Skip to main content
. 2025 Aug 23;15:31048. doi: 10.1038/s41598-025-16315-8

Table 1.

Notations used in the QuantumShield-BC framework for quantum-secure blockchain operations.

Notation Definition
Inline graphic Transaction initiated by the user in the blockchain network
Inline graphic A post-quantum digital signature is generated using a private key
Inline graphic Cryptographic hash of the transaction
Inline graphic Transaction validity function, verifying if the transaction is authentic using post-quantum cryptography
Inline graphic Newly created blockchain block containing validated transactions
Inline graphic Cryptographic hash of the newly created block using quantum-resistant hashing
Inline graphic The previous block’s hash is used to ensure blockchain immutability
Inline graphic Post-quantum public key of validator ii
Inline graphic Individual transactions in a block
Inline graphic Validator authentication status using post-quantum signatures
Inline graphic Consensus validation result ensures all transactions in a block are validated
Inline graphic The secret key is established using Quantum Key Distribution (QKD)
Inline graphic The quantum state is transmitted from the sender node (Alice) in QKD
Inline graphic Quantum state received by receiver node (Bob) in QKD
Inline graphic A hybrid encryption key is generated from QKD, and a post-quantum key encapsulation mechanism (PQC-KEM) is used
Inline graphic Quantum consensus threshold, ensuring that a predefined fraction of validators reach agreement
Inline graphic An individual validator’s vote contributes to the consensus process
Inline graphic A minimum threshold is required to achieve consensus in Q-BFT
Inline graphic Quantum entropy value generated by the Quantum Random Number Generator (QRNG)
Inline graphic Sequence of quantum bits used for entropy generation in QRNG
Inline graphic Probability distribution of quantum states in QRNG
Inline graphic The leader node is selected for block finalization in the consensus process
Inline graphic Block confirmation time measures the total time to validate and finalize a block
Inline graphic Computational complexity of breaking a cryptographic key using Shor’s Algorithm
Inline graphic Computational complexity of searching for a cryptographic hash using Grover’s Algorithm
Inline graphic Network overhead factor introduced by QKD encryption
Inline graphic Bandwidth consumed during QKD-based encryption
Inline graphic Bandwidth consumed using classical encryption methods
Inline graphic Multi-party consensus verification function using quantum-secure cryptography