Post-Quantum Cryptographic Techniques for Future-Proofing-Blockchain-Based Personal Data Sharing
DOI:
https://doi.org/10.25195/ijci.v51i2.623Keywords:
, cryptography, Blockchain Security, Encryption, hash functionAbstract
Blockchain has become a critical enabler of secure data sharing in domains such as healthcare, finance, and digital identity. However, its reliance on classical cryptographic schemes (e.g., RSA, ECDSA, SHA-256) makes current systems vulnerable to emerging quantum computing attacks, raising risks to data confidentiality, integrity, and long-term trust. This paper addresses this challenge by proposing a modular hybrid framework that integrates post-quantum cryptographic (PQC) techniques into blockchain-based personal data sharing. The framework combines lattice-based encryption for protecting off-chain data, hash-based signatures for smart contract authentication, and quantum-safe zero-knowledge proofs and trusted execution environments (TEEs) for privacy-preserving verification and secure key management. To ground this design, we conducted a systematic literature review of 35 studies published between 2018 and 2025, analyzing security, scalability, interoperability, regulatory alignment, and user autonomy. Findings reveal that only 5 out of 35 studies (14%) explicitly addressed quantum threats, with over 80% focusing on theoretical resilience without testing implementation constraints. Furthermore, 90% of proposals neglected smart contract compatibility, and only 8% (3/35) incorporated TEEs, underscoring implementation barriers in contract execution, secure key management, and performance integration. Prototype evaluation demonstrated that the framework sustained 1,500 TPS on Hyperledger Fabric, achieved a 75% reduction in storage bloat using IPFS, and supported GDPR-aligned workflows with 99.98% audit log completion and 95% successful erasure requests. Privacy was further strengthened through zk-STARK proofs, which reduced unauthorized access by 40%, while TEEs improved key management efficiency by ~28%. Although PQC introduced 5–12 seconds of latency, consent revocation was processed in under 2.1 seconds, highlighting both the feasibility and trade-offs of practical post-quantum deployment. This work demonstrates a clear pathway toward quantum-resilient blockchain infrastructures that safeguard personal data, comply with regulatory standards, and maintain user trust in the quantum era.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Iraqi Journal for Computers and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
IJCI applies the Creative Commons Attribution (CC BY) license to articles. The author of the submitted paper for publication by IJCI has the CC BY license. Under this Open Access license, the author gives an agreement to any author to reuse the article in whole or part for any purpose, even for commercial purposes. Anyone may copy, distribute, or reuse the content as long as the author and source are properly cited. This facility helps in re-use and ensures that journal content is available for the needs of research.
If the manuscript contains photos, images, figures, tables, audio files, videos, etc., that the author or the co-authors do not own, IJCI will require the author to provide the journal with proof that the owner of that content has given the author written permission to use it, and the owner has approved that the CC BY license being applied to content. IJCI provides a form that the author can use to ask for permission from the owner. If the author does not have owner permission, IJCI will ask the author to remove that content and/or replace it with other content that the author owns or has such permission to use.
Many authors assume that if they previously published a paper through another publisher, they have the right to reuse that content in their PLOS paper, but that is not necessarily the case – it depends on the license that covers the other paper. The author must ascertain the rights he/she has of a specific license (a license that enables the author to use the content). The author must obtain written permission from the publisher to use the content in the IJCI paper. The author should not include any content in her/his IJCI paper without having the right to use it, and always give proper attribution.
The accompanying submitted data should be stated with licensing policies, the policies should not be more restrictive than CC BY.
IJCI has the right to remove photos, captures, images, figures, tables, illustrations, audio, and video files, from a paper before or after publication, if these contents were included in the author's paper without permission from the owner of the content.







