Your new experience awaits. Try the new design now and help us make it even better

ORIGINAL RESEARCH article

Front. Phys., 14 January 2026

Sec. Quantum Engineering and Technology

Volume 13 - 2025 | https://doi.org/10.3389/fphy.2025.1727394

This article is part of the Research TopicNext-Generation Security for Critical Infrastructures: Advancing Privacy, Resilience, and Post-Quantum ProtectionView all 4 articles

Integrating blockchain with lattice-based cryptography for privacy-preserving and quantum-secure smart grid communications

Umair HabibUmair Habib1Mahwish BanoMahwish Bano1Jawaid IqbalJawaid Iqbal2Fahima HajjejFahima Hajjej3Insaf Ullah
Insaf Ullah4*
  • 1Department of Mathematics, Air University, Islamabad, Pakistan
  • 2Faculty of Computing, Riphah International University, Islamabad, Pakistan
  • 3Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
  • 4Institute for Analytics and Data Science, University of Essex, Colchester, United Kingdom

The Smart Grid (SG) is an upgraded electrical system integrated with Information and Communication Technology (ICT) to provide two-way data exchange between power consumers and manufacturers. This innovation facilitates smooth digital connectivity between smart devices like Smart Appliances (SAs), Smart Meters (SMs), and the Service Provider (SP), enabling remote data management to achieve enhanced energy distribution. However, using insecure wireless communications channels poses serious security threats, such as replay, impersonation, man-in-the-middle, and physical capture attacks. Numerous cryptographic algorithms, including RSA, Bilinear Pairing, Data Encryption Standard (DES), and Advanced Encryption Standard (AES), are used in existing studies to address the problem of information breakout. Furthermore, because the parameters and key space are so large, these methods suffer from higher computing costs and communication overhead. To resolve this issue, we have proposed a lattice-based privacy-preserving framework for the SG network that can withstand quantum attacks. Moreover, because quantum computers cannot solve the lattice-based hard problems, the lattice-based signcryption scheme is developed to resist quantum attacks. We have also integrated blockchain technology with the proposed scheme to make the data tamper-resistant and secure against adversary attacks. The proposed protocol is intended to offer data confidentiality, data integrity, and unforgeability. The proposed protocol also withstands several known attacks, such as Man-in-the-Middle (MITM), replay, known session key, insider, and post-quantum attacks. We have simulated our scheme using the AVISPA simulation program, which proves the efficiency and effectiveness of our proposed scheme in meeting the required security properties.

1 Introduction

The traditional grid is transformed into a dynamic, two-way communication network by the SG, an innovative change in electricity distribution. Being an Internet of Things (IoT) application, its primary goal is to smoothly convey electricity and information to customers. A standard grid is transformed into an SG using this approach, which allows for bidirectional data flow [1]. SMs, SAs, and integration of renewable energy resources on the prosumer’s side are the key components [2]. The IoT is an inter-network of different intelligent devices, sense tasks from scattered locations, and transmit data to various servers and shop outlets. As an application of smart tools in numerous research fields, the IoT has developed extensively [3]. With state-of-the-art ICTs, the SG, or next-generation electrical grid network, facilitates two-way communication between cloud and IoT domains [4]. With the emergence of ICT, they have demonstrated their huge potential for being incorporated into the traditional power grids. For example, power utilities in the US have established a vast information infrastructure to gather real-time grid data, i.e., current and voltage, which improves the extent of power management and energy consumption, and also satisfies safety requirements. Its fault diagnostic capabilities have significantly improved electric utility businesses' energy transmission, distribution, control, and consumption. Additionally, it provides the ability to anticipate power outages and prevent them. A need is increasingly felt to make maximum use of renewable sources of energy by the grid [5]. The presence of heterogeneous devices together makes SG [6, 7] vulnerable to security and privacy threats, just like any other IoT application. Let us illustrate: utility companies use metering information to help with operational planning, like forecasting power demand, and planning and optimizing power supply and distribution. Privacy concerns may arise from all of this data processing. In certain situations, a malicious attacker may try to gather the user’s consumption data and subsequently extract necessary information from it, such as lifestyle choices, financial standing, etc. [8]. IoT is the technology through which the SG network is enabled. SGs are susceptible to attacks, despite their many advantages. Hackers might use the IoT-integrated SG’s flaws to halt all electricity transmission, including the billing stages, resulting in large financial losses [9].

