Advanced Cryptographic Architecture for Blockchain Security: A Multi-Tiered Defense Framework Against Quantum and Contemporary Threats

Authors

  • P. M. Srinivas NMAM Institute of Technology (NMAMIT), Nitte (Deemed to be University), India | Department of Computer Science and Engineering, Sahyadri College of Engineering and Management, Mangaluru, India
  • K. B. Sudeepa Department of Computer Science and Engineering, NMAM Institute of Technology (NMAMIT), Nitte (Deemed to be University), India
  • Ananth G. Prabhu Department of Computer Science and Engineering, Sahyadri College of Engineering and Management, Mangaluru, India
Volume: 16 | Issue: 2 | Pages: 34667-34675 | April 2026 | https://doi.org/10.48084/etasr.17591

Abstract

Blockchain technology faces increasing security threats from post-quantum vulnerabilities, sophisticated cyberattacks, and fragmented cryptographic implementations. This study proposes a comprehensive multi-layer cryptographic framework that integrates Zero-Knowledge Proofs (ZKPs), Homomorphic Encryption (HE), post-quantum algorithms, threshold cryptography, and Secure Multi-Party Computation (SMPC) across data, network, consensus, and application layers to realize a defense-in-depth model. Grounded in the Confidentiality, Integrity, and Availability (CIA) triad and defense-in-depth ethics, the framework is implemented on Hyperledger Fabric v2.5.4 with modern cryptographic libraries and evaluated over 10⁵ transactions, where baseline performance (245 ± 12 ms, 1,250 tx/s) versus the full framework (2,150 ± 78 ms, 168 tx/s) quantifies the overhead of enhanced security. The work contributes a multi-tier framework, a quantum-resilient consensus with Verifiable Delay Functions (VDFs) for 51% attack detection, a standardization roadmap for cross-chain cryptographic substantiation, and practical operations in healthcare, finance, and supply chain setups. Results demonstrate strengthened confidentiality, integrity, and authentication via encrypted computation, Byzantine Fault-Tolerant (BFT) consensus, and threshold multi-signatures, with hybrid classical–Post-Quantum Cryptography (PQC) and mitigation strategies such as off-chain computation and hardware acceleration offsetting computational costs. Unlike fragmented prior efforts, this integrated, governance-elastic blueprint enables quantum-aware, multi-layer security assurance for regulated enterprises without sacrificing decentralization or scalability.

Keywords:

Byzantine fault tolerance, cryptographic interoperability, Zero-Knowledge Proofs (ZKPs), Homomorphic Encryption (HE), Post-Quantum Cryptography (PQC), threshold signatures

Downloads

Download data is not yet available.

References

W. Li, H. Guo, M. Nejad, and C.-C. Shen, "Privacy-Preserving Traffic Management: A Blockchain and Zero-Knowledge Proof Inspired Approach," IEEE Access, vol. 8, pp. 181733–181743, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.3028189

Z. Wu, H. Xu, M. Yue, and Y. Lu, "Blockchain security threats: A comprehensive classification and impact assessment," Computer Networks, vol. 265, June 2025, Art. no. 111284. DOI: https://doi.org/10.1016/j.comnet.2025.111284

G. Wu, J. Zhou, and X. Fu, "Improved blockchain-based ECDSA batch verification scheme," Frontiers in Blockchain, vol. 8, Feb. 2025, Art. no. 1495984. DOI: https://doi.org/10.3389/fbloc.2025.1495984

S. Goundar and I. Gondal, "AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation," Journal of Cybersecurity and Privacy, vol. 5, no. 3, Aug. 2025, Art. no. 59. DOI: https://doi.org/10.3390/jcp5030059

N. Ahmed, L. Zhang, and A. Gangopadhyay, "A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries," in 2025 IEEE International Conference on Quantum Computing and Engineering, Albuquerque, NM, USA, 2025, pp. 906–917. DOI: https://doi.org/10.1109/QCE65121.2025.00102

H. Khodaiemehr, K. Bagheri, and C. Feng, "Navigating the quantum computing threat landscape for blockchains: A comprehensive survey," Computer Science Review, vol. 59, Feb. 2026, Art. no. 100846. DOI: https://doi.org/10.1016/j.cosrev.2025.100846

