Skip to main content
Log in

Quantum blockchain-enabled exchange protocol model for decentralized systems

  • Published:
Quantum Information Processing Aims and scope Submit manuscript


In recent years, blockchain technology has been established as a solution to a spectrum of issues associated with conventional financial systems, including but not limited to high transaction costs, slow processing times, and lack of transparency, leading to the proliferation of various digital assets and cryptocurrencies that are finding new use cases such as tokenization of real-world assets, access control systems, records management, etc. However, a significant impediment that has emerged is the need for interoperability between incompatible decentralized networks, which has thwarted the ability to exchange digital assets across these networks efficiently and securely. In this paper, the authors propose a novel quantum blockchain-enabled exchange protocol model (QBEEP) for the secure exchange of digital assets between various stakeholders on different decentralized networks, harnessing the potential of quantum computing, homomorphic encryption, and distributed ledgers. QBEEP is designed to be highly secure and transparent, ensuring stakeholders can trust the transaction’s outcome. Furthermore, it addresses several challenges posed by quantum computing, including the susceptibility of traditional cryptographic systems to attacks by quantum computers. The authors use quantum key distribution and quantum-resistant cryptographic algorithms to ensure that the proposed model is secure against attacks by classical and quantum computers. The authors demonstrate the feasibility and effectiveness of QBEEP through simulation experiments, and the results show that the protocol is highly secure and efficient, with low overhead and fast execution time. The authors also compare QBEEP to existing solutions and show that it outperforms them in terms of security and efficiency. The proposed protocol provides a promising solution for the growing need for secure and efficient decentralized exchange platforms in the emerging digital economy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and material

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

Code availability

Will be provided if requested.


  1. Aoun, A., Ilinca, A., Ghandour, M., Ibrahim, H.: A review of Industry 40 characteristics and challenges, with potential improvements using blockchain technology. Comput. Ind. Eng. 162, 107746 (2021)

    Article  Google Scholar 

  2. Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M., Al Ridhawi, I.: An incentive-aware blockchain-based solution for internet of fake media things. Inf. Process. Manage. 57(6), 102370 (2020)

    Article  Google Scholar 

  3. Büchi, G., Cugno, M., Castagnoli, R.: Smart factory performance and industry 40. Technol. Forecast. Soc. Change 150, 119790 (2020)

    Article  Google Scholar 

  4. Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World. Penguin (2016)

  5. Fernandez-Carames, T.M., Fraga-Lamas, P.: Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8, 21091–21116 (2020)

    Article  Google Scholar 

  6. Dungey, T., Abdelgaber, Y., Casto, C., Mills, J., Fazea, Y.: Quantum computing: Current progress and future directions. In: Educause. Educause Review (2022)

  7. Kumar, M., Pattnaik, P.: Post quantum cryptography (pqc)-an overview. In: 2020 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1–9. IEEE, 2020.

  8. Mukhopadhyay, U., Skjellum, A., Hambolu, O., Oakley, J., Yu, L., Brooks, R.: A brief survey of cryptocurrency systems. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 745–752. IEEE (2016)

  9. Swan, M.: Blockchain: Blueprint for a new economy. O’Reilly Media, Inc. (2015)

  10. Rifi, N., Rachkidi, E., Agoulmine, N., Taher, N.C.: Towards using blockchain technology for ehealth data access management. In: 2017 Fourth International Conference on Advances in Biomedical Engineering (ICABME), pp. 1–4. IEEE, 2017.

  11. Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: A data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)

    Article  Google Scholar 

  12. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, pp. 21260 (2008).

  13. Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White Paper 3(37), 2–1 (2014)

    Google Scholar 

  14. Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653–659 (2017)

    Google Scholar 

  15. Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H.: Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)

    Article  Google Scholar 

  16. Hoy, M.B.: An introduction to the blockchain and its implications for libraries and medicine. Med. Ref. Serv. Quart. 36(3), 273–279 (2017)

    Article  Google Scholar 

  17. Kirby, P.: Virtually possible: how to strengthen bitcoin regulation within the current regulatory framework. NCL Rev. 93, 189 (2014)

    Google Scholar 

  18. Corbet, S., Lucey, B., Urquhart, A., Yarovaya, L.: Cryptocurrencies as a financial asset: A systematic analysis. Int. Rev. Financ. Anal. 62, 182–199 (2019)

    Article  Google Scholar 

  19. Kaga, Y., Fujio, M., Naganuma, K., Takahashi, K., Murakami, T., Ohki, T., Nishigaki, M.: A secure and practical signature scheme for blockchain based on biometrics. In: Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings 13, pages 877–891. Springer, 2017.

