘The next-generation RAN,known as Open Radio Access Network(ORAN),allows for several advantages,including cost-effectiveness,network flexibility,and interoperability.Now ORAN applications,utilising machine learning(ML)and artificial intelligence(AI)techniques,have become standard practice.The need for Federated Learning(FL)for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques.However,the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference.Therefore,this research presents a novel blockchain-assisted improved cryptographic privacy-preserving federated learning(BICPPFL)model,with the help of ORAN,to safely carry out federated learning and protect privacy.This model improves on the conventional masking technique for sharing model parameters by adding new characteristics.These features include the choice of distributed aggregators,validation for final model aggregation,and individual validation for BSs.To manage the security and privacy of FL processes,a combined homomorphic proxy-reencryption(HPReE)and lattice-cryptographic method(HPReEL)has been used.The upgraded delegated proof of stake(Up-DPoS)consensus protocol,which will provide quick validation of model exchanges and protect against malicious attacks,is employed for effective consensus across blockchain nodes.Without sacrificing performance metrics,the BICPPFL model strengthens privacy and adds security layers while facilitating the transfer of sensitive data across several BSs.The framework is deployed on top of a Hyperledger Fabric blockchain to evaluate its effectiveness.The experimental findings prove the reliability and privacy-preserving capability of the BICPPFL model.
文摘The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management,but also raise material concerns about the security and privacy of the user identity.In this paper,we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks.Specifically,we propose a blockchain-based Identity Management(IDM)architecture for 6G networks,which provides a practical method to secure digital identity management.Subsequently,we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute.In particular,the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data.Finally,we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance.The results demonstrate that our architecture ensures effective user digital identity management in 6G networks.
基金Gerhard Hellstern is partly funded by the Ministry of Economic Affairs,Labour and Tourism Baden-Württemberg in the frame of the Competence Center Quantum Computing Baden-Württemberg(QORA Ⅱ).
文摘The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas.
基金supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JCZD-35in part by the open research project of ZheJiang Lab under grant 2021PD0AB01。
文摘Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.