B. Bugra Sezer, S. Akleylek, and U. Nuriyev, "PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge," IEEE Access, vol. 13, pp. 41382–41405, 2025. DOI: https://doi.org/10.1109/ACCESS.2025.3545943

S. Heidari, S. Hashemi, M.-S. Khorsand, A. Daneshfar, and S. Jazayerifar, "Towards Standardized Regulations for Block Chain Smart Contracts: Insights from Delphi and Swara Analysis," Amity Journal of Management, vol. 11, no. 2, pp. 1–15, Dec. 2023. DOI: https://doi.org/10.31620/AJM.1

S. R, R. Chirakarotu Nair, and P. Kumar Panakalapati, "Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions," Security and Privacy, vol. 8, no. 1, 2025, Art. no. e461. DOI: https://doi.org/10.1002/spy2.461

S. Barj and A. Youjil, "Blockchain and Cryptocurrency Security from a New Layered Perspective and a Novel MITRE ATT&CK-based Approach for Understanding Cyberattacks and Mitigating Their Impacts," International Journal of Engineering Trends and Technology, vol. 72, no. 4, Apr. 2024, Art. no. IJETT-V72I4P101. DOI: https://doi.org/10.14445/22315381/IJETT-V72I4P101

L. Zhou, A. Diro, A. Saini, S. Kaisar, and P. C. Hiep, "Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities," Journal of Information Security and Applications, vol. 80, Feb. 2024, Art. no. 103678. DOI: https://doi.org/10.1016/j.jisa.2023.103678

H. Xie, S. Fei, Z. Yan, and Y. Xiao, "SofitMix: A Secure Offchain-Supported Bitcoin-Compatible Mixing Protocol," IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 5, pp. 4311–4324, Sept. 2023. DOI: https://doi.org/10.1109/TDSC.2022.3213824

X. Wu, J. Wang, and T. Zhang, "Integrating fully homomorphic encryption to enhance the security of blockchain applications," Future Generation Computer Systems, vol. 161, pp. 467–477, Dec. 2024. DOI: https://doi.org/10.1016/j.future.2024.07.015

F. Zhang and L. Zhang, "A Cryptographic Blockchain-IPFS Framework for Secure Distributed Database Storage and Access Control," Informatica, vol. 49, no. 30, pp. 159–176, Aug. 2025. DOI: https://doi.org/10.31449/inf.v49i30.8271

H. Yu and H. Wang, "Elliptic curve threshold signature scheme for blockchain," Journal of Information Security and Applications, vol. 70, Nov. 2022, Art. no. 103345. DOI: https://doi.org/10.1016/j.jisa.2022.103345

H. Bao, M. Yuan, H. Deng, J. Xu, and Y. Zhao, "Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain," Heliyon, vol. 10, no. 14, July 2024, Art. no. e34458. DOI: https://doi.org/10.1016/j.heliyon.2024.e34458

Q. Wu, L. Xi, S. Wang, S. Ji, S. Wang, and Y. Ren, "Verifiable Delay Function and Its Blockchain-Related Application: A Survey," Sensors, vol. 22, no. 19, Oct. 2022, Art. no. 7524. DOI: https://doi.org/10.3390/s22197524

A. Sanmorino, L. Marnisah, and H. D. Kesuma, "Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16444–16449, Oct. 2024. DOI: https://doi.org/10.48084/etasr.8362

I. Popchev and I. Radeva, "Decentralized Application (dApp) Development and Implementation," Cybernetics and Information Technologies, vol. 24, no. 2, pp. 122–141, June 2024. DOI: https://doi.org/10.2478/cait-2024-0019

B. Oude Roelink, M. El-Hajj, and D. Sarmah, "Systematic review: Comparing zk-SNARK, zk-STARK, and bulletproof protocols for privacy-preserving authentication," Security and Privacy, vol. 7, no. 5, Sept. 2024, Art. no. e401. DOI: https://doi.org/10.1002/spy2.401

Downloads

How to Cite

[1]
P. M. Srinivas, K. B. Sudeepa, and A. G. Prabhu, “Advanced Cryptographic Architecture for Blockchain Security: A Multi-Tiered Defense Framework Against Quantum and Contemporary Threats”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 2, pp. 34667–34675, Apr. 2026.

Metrics

Abstract Views: 146
PDF Downloads: 80

Metrics Information