A typical SG IoT network setup consists of several SAs linked to an SM that regularly transmits the used data from each appliance to an aggregator gateway node [10]. To protect user privacy, readings from the SM are transmitted in encrypted form to the aggregator node. They must be gathered by the aggregator before transmitting to a cloud center. This conserves time without sacrificing privacy. Blockchain, being a decentralized network, functions based on a blockchain where each block consists of one transaction. It is different from traditional client-server architectures, where network administrators are in control. Blockchain uses a decentralized, distributed peer-to-peer network. Each user is in control in this design, and the network is made up of many linked computers or nodes. The records are rendered immutable since each node replicates the digital ledger, and blocks in the chain cannot be changed without the network’s consent [1113]. This technology uses a distributed ledger accessible across multiple computers, ensuring each participant on the network has a copy of the entire database, making it nearly impossible to alter information [14, 15]. Transactions in a blockchain are collated in blocks, and every new block is connected with the previous one using cryptographic methods, producing an unbreakable and secure chain. Therefore, blockchain provides a transparent, verifiable, and secure platform for making transactions and controlling data for different applications [1618], such as the SG network. Accordingly, the use of blockchain technology in SG holds the potential for a more efficient and secure way of electricity distribution, which can revolutionize the energy industry [19].

In the next section, we outlined the main contributions of this article.

1.1 Contributions

This study suggests a simple and safe data transmission protocol based on lattice-based cryptography and blockchain to prevent hackers from accessing sensitive data moving between various smart devices in the SG network. The following are this article’s primary contributions.

• An efficient and secure privacy-preserving framework is proposed by combining lattice-based cryptography with blockchain technology to ensure secure data sharing in the SG network.

• Our proposed lattice-based scheme keeps intact all the required security features, such as Confidentiality, Integrity, and Unforgeability.

• Our proposed scheme enhances the network interoperability, traceability, scalability, and privacy by applying the concept of consortium blockchain.

• The numerical results obtained and security analysis prove that our scheme is efficient in process cost, communication overhead, and storage cost, compared to existing state-of-the-art schemes.

1.2 Organizations

The rest of the article is structured as follows. Section 2 presents some of the related work in this area. Section 3 presents the preliminaries. In Section 4, the communication model is presented. Section 5 explains the threat model associated with the scheme. Section 6 explains the blockchain mechanism adopted by the proposed scheme. The scheme proposed is in Section 7. Section 8 deals with the security analysis of the scheme proposed. Performance analysis of the scheme is in Section 9. Lastly, the conclusion of the article is in Section 10.

The notations and descriptions that are often used in the article are shown in Table 1.

Table 1
www.frontiersin.org

Table 1. Notation table.

2 Related works

It presents an overview of the current developments and security features of SG. The inclusion of blockchain in SG introduces a consensus-driven method for controlling system transactions. Smart contracts facilitate transactions, and all complete nodes on the blockchain store the transaction record. Blockchain technology is a particularly attractive addition to SG architecture because of its immutability, which guarantees the security of smart contracts and transaction data [2022]. One-Time Pad (OTP) homomorphic encryption scheme was proposed by Lyu et al. [23] as a fog-assisted data accumulation technique that protects privacy. Despite its mathematical security, OTP has drawbacks. First, the key and the message should have the same size. Secondly, OTP requires a unique key to be generated for each encryption. Third, it takes time to manage several keys. An anonymous fog-based SG data accumulation technique with metered data source authenticity and data integrity was proposed by Wang et al. [24] to protect privacy. To provide data source authentication and data integrity, they used a pairing-based signature technique, which does come with a calculation cost at signature verification. The authors provided effective revocation of fog nodes and hacker terminal devices while emphasizing anonymity. Authors in [25] provided a structured overview of various methods and approaches that can be employed for energy system cybersecurity. Kim et al. [26] conducted a study on how the attack on the components of SG networks can be prevented. They also point out the latest issues and studied future research trends to figure them out. Sadly, this study is plagued by availability and authenticity issues. A hybrid CNN-based energy-theft-detection framework was also used in the work [27] to detect any type of data-tampering cyber-attack vectors, but not for regions where data is used extensively.

A mutually authenticated method of key transfer for SM has been proposed by Harishma et al. [28]. The authors used the AES, SHA-2, identity-based encryption, and PUF features to build a technique between the SM and UC that protects conversation and maintains information secrecy. In the construction of Kerberos-based authentication protocols for this study, the authors of [29] employed ECC to maintain mutual authentication between two parties while minimizing time and bit operations. Additionally, this work has shown that the suggested protocol is safe against unwanted access and is assessed both formally and technically. Zhe et al. [30] suggested a two-round AKE scheme with strong security for SG based on digital signatures and Diffie-Hellman key exchange. As the suggested mechanism has two rounds of communication among SG entities and others do three rounds of key exchanges, its performance analysis reveals that it performs better compared to the others. However, this system is susceptible to a Man-in-the-Middle (MITM) attack during the key exchange process. Also, being an RSA-based digital signature encryption, it has huge storage expenses as well as massive computational and transmission overhead. Wang et al. discuss authenticated key agreement systems in [31]. They proposed an ECC-based mutual authentication key agreement technique. Their system outperforms competing schemes based on numerous encryption processes, communication expenses, and computational costs. To safeguard participants' privacy and mitigate the effects of model poisoning assaults, Xiumin et al. [32] presented a privacy-preserving FL scheme (PFLS) against poisoning attacks. To be more precise, a dynamic adaptive defence mechanism is intended to identify malicious individuals and lessen the effects of malicious gradients. Zhang et al.'s [33] EPri-MDAS is a secure privacy-preserving multiple data accumulation plan without the need for a trusted authority. The scheme is built upon the ElGamal homomorphic cryptosystem and facilitates both data integrity verification and data source authentication by leveraging the most secure block cipher-based authenticated encryption algorithm. Chunqiang et al. [34] provide a novel privacy-preserving cloud-aided load forecasting scheme for the cloud computing-based SG. It possesses an efficient real-time forecasting mechanism and a secure online training process. In actual applications, however, the two-party interaction security process is more appropriate. At the SG control center, data is encrypted with homomorphic encryption prior to transfer to the cloud server. To reduce the risk of data privacy breaches, data is always securely encrypted when the model is being trained and forecasted.