  20. Kshetri, N.: Can blockchain strengthen the internet of things? IT Professional 19(4), 68–72 (2017)

    Article  Google Scholar 

  21. Fang, F., Ventre, C., Basios, M., Kanthan, L., Martinez-Rego, D., Fan, Wu., Li, L.: Cryptocurrency trading: a comprehensive survey. Financ. Innov. 8(1), 1–59 (2022)

    Article  Google Scholar 

  22. Moore, T., Christin, N.: Beware the middleman: Empirical analysis of bitcoin-exchange risk. In: Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1–5, 2013, Revised Selected Papers 17, pp. 25–33. Springer (2013)

  23. Wang, Q., Huang, J., Wang, S., Chen, Y., Zhang, P., He, Li.: A comparative study of blockchain consensus algorithms. J. Phys: Conf. Ser. 1437(1), 012007 (2020)

    Google Scholar 

  24. Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE (2017)

  25. Gomes, J., Khan, S., Svetinovic, D.: Fortifying the blockchain: A systematic review and classification of post-quantum consensus solutions for enhanced security and resilience. IEEE Access (2023)

  26. Zhu, Y., Qin, Y., Zhou, Z., Song, X., Liu, G., Chu, W.C.C.: Digital asset management with distributed permission over blockchain and attribute-based access control. In: 2018 IEEE International Conference on Services Computing (SCC), pp. 193–200. IEEE (2018)

  27. Andrei, O.J.K., Koh, S.G.M.: Is blockchain technology a watershed for tourism development? Curr. Issues Tour. 22(20), 2447–2452 (2019)

    Article  Google Scholar 

  28. Kshetri, N.: 1 blockchain’s roles in meeting key supply chain management objectives. Int. J. Inf. Manage. 39, 80–89 (2018)

    Article  Google Scholar 

  29. Allen, J. G., Rauchs, M., Blandin, A., Bear, K.: Legal and regulatory considerations for digital assets (2020)

  30. Dai, F., Shi, Y., Meng, N., Wei, L., Ye, Z.: From bitcoin to cybersecurity: a comparative study of blockchain application and security issues. In: 2017 4th International Conference on Systems and Informatics (ICSAI), pp. 975–979. IEEE (2017)

  31. Khalil, R., Gervais, A., Felley, G.: Tex-a securely scalable trustless exchange. Cryptology ePrint Archive (2019)

  32. Hallgren, J., Hallgren, M., Fisher, S., Hautop, J., Larsen, N., & Ross, O.: Hallex: a trust-less exchange system for digital assets. Available at SSRN 2917078 (2017)

  33. Tsai, W. T., Zhao, Z., Zhang, C., Yu, L., Deng, E.:A multi-chain model for cbdc. In: 2018 5th International Conference on Dependable Systems and Their Applications (DSA), pp. 25–34. IEEE (2018)

  34. Oved, M., Mosites, D.: Swap: a peer-to-peer protocol for trading ethereum tokens. Whitepaper Database, 21 (2017).

  35. Luu, Y. V. L., Velner, Y.: Kybernetwork: A trustless decentralized exchange and payment service. (2017)

  36. Buterin, V.: Chain interoperability. R3 Research Paper 9 (2016)

  37. Vo, H. T., Wang, Z., Karunamoorthy, D., Wagner, J., Abebe, E., Mohania, M.: Internet of blockchains: techniques and challenges ahead. In: 2018 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp. 1574–1581. IEEE (2018)

  38. Zamyatin, A., Al-Bassam, M., Zindros, D., Kokoris-Kogias, E., Moreno-Sanchez, P., Kiayias, A., Knottenbelt, W. J.: Sok: communication across distributed ledgers. In: Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part II 25, pp. 3–36. Springer (2021).

  39. Bernstein, D. J.: Introduction to Post-Quantum Cryptography. Springer, (2009)

  40. Petzoldt, A., Bulygin, S., Buchmann, J.: Selecting parameters for the rainbow signature scheme-extended version. Cryptology ePrint Archive (2010).

  41. Ding, J., Petzoldt, A., Wang, L.C.: The cubic simple matrix encryption scheme. In: Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1–3, 2014. Proceedings 6, pp. 76–87. Springer (2014).

