Enhancing Cryptographic Protocols with Blockchain: Security Trust, and Efficiency
DOI:
https://doi.org/10.46610/IJDTNSS.2025.v01i01.003Keywords:
Cryptographic Protocols (CP), Fully Homomorphic Encryption (FHE), Lattice Based Cryptography (LBC), Partially Homomorphic Encryption (PHE), Thread Cyber (TC)Abstract
Here’s a simplified version of your text with the same meaning: With the rapid advancement of network technology, cryptographic protocols face increasingly complex security challenges. Blockchain technology, with its decentralized, traceable, programmable, and tamper-proof nature, improves security, trust, and efficiency while ensuring data integrity in traditional cryptographic protocols. As a result, it has become a key area of research in this field. This paper explores how blockchain technology is being applied to cryptographic protocols. First, we introduce the background and basic concepts of blockchain in cryptographic research. Next, we examine the key challenges of traditional cryptographic protocols, particularly in terms of security and performance. Finally, we review the latest research on how blockchain enhances authentication protocols and other cryptographic methods. Cryptographic protocols play a key role in keeping communication secure, verifying identities, and protecting data in modern networks. However, as network technology grows, these protocols face new security risks and performance issues. Blockchain technology, with its decentralized, transparent, tamper-proof, and programmable features, provides new ways to improve cryptographic protocols. By using blockchain, security can be strengthened, trust can be increased, efficiency can be improved, and data integrity can be better maintained.
References
Amrita, C. P. Ekwueme, I. H. i Adam, and A. Dwivedi, “Lightweight Cryptography for Internet of Things: A Review,” EAI endorsed transactions on internet of things, vol. 10, Mar. 2024, doi: https://doi.org/10.4108/eetiot.5565.
A. Labinsky “Features of cryptographic protocols,” Natural and Man-Made Risks (Physico-Mathematical and Applied Aspects), vol. 2024 no. 1, pp. 53–59, Apr. 2024, doi: https://doi.org/10.61260/2307-7476-2024-1-53-59
R. Ahlswede and R. Ahlswede, “Elliptic curve cryptosystems,” in Hiding Data—Selected Topics: Rudolf Ahlswede’s Lectures on Information Theory 3, 2016, pp. 225–336. Available: https://link.springer.com/chapter/10.1007/978-3-319-31515-7_4
A. Miyaji, “Elliptic curves suitable for cryptosystems,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. E77-A, no. 1, pp. 98–106, Jan. 25, 1994. Available: https://search.ieice.org/bin/summary.php?id=e77-a_1_98.
A. Miyaji, “Elliptic Curves Suitable for Cryptosystems,” IEICE Transactions on Fundamentals, vol. E77-A, no. 1, pp. 98–106, Jan. 1994, doi: https://doi.org/10.1587/e77-a_1_98
X. Luo, X. Chen, X. Chen, and Q. Cheng, “A survey on the application of blockchain in cryptographic protocols,” Cybersecurity, vol. 7, no. 1, Dec. 2024, doi: https://doi.org/10.1186/s42400-024-00324-7
K. K. B. Khaled, D. Borsos, and J. Katona, “Benchmarking cryptographic protocols for (IoT) malware defence,” in Proc. 2025 IEEE 23rd World Symp. Appl. Mach. Intell. Informatics (SAMI), Jan. 23, 2025, pp. 000041–000046. Available: https://doi.org/10.1109/SAMI63904.2025.10883306
B. Aizpurua, P. Bermejo, J. Etxezarreta Martínez, and R. Orús, “Hacking cryptographic protocols with advanced variational quantum attacks,” ACM Trans. Quantum Comput., vol. 6, no. 2, pp. 1–24, 2023. Available: https://doi.org/10.1145/3718349
P. Singh, P. Pranav, and S. Dutta, “Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms,” Scientific Reports, vol. 15, no. 1, Jan. 2025, doi: https://doi.org/10.1038/s41598-025-86118-4.
P. B. Abhi, K. A. R. Torres, T. Yusoff, K. Samunnisa, “A novel lightweight cryptographic protocol for securing IoT devices,” Int. J. Comput. Eng. Res. Trends, vol. 10, pp. 24–30, Nov. 2023, doi: https://doi.org/10.22362/ijcert/2023/v10/i10/v10i104