Khan et al. [35] demonstrate the way to implement a secure and reliable SG authentication system by combining biometric information with ECC technology. It places the utmost importance on communication security by addressing problems such as eavesdropping, identity theft, and replay attacks. The growing use of smart devices, such as SMs and controllers, that are vulnerable to cyberattacks in the form of replay and DoS attacks, poses security threats in the SG network, which Li et al. [36] mitigate. To achieve better security, the authors design a blockchain-based multi-domain authentication mechanism. The authors utilize secure cross-domain communication methods and dynamic device administration. They state that their system effectively safeguards SG against potential cyberattacks using security analysis as well as simulation testing. Choudhary et al. [37] introduce a trustworthy key agreement solution for SG communications that is more secure and PKI-free. The solution establishes a session key between service providers and SMs using a 160-bit ECC key for attack-resistant, efficient security. Mustafa et al. [38] suggested an authenticated key establishment process for SG. The proposed method not only achieves Perfect Forward Secrecy but also resists impersonation and session key exposure attacks. Shekhawat et al. [39] discuss how IoT technology is harnessed to improve SG networks towards effective energy management. It propounds a quantum-resilient protocol that provides mutual trust between devices and secure communication against possible quantum attacks. The protocol is especially suitable for low-resource networks since it uses low energy, storage, and communication costs. Quantum-Resistant Hybrid Encryption for the Internet of Things (QRHE-IoT) is a revolutionary enciphering technique proposed by Jian et al. [40]. To offer strong security, QRHE-IoT integrates quantum-resistant algorithms along with the benefits of private and public key enciphering techniques. Imtiaz et al. [41] proposed a new authentication management model with two-layer security. Using two partially trusted basic servers, the first layer deploys an effective new encryption technique for safe data transfer between SM and the cloud center. The second layer keeps track of and validates data packets that are sent back and forth between SMs. A one-class support vector machine approach is suggested to perform this node-to-node authentication, utilizing the location data and the data transfer history. Zhang et al. [42] presented a novel method for secure data exchange in the SG network based on blockchain technology. Conventional methods use central systems and lack proper authentication. The suggested architecture provides secure, traceable data exchange through combining encryption and blockchain technology. It also has a game theory-embedded incentive model to encourage the data owners to contribute their data. The findings confirm that this model is better than others for low-cost, large-scale data sharing in SG. A new secure key exchange method for blockchain-based SG networks was subsequently proposed by Liu et al. [43], providing an effective, secure, and cost-saving key management solution. Based on the Diffie-Hellman algorithm Secure Key Exchange (SKE), it consolidates users, smart gateways, management, power, and transmission. The SKE method, which is adopted in MATLAB, is more secure and computationally efficient compared to protocols like DPPDA, MAS, and DBACP-IoTSG. To minimize the threat factors associated with public network transfer of confidential data, Abdullah et al. [44] proposed a secure and effective SG authentication method. The system security is built against various SG attacks using Burrows-Abadi-Needham logic. Furthermore, because it strives to minimize computation, communication, and storage costs, the system presents an improved alternative to traditional cryptography methods.

A summary of the related works is presented in Table 2.

Table 2
www.frontiersin.org

Table 2. Summary of related works.

3 Preliminaries

Cryptographic algorithms and protocols developed to withstand attacks by quantum computers are referred to as Post-Quantum Cryptography (PQC). By taking advantage of their capacity to effectively solve specific mathematical problems like discrete logarithms and integer factorization, quantum computers can crack many of the cryptographic systems now used for protecting digital communication and data, including RSA and Elliptic Curve Cryptography (ECC). Several preparatory steps are important for the creation and acceptance of PQC to secure our digital infrastructure and get ready for the arrival of quantum computers.

3.1 Quantum computations

Unlike traditional computers, quantum computers provide a parallel computing mode known as quantum computation. Quantum information processing is more efficient than classical information processing because of the state superposition principle of quantum physics, which allows a quantum information unit’s state to exist in a state of superposition of several possibilities. A normal computer’s 2-bit register can only hold one of the four binary numbers (00,01,10,11) at any given moment. In contrast, a quantum computer’s 2-bit qubit registers can hold all four superposition states at once. Due to quantum mechanical evolution parallelism, quantum information may be in a superposition of two states with an increasing number of qubits, n qubits, and may be able to process information more quickly than traditional computers [45].

A quantum computer’s computational power has made it easy to compute the secret key based on previously challenging number theory on an electronic computer. In 2020, Carames [46] predicted that within 20 years, quantum computers would be strong enough to crack the current public key cryptography system, including the Diffie-Hellman key agreement algorithm, RSA algorithm, and Elliptic curve encryption. Consequently, the goal is to create a cryptography system that can withstand quantum attacks. We must identify challenging mathematical issues that are beyond the capabilities of quantum computing.

3.2 Lattice-based cryptography

In response to the threat posed by quantum computers, cryptographers came up with the term “post-quantum cryptography,” which attempts to develop cryptographic methods resistant to the threat of quantum computation, more especially, public-key encryption and digital signature schemes. To discover a post-quantum password impervious to quantum attacks, the National Institute of Standards and Technology (NIST) released a collection on post-quantum cryptography in 2016. Five of the seven officially selected algorithms in the third testing phase of 2020 are based on lattice-based cryptography, according to NIST. Lattice-based cryptography is based on the intricacy of lattice problems. Chaudhary [47] recognized that the advantage of lattice-based cryptography over other cryptosystems is that even quantum computers cannot crack it in polynomial time. Under the typical scenario, the lattice’s problem-solving hardness is at least as challenging as the most difficult problem. Digital signatures and public-key cryptography can be developed in the meantime, and the method complexity is low, according to the hard lattice issue.

3.2.1 Lattice

Consider a set of linearly independent vectors p=p1,p2,,pxRy, a lattice symbolized by L is a linear combination of vectors p1,p2,,px with coefficients in Z, which can be defined as:

L=k=1xck*pk:ckZ

These linearly independent vectors p1,p2,,px are called basis vectors for the Lattice (L). The basis of L can be defined as a matrix P=p1,p2,,pxRy×x. Hence LP=Pb:bZx.

3.3 Lattice hard assumptions

The hard assumptions of a lattice are the Shortest Vector Problem (SVP) and the Closest Vector Problem (CVP) [48]. The SVP is assumed to be computationally hard to find a non-zero vector in L whose Euclidean norm is minimum. The minimum Euclidean norm is DminL=minpL\{0p. Similarly, CVP is also assumed to be computationally hard in terms of finding the closest vector to a given vector that does not belong to L.

3.3.1 Definition (Shortest Vector Problem (SVP))

Finding a non-zero vector kLP for k=DminL is computationally challenging given a L(P) and its basis matrix PZy×x. This is known as the SVP.

3.3.2 Definition (Closest Vector Problem (CVP))

Given an L(P), its basis matrix PZy×x, and a vector kL. Finding a non-zero vector wLP such that kw=DminL is computationally challenging. This is known as the CVP.

To design a cryptographic protocol using lattice operations, most cryptographers use “s-ary” lattices and their hard assumptions. A lattice L allows modular arithmetic in an “s-ary” lattice where S is an integer modulus.

3.3.3 Definition: s-array lattice

For a given matrix PZsy×x:x>y with integer modulo “s”, two “s-ary” lattices are defined as follows.

ϑS=gZx:P.g=0mods
ϑs=gZx:g=PT.fmodswherefZy

The hard problems of the “s-ary” lattice are described below.

3.3.4 Definition. Small integer solution (SIS) problem

Given a modular matrix PZsy×x and “d” a constant number. Finding a vector gZx\0 such that P.g=0mods and g<d, is extremely challenging for any hacker. Finding that vector is called the SIS problem.

3.3.5 Definition. Inhomogeneous small integer solution (ISIS) problem

Given a modular matrix PZsy×x, “d” a constant, and a random vector fZsy, it is computationally difficult to find a vector gZx\ {0} such that P.g=fmodsandg<d.

3.3.6 Module lattice

A module lattice over the ring R is formed by a collection of vectors b1,b2,bk that belong to Rn, defined as follows:

L=ribi|riRfori=1tok

These organized lattices support operations in high-dimensional polynomial spaces. Addressing challenges like the SVP or the CVP within these module lattices proves difficult, even when utilizing quantum algorithms. This difficulty underpins the security of PQC systems.

3.4 Modular arithmetic

Let “a” be any integer and let “m” be a positive number. The formula abmodm represents the unique nonnegative integer “r” such that ab is an integer multiple of “m” and 0r<m.