  42. Blömer, J., Naewe, S.: Sampling methods for shortest vectors, closest vectors and successive minima. Theoret. Comput. Sci. 410(18), 1648–1665 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  43. Micciancio, D.: Improving lattice based cryptosystems using the hermite normal form. In: Cryptography and Lattices: International Conference, CaLC 2001 Providence, RI, USA, March 29–30, 2001 Revised Papers, pp. 126–145. Springer (2001)

  44. Zakhary, V., Agrawal, D., Abbadi, A.E.: Atomic commitment across blockchains. arXiv preprint arXiv:1905.02847 (2019)

  45. Poon, J., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments (2016)

  46. Antonopoulos, A.M., Osuntokun, O., Pickhardt, R.: Mastering the lightning network. O’Reilly Media, Inc. (2021)

  47. Herlihy, M.: Atomic cross-chain swaps. In Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, pp. 245–254 (2018)

  48. Bonneau, J., Clark, J., Goldfeder, S.: On bitcoin as a public randomness source. Cryptology ePrint Archive (2015)

  49. Kiayias, A., Miller, A., Zindros, D.: Non-interactive proofs of proof-of-work. In: Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers 24, pp. 505–522. Springer (2020)

  50. Craig, T.: Building fifo and priorityqueuing spin locks from atomic swap. Technical report, Technical Report TR 93–02–02, Department of Computer Science, University of . . . (1993)

  51. Joshi, A.P., Han, M., Wang, Y.: A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1(2), 121 (2018)

    Article  Google Scholar 

  52. Natoli, C., Gramoli, V.: The balance attack against proof-of-work blockchains: The r3 testbed as an example. arXiv preprint arXiv:1612.09426, 2016.

  53. Adams, H., Zinsmeister, N., Robinson, D.: Uniswap v2 core (2020)

  54. Adams, H., Zinsmeister, N., Salem, M., Keefer, R., Robinson, D.: Uniswap v3 core. Tech. rep., Uniswap, Tech. Rep. (2021)

  55. Jiahua, Xu., Paruch, K., Cousaert, S., Feng, Y.: Sok: Decentralized exchanges (dex) with automated market maker (amm) protocols. ACM Comput. Surv. 55(11), 1–50 (2023)

    Article  Google Scholar 

  56. Lin, L.X., Budish, E., Cong, L.W., He, Z., Bergquist, J.H., Panesir, M.S., Zhang, S.: Deconstructing decentralized exchanges. Stanford J. Blockchain Law Policy 2(1), 58–77 (2019)

    Google Scholar 

  57. Xu, J., Vavryk, N., Paruch, K., Cousaert, S.: Sok: decentralized exchanges (dex) with automated market maker (amm) protocols (2021)., p. 4.

  58. Zhou, L., Qin, K., Gervais, A.: A2mm: Mitigating frontrunning, transaction reordering and consensus instability in decentralized exchanges. arXiv preprint arXiv:2106.07371 (2021)

  59. Van Wirdum, A.: Atomic swaps: how the lightning network extends to altcoins. Bitcoin Mag. (2017)

  60. Xie, T., Zhang, J., Cheng, Z., Zhang, F., Zhang, Y., Jia, Y., Song, D.: zkbridge: Trustless cross-chain bridges made practical. arXiv preprint arXiv:2210.00264 (2022)

  61. Kannengießer, N., Pfister, M., Greulich, M., Lins, S., Sunyaev, A.: Bridges between islands: Cross-chain technology for distributed ledger technology (2020)

  62. Walters, S.: Thorchain review: is rune worth it? what we know!!, Apr (2023)

  63. Binance Academy. What is thorchain (rune)?, Dec 2022.

  64. Borkowski, M., McDonald, D., Ritzer, C., Schulte, S.: Towards atomic cross-chain token transfers: State of the art and open questions within tast. Distributed Systems Group TU Wien (Technische Universit at Wien), Report, 8, 2018.

  65. Biryukov, A., Khovratovich, D., Pustogarov, I: Deanonymisation of clients in bitcoin p2p network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15–29 (2014)

  66. Zohar, A.: Bitcoin: under the hood. Commun. ACM 58(9), 104–113 (2015)

    Article  Google Scholar 

  67. Swathi, P., Modi, C., Patel, D.: Preventing sybil attack in blockchain using distributed behavior monitoring of miners. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–6. IEEE (2019)

  68. Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. ACM SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)

    Article  Google Scholar 

  69. Kiekintveld, C., Lisy`, V., Píbil, R.: Game-theoretic foundations for the strategic use of honeypots in network security. Cyber Warfare: Building the Scientific Foundation, pp. 81–101 (2015)

  70. Manshaei, M.H., Zhu, Q., Alpcan, T., Bacşar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 1–39 (2013)

    Article  MATH  Google Scholar 

Download references


There is no funding involved.

Author information

Authors and Affiliations


Corresponding author

Correspondence to R. I. Minu.

Ethics declarations

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Consent to participate

Not applicable.

Ethics approval

Not applicable.

Consent for publication

Authors give consent to the Journal to publish their article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Joshi, S., Choudhury, A. & Minu, R.I. Quantum blockchain-enabled exchange protocol model for decentralized systems. Quantum Inf Process 22, 404 (2023).

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: