Open Access iconOpen Access



A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture

Yi-Bo Cao1,*, Xiu-Bo Chen1, Yun-Feng He2, Lu-Xi Liu2, Yin-Mei Che2, Xiao Wang2, Ke Xiao3, Gang Xu3, Si-Yi Chen1

1 Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
2 Information Center of China North Industries Group Corporation, Beijing, 100089, China
3 School of Information Science and Technology, North China University of Technology, Beijing, 100144, China

* Corresponding Author: Yi-Bo Cao. Email: email

Computers, Materials & Continua 2024, 78(2), 2813-2827.


Due to the rapid advancements in network technology, blockchain is being employed for distributed data storage. In the Internet of Things (IoT) scenario, different participants manage multiple blockchains located in different trust domains, which has resulted in the extensive development of cross-domain authentication techniques. However, the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography, posing a significant security threat. In response to the aforementioned challenges, our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process. Firstly, our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme. Secondly, our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains. Furthermore, the security analysis reduces the security of the identity index and signature to Learning With Errors (LWE) and Short Integer Solution (SIS) assumption, respectively, indicating that our scheme has post-quantum security. Last but not least, through comparison analysis, we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography.


Cite This Article

APA Style
Cao, Y., Chen, X., He, Y., Liu, L., Che, Y. et al. (2024). A post-quantum cross-domain authentication scheme based on multi-chain architecture. Computers, Materials & Continua, 78(2), 2813-2827.
Vancouver Style
Cao Y, Chen X, He Y, Liu L, Che Y, Wang X, et al. A post-quantum cross-domain authentication scheme based on multi-chain architecture. Comput Mater Contin. 2024;78(2):2813-2827
IEEE Style
Y. Cao et al., "A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture," Comput. Mater. Contin., vol. 78, no. 2, pp. 2813-2827. 2024.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 199


  • 124


  • 0


Share Link