The difference between “a” and “b” is therefore a multiple of m. The modulus is the term assigned to “m”. The addition, subtraction, and multiplication operations can also be used in modular arithmetic. Any integers “a” and “b” can be expressed as follows:

amodm+bmodmmodma+bmodm
amodmbmodmmodmabmodm
amodm×bmodmmodmabmodm

If there is just one positive integer factor between two integers, “a” and “m”, we say that they are relatively prime. There is an integer “b” (sometimes called an inverse of “a modulo m”) such that ab1modulom exists if “a” and “m” are relatively prime. Polynomials are used for modular arithmetic in the NTRU cryptosystem. These characteristics can therefore be applied to polynomials. Assume “a” and “b” are polynomials of the following form:

a=a0+a1X+a2X2++aN1XN1+aNXN
b=b0+b1X+b2X2++bN1XN1+bNXN

Where every coefficient is an integer. To represent the product of the polynomials “a” and “b”, we write ab. The polynomial that results from substituting c (modulo m) for each of the coefficients c of ab is known as “ab (modulo m)”.

4 Communication model

We will discuss the SG communications framework as indicated in Figure 1 in this paper. The communication data transmission networks and the electric transmission networks operate separately in the present setup. In the SG infrastructure, the SM collects different information, such as the electricity consumption, voltage levels, consumption habits, and electricity use time. The gathered data is transmitted to the nearby proxy node and then stored on the blockchain network. Finally, it is retrieved by the Control Center (CC) and other approved supervisory personnel of the Service Provider (SP), which assesses the electric capacity of SG networks and give an effective reply and real-time pricing. Besides monitoring power usage, the embedded SM within the network acts as a communications gateway. SM is also exposed to different attacks since it transmits the sensitive information to the proxy node and then into the blockchain network through an open wireless network.

Figure 1
Diagram illustrating an energy management system integrating thermal plants, renewable sources, and nuclear plants with smart homes using smart meters. Energy flows to a distribution substation and industrial areas, linked to a blockchain network. Two proxy nodes connect to a control center, exchanging data requests and responses. Notations explain symbols for smart meters, data flow, and wireless connections.

Figure 1. Architecture of the proposed scheme.

Thus, an attacker can capture, alter, and replay such information to breach user privacy and manipulate the data.

5 Threat model

The SG network is employed primarily in unattended environments; therefore, it is necessary to assess all potential scenarios under which its devices become vulnerable. To guarantee a successful security analysis, the security of the suggested protocol in this study is examined using the popular Dolev-Yao (DY) threat model [49].

The following are the assumptions of this threat model.

• The adversary (Ŵ) has access to the communication channel and endpoint entities, i.e., SAs and SMs are not trustworthy.

• Through intercepting, altering, or tampering with the transmitted message during the implementation of the scheme, the Ŵ can carry out any type of security attack.

• A physical capture of any endpoint entity, such as SAs and SMs, is possible by the Ŵ, and with the assistance of a power analysis attack, secret credentials stored can be retrieved.

• Anyone can perform a security attack by assuming the role of the Ŵ, even a privileged insider who is a legitimate user of the system.

The Ŵ might initiate further attacks to mislead the system and get individual information. However, the main focus of this article is to prevent sensitive individual information from the Ŵ attacks by using the blockchain-based framework.

6 Blockchain mechanism

The easiest way to describe the blockchain is a chain composed of many blocks filled with information [50]. The most striking characteristic of this technology is that it maintains a record of all the alterations in the blocks that it produces in a way that none of the blocks can be deleted or altered. Because of this, blockchain provides a very safe way to transfer assets, money, and contracts without the need for a middleman like banks or governments [51]. Essentially, data stored in the blockchain cannot be altered once it has been recorded. For categorization, blockchain is a program protocol that cannot survive without the Internet. Blockchain networks consist of numerous components, including software programs, a database, and numerous interconnected computers called nodes. Even though the blockchain may be constructed with varied programming languages, Solidity, an object-oriented high-level programming language, is the de facto programming language of most of today’s blockchain developers [52].

6.1 Basic terminologies of blockchain

Figure 2 depicts the basic structure of the blockchain. Every blockchain starts with the Genesis block, which signifies the start of the chain. Each block will eventually be connected to the genesis block since the newly created blocks will then be coupled to the existing blocks in the chain. Each block has a hash in addition to the contents. As seen in Figure 2, the hash can be thought of as a fingerprint that uniquely describes each block and its contents. As a result, altering the block’s content will also alter the hash that corresponds to it [53].

Figure 2
Diagram illustrating a blockchain structure with three connected blocks labeled

Figure 2. General structure of the Blockchain [64].

Since hashes are a key guarantee of blockchain security, they are an essential part of how blockchain functions. As seen in Figure 2, every block in the chain carries both its own hash and the hash of the block before it. Because of this, blockchain technology is among the safest on the market right now [54]. The hash of a block will alter if its data is altered in an attack, but the hash of the block after it won't. Consequently, all subsequent blocks are deemed invalid. Therefore, all subsequent blocks in the chain are considered invalid if a block in the blockchain is changed [54].

