Research And Analysis of Cryptographic Methods Based on Blockchain
DOI:
https://doi.org/10.54097/z89nks78Keywords:
Blockchain; Cryptographic technologies; Privacy.Abstract
This paper systematically reviews the research foundation, core technologies, and practical applications of cryptography in the blockchain field. Algorithms, and data immutability relies on cryptographic hash functions and Merkle tree structure; the balance between transparency and privacy in block chain relies on the encryption technique of zero-knowledge proofs, ring signature, homomorphic encryption. Therefore, every part of block chain is based on cryptography; without the mathematical guarantee of cryptography, the trust decentralized by block chain is meaningless. The security of block chain mainly relies on the encryption techniques such as hash functions, digital signatures and encryption algorithms, and traditional cryptographic methods will have vulnerabilities when facing quantum computing, because quantum computer may be used to break currently commonly used algorithms such as RSA, ECC eventually. This “security paradox" requires us to pay more attention to block chain technologies, because block chain technology needs to advance in tandem with cryptography. Traditional blockchain technologies can’t be used indefinitely. Against this background, researching block chain -based crypto is of great theoretical significance and practical value: on the one hand, researching on new cryptographic methods applicable to block chain can extend the area of cryptosystems and give people a new way of solving the security problems in block chain; on the other hand, we should not neglect the possibility of breaking the block chain by combining quantum computing with cryptanalysis research.
Downloads
References
[1] Sartaj A, Shubham K A, Shobhit G et al. Study of Cryptographic Techniques Adopted in Blockchain. IEEE Xplore, 2024.
[2] Laith H J, Anshoo M, Sanjeev K J et al. Analysing Blockchain-Based Cryptography: Enhancing Security, Transparency, and Practical Implementations. IEEE Xplore, 2024.
[3] Hadi G, Jorge G, Edmundo M et al. Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions. IEEE Xplore, 2024.
[4] Wang Y, Ismail E S. A Review on the Advances, Applications, and Future Prospects of Post-Quantum Cryptography in Blockchain and IoT. IEEE Xplore, 2025.
[5] Manh B D, Nguyen C H, Hoang D T et al. Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption. arXiv, 2025.
[6] Blass E, Kerschbaum F. BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. ACM Digital Library, 2020.
[7] Chaudhary A. zkFi: Privacy-Preserving and Regulation Compliant Transactions using Zero Knowledge Proofs. ResearchGate, 2023.
[8] Garay J, Kiayias A, Leonardos N. The Bitcoin Backbone Protocol: Analysis and Applications Eurocrypt, 2020.
[9] Chen N Y. Scalable Blockchain Architectures for Enhancing Integrity and Privacy in Vehicular Ad-hoc NetworksPhD Thesis. University of Nottingham Ningbo China, 2025.
[10] Chhetri G, Somvanshi S, Hebli P et al. Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey. arXiv, 2025.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Frontiers in Computing and Intelligent Systems

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

