https://doi.org/10.1140/epjqt/s40507-025-00462-y
Research
A cross-chain model with underlying security and scalability based on quantum algorithm
1
China Information Technology Security Evaluation Center, 100085, Beijing, China
2
School of Cyberspace Security, Beijing University of Posts and Telecommunications, 100876, Beijing, China
3
Beijing Electronic Science and Technology Institute, 100070, Beijing, China
4
Department of Sciences and Informatics, Muroran Institute of Technology, Muroran, Japan
5
College of Information Science and Engineering, ZaoZhuang University, 277160, ZaoZhuang, Shandong, China
a
This email address is being protected from spambots. You need JavaScript enabled to view it.
Received:
23
May
2023
Accepted:
31
December
2025
Published online:
29
January
2026
Abstract
Cross-chain relay architectures face critical security gaps: centralized trust dependencies, consensus vulnerabilities, and potential quantum threats. We propose the Quantum Cross-Chain (QCC) model—a post-quantum secure framework integrating quantum cryptography at the foundational layer. QCC establishes a global identity registry for heterogeneous chains and introduces a Two-Way Identity Authentication (TIA) protocol using GHZ entanglement, enabling information-theoretically secure mutual verification in a single execution. To fortify transaction integrity, we design a Quantum Ring Signature (QRS) scheme with novel key-loss security, ensuring that compromised keys cannot forge valid signatures. Unlike conventional systems that rely on smart contract autonomy, QCC delegates security to quantum one-way functions and distributed auditing, synchronizing consensus transmission with cryptographic validation. Formal verification proves composite security bounded by
, while simulations demonstrate stable throughput (78.5 TPS) and predictable latency (130 ms) under variable network conditions. QCC achieves post-quantum resilience, decentralized auditability, and linear scalability, providing a practical blueprint for next-generation cross-chain infrastructure.
Key words: Cross-chain / Access control / Quantum signature / Secure mechanism
© The Author(s) 2026
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