Figure 3 illustrates the general procedure that underpins blockchain operation. A request for a transaction, which might have been completed by any user, starts the process. Sending the transaction to every user on the network is the second stage. Verification is the third phase, in which all nodes use hashes to confirm the transactions. Following verification, the transaction is added to a new block that connects to the current blockchain, making it irreversible and unchangeable [55].

Figure 3
Flowchart titled

Figure 3. Transaction steps of Blockchain [64].

Usage of hashes offers a good method of securing the blockchain. The attackers, though, using supercomputers, can alter the data held in a block and then re-hash all of the subsequent blocks' hashes in the chain within a few minutes. To counter this, some algorithms have been developed to possess so-called consensus [56]. The process of consensus is to confirm the transactions before they are added to the blockchain. Confirmation makes sure that the blockchain can expand without any chance of data manipulation within the blocks. The process of reaching a consensus takes place across specified, specific time periods. The time intervals represent the intervals between the start of the transactions and their addition to the blockchain. Block size, transaction volume, and consensus techniques all affect the confirmation time. Variable property consensus algorithms are created and applied within the industry nowadays [57].

7 Proposed scheme

The SG network’s security protocol, which enables safe communication between the SM, proxy nodes, Blockchain, and the CC, is discussed in this section. The proposed scheme consists of four phases. In the 1st phase, the required system parameters are generated and are shared among all entities in the network. The 2nd phase discusses the key generation mechanism for various entities of the SG network. The 3rd phase of our approach deals with the signcryption of data by the concerned SM. Finally, the 4th phase describes the proposed un-signcryption algorithm.

7.1 System initialization phase

CC performs the following actions, after considering 1m as input for the security parameter “m”, which measures the magnitude of input in computational problems.

• Selects a prime number “s”, two integers “x” and “yx>y, and a modular matrix QZsy×x.

• Cryptographic hash functions H1,H2:0,1*Zs

The generated system parameters are then shared with all the entities in the SG network.

7.2 Key generation for signcryption/un-signcryption

The SM that sends its consumption data to the proxy node generates its public key PSM=Q×SSMZsy×y by arbitrarily selecting a matrix SSMZsx×y as its private key. Similarly, the public key of the CC is denoted by PCC=Q×SCC, and the private key is represented by SCC. The private keys of all the entities are kept secret, while the public keys are made available to everyone in the network for encryption purposes.

7.3 Signcryption phase

This section describes the algorithm used in the proposed scheme’s signcryption procedure. In this phase, SMs signcrypt the information of the energy consumption data by using the proposed Algorithm 1 to accomplish data confidentiality and authenticity. Using a public network, the signcrypted data is securely sent to the proxy node, from where it is transmitted into the blockchain network. Furthermore, the signcrypted data can only be un-signcrypted or accessed by authorized receivers, like the CC. To protect sensitive data from adversary attacks during communication from SM to proxy node via public networks in the SG network, this phase included input parameters such as the private key of the SM SSM, energy consumption data MZs1×y, and the public key of the CC PCC.

Algorithm 1
www.frontiersin.org

Algorithm 1.

7.4 Unsigncryption phase

This section describes the algorithm used in the proposed scheme’s un-signcryption procedure. In this phase, the CC accesses the data from the blockchain network and un-signcrypt it using their private key SCC. This phase included input parameters such as the private key of the CC SCC, signcrypted text C=D,C2,B,T,S, and the public key of the SM PSM. Finally, the CC uses Algorithm 2 to convert the signcrypted text to plaintext.

Algorithm 2
www.frontiersin.org

Algorithm 2.

8 Security analysis

In this section, the proposed plan’s security analysis will be provided.

8.1 Informal security analysis

8.1.1 Security properties

8.1.1.1 Data confidentiality

SMs require data secrecy to avoid releasing specific details about energy usage. There is a chance that the opponent or adversary will overhear important information being passed from the SM to the proxy node for storing in the blockchain. To ensure data confidentiality, the plaintext data must be converted to a ciphertext. For an adversary to obtain the sensitive data from the signcrypted text C=D,C2,B,T,S, they must first obtain the secret vector j. In addition, acquiring the secret vector j is difficult and is equivalent to solving the ISIS problem of the s-array lattice.

An adversary Ŵ can calculate M using Equation 2 if the adversary calculates the secret vector j using Equation 1, which is impossible. Hence, our proposed scheme maintains data confidentiality.

D=Qt.jmods(1)
M=C2jtPCC(2)

8.1.1.2 Data integrity

According to our proposed method, the CC can use Equations 3, 4 to confirm the integrity of crucial data and ascertain if the received data has been tampered with or is genuine. Our method uses Equation 3 to estimate the hash value of the message before delivery. After confirming that T is current and receiving the message, the CC computes the hash value again by using Equation 4. If freshness checking (T) demonstrates that h=h, the message is unaltered.

X=H1DC2BT(3)
X=H1DC2BT(4)

8.1.1.3 Unforgeability

Forging a signature requires the SM’s secret key “SSM”. To obtain the secret key “SSM” of the SM, the forger must solve “Equation 5”. Solving “Equation 5” is equivalent to solving the SVP, which is computationally infeasible.

PSM=Q×SSMZsy×y(5)

As a result, our technique maintains unforgeability.

8.1.2 Attack types

Devices on the SG network are susceptible to several assaults because they are online. Another tactic an attacker uses to intercept data supplied by the SM and send a new message to the recipient is known as a Man-in-the-Middle (MITM) attack. A kind of cyberattack where the attacker records a valid communication, stores it, and then sends it later to trick a system into performing an illegal action is known as a replay attack. A Distributed Denial of Service (DDoS) attack occurs when an attacker uses numerous machines to launch an attack on one target. Further, a hacker employs sniffer tools to obtain the communication information in an eavesdropping attack. Finally, a legitimate user can perform an internal attack.

In this section, we have discussed those possible attacks on the SG network that our scheme can resist.

8.1.2.1 Replay attack

We incorporated the concept of random vectors and time-stamp values in the suggested approach. The randomness introduced by timestamp T and pseudorandom vectors jandb attributed to this credibility. If time stamps are invalid, then the intruder cannot demonstrate its authenticity against CC using the previously conveyed message, and the connection failure or shutdown occurs. This prevents the replay attack in our scheme.

8.1.2.2 Man-in-the-middle (MITM) attack

Our proposed approach encrypts the conversation between any two parties. Therefore, without the key, the attacker can no longer obtain legitimate information, even if MITM intercepts the information. Sensitive information MZs1×y is transmitted to the receiver having public key PCC in a confidential and authenticated way. SM transmitted energy consumption data in signcrypted form as C=D,C2,B,T,S to the proxy node using Algorithm 1. Data can only be signcrypted using the secret key SSM of the SM and the public key PCC of the CC. In this framework, Ŵ is unable to predict the secret key j for illegal purposes. In addition, retrieving the secret key j is difficult and comparable to solving the ISIS problem of the s-array lattice. As a result, our suggested method defends against the MITM attacks.

8.1.2.3 Insider threats

While the full certificate information is not stored on the blockchain, our proposed system retains a portion of the certificate. Even if an insider attacker requests the certificate abstract from the blockchain, the anti-collision feature of the hash algorithm makes it extremely difficult for the attacker to extract all of the certificate information from the abstract. Consequently, our proposed strategy is safe against insider threats.

8.1.2.4 Known session key attack

The attacker has access to the network and can intercept the sent messages by using known session-key attacks. The Ŵ goal is to obtain the private keys SSMandSCC from prior sessions, which require access to the pseudo-random vectors jandb, timestamp T. Since accessing the private keys SSMandSCC from their public keys PSMandPCC is infeasible. Therefore, our proposed scheme resists known session key attacks.

8.1.2.5 Prevents post-quantum attacks

Since the proposed scheme depends upon SIS and ISIS lattice-based hard assumptions, that is safe from quantum attacks, the suggested approach is immune to post-quantum attacks. All known quantum attacks that break the traditional public-key cryptosystems can be prevented by the suggested lattice-based cryptography technique. Since its security depends on the difficulty of solving the Learning with Errors (LWE) and Short Integer Solution (SIS) problems, which are still computationally unsolvable for both classical and quantum computers, it is specifically impervious to Shor’s algorithm and other hidden-subgroup or period-finding techniques. Additionally, the speedup provided by Grover’s search is only quadratic for brute-force attacks, which can be countered by scaling the parameters.

8.2 Formal security analysis using random oracle (RO) model

The Random Oracle (RO) Model, which is commonly utilized for the formal study of the security of various cryptographic protocols, has been used to confirm the security of the proposed scheme. A game between challenger and adversary is played in Probabilistic Polynomial Time (PPT) in the RO model.

8.2.1 Security proof

The semantic security of the proposed protocol is demonstrated in Theorem 1 under the RO model.

8.2.1.1 Theorem 1

We assume that the Ŵ runs against the proposed protocol P in polynomial time “t” in the RO model. The advantage function of an Ŵ in polynomial time “t” as shown in Equation 6 is indicated by AdvŴPt to break the semantic security of the protocol P, which is defined as:

AdvŴPtqh2Hash+2qsD+AdvŴLWEt(6)

where qh,HASH,qs,D,AdvALWE mean number of Hash queries, range space of hash function h(.), number of send queries, size of uniformly distributed password dictionary, and advantage of Ŵ of breaking LWE in polynomial time t, respectively.

