Trust in network nodes

Implementation of secure communication and data storage using a post-quantum encryption algorithm and signature scheme with a blockchain environment

Master Thesis (2025)
Author(s)

K. Penchev (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

K. Liang – Mentor (TU Delft - Cyber Security)

G. Smaragdakis – Graduation committee member (TU Delft - Cyber Security)

Q. Wang – Graduation committee member (TU Delft - Embedded Systems)

Faculty
Electrical Engineering, Mathematics and Computer Science
More Info
expand_more
Publication Year
2025
Language
English
Graduation Date
03-09-2025
Awarding Institution
Delft University of Technology
Programme
['Computer Science | Cyber Security']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The development of quantum computing poses a significant threat to currently deployed cryptographic primitives. To address this challenge, we design and implement a system to communicate and store data using post-quantum secure algorithms for a distributed blockchain environment. Specifically, we combine the Crystal-Dilithium digital signature scheme and an Updatable Encryption scheme based on the Learning With Errors problem in the context of a Hyperledger Fabric network. The Crystal-Dilithium scheme ensures authenticity and integrity of transmitted data, while the Updatable Encryption scheme provides confidentiality and integrity to transmitted data as well as allowing key rotation and ciphertext updates without requiring data re-encryption from scratch. An end-to-end prototype of the system is developed, including client-side modules, a Hyperledger Fabric gateway and smart contract modules that can be deployed on a Hyperledger Fabric network, with all components implemented in Python and Golang. The system is evaluated through functional integration tests and performance benchmarks. Results demonstrate that the Crystal-Dilithium scheme achieve sub-second execution for key generation, signing, and verification for multiple different parameter sets. For the Updatable Encryption scheme, encryption, decryption, and ciphertext updates exhibit linear scalability in time complexity with respect to the size and dimensions of input parameters, while token generation emerges as the most computationally demanding step in the algorithm. Additional experiments highlight the practical limits of repeated key rotations due to accumulated error growth.

Files

License info not available