8.2.1.2 Proof

The security proof approach as given in [53] is followed to prove the theorem. Five games are sequentially present in the formal proof, say Gk, where k=0,1,2,3,4. The probability associated with the game Gk to win by the Ŵ is indicated by SUCC, and the advantage of winning the game is defined as AdvGk=PrSUCCGk. All the games are illustrated below.

8.2.1.2.1 Game G0:

The first real attack launched by the Ŵ on the proposed protocol P under the RO model is implemented in this game G0. A bit “c” must be guessed before starting the game G0, and the semantic security of the session key of the proposed scheme is shown in the following result mentioned in Equation 7.

AdvPt=2AdvGo1(7)

8.2.1.2.2 Game G1:

The eavesdropping attack of Ŵ is simulated in the game G1. The Ŵ makes Execute (t1andt2) query at the beginning of the game G1, and, once the game is completed, the Ŵ executes the Test (t1) query to determine whether the acquired outcome is the original session key SK or a random value. In our protocol, the key is computed by both the communicating parties as PSM=Q×SSMZsy×y by arbitrarily selecting a matrix SSMZsx×y as its private key. Similarly, the public key of the CC is denoted by PCC=Q×SCC, and the private key is represented by SCC. To derive the key, the Ŵ needs SSMandSCC. Therefore, the possibility of winning this game G1 by the Ŵ through eavesdropping is not increased. It indicates that the games G0 and G1 are identical. The result is shown in Equation 8.

AdvG1=AdvG0(8)

8.2.1.2.3 Game G2:

This game G2 involves implementing Send (t1 and Msg) and the HASH random oracle. The Ŵ performs active attacks to intercept all the exchanged messages during communication that are C=D,C2,B,T,S to the CC and tries to deceive a legitimate party by acquiring any fabricated message. The Ŵ is free to make any number of HASH oracles to check the collision occurrences in HASH outputs. All the communicated messages involve secret credentials like bandj, which are required by the Ŵ to modify the messages. However, all these are protected by the collision-resistant one-way hash function. Thus, it does not lead to any collision in the HASH oracle. Now, using the result from the birthday paradox, we achieve the following as indicated in Equation 9.

AdvG2AdvG1qh22Hash(9)

8.2.1.2.4 Game G3:

This game G3 involves the simulation of a Corrupt Smart Meter (SMt1 query, where the Ŵ can extract all the stored information in the SM. Using the dictionary attack, the Ŵ can guess the password of SM, which is computationally infeasible due to unknown secret credentials like SSM, using the Send (t1 and Msg) query. If the password-guessing attack is not considered, then both the games G3 and G2 are equivalent. The result follows below and is represented in Equation 10.

AdvG3AdvG2qSendD(10)

8.2.1.2.5 Game G4:

The final game is modeled for active attack by the Ŵ to derive the actual key SK established between the SM and the CC. The computation of the session key is done by K=SCCD+XPSM. The Ŵ requires computing D=Qtjmods. This is similar to solving ISIS problem of the s-array lattice, which is computationally impossible. Therefore, the result is shown in Equation 11.

AdvG4AdvG3AdvŴLWEt(11)

Finally, all the games are executed and the adversary only remains with guessing the correct bit of c, which leads to the following result as displayed in Equation 12.

AdvG4=12(12)

Combining the results of Equations 7, 8 leads to Equation 13.

12AdvPt=AdvGo12=AdvG112(13)

Combining the results of Equations 12, 13 leads to the result shown in Equation 14.

12AdvPt=AdvG1AdvG4(14)

Applying the triangular inequality on the R.H.S of Equation 14, the result becomes and is shown in Equation 15.

AdvG1AdvG4AdvG1AdvG2+AdvG2AdvG4AdvG1AdvG2+AdvG2AdvG3+AdvG3AdvG4
AdvG1AdvG4qh22Hash+qsD+AdvŴLWEt(15)

Combining Equation 14 and Equation 15

12AdvPtqh22Hash+qsD+AdvŴLWEt

Or

AdvPtqh2Hash+2qsD+AdvŴLWEt

9 Performance analysis

In this section, we assessed the security aspects and computational efficiency of this method and compared its performance with other SM privacy protection strategies that are currently in use in reference [5860]. In addition, we compared the proposed scheme’s functionality and parameters to those of existing LB-cryptosystems for SG networks.

9.1 Comparison of the security properties

We contrasted the scheme proposed with schemes discussed in references [5860] in terms of confidentiality, integrity, unforgeability, traceability, resistance against insider attacks, and quantum security. Because the cryptosystem of scheme discussed in Ref. [58] is based on the RSA algorithm, scheme discussed in Ref. [59] relies on the DH problem, and scheme discussed in Ref. [60] relies on the ECC problem, therefore, it cannot withstand quantum attacks, but the proposed scheme relies on the lattices, thus it can withstand quantum attacks. Besides, both the schemes in [5860] and the proposed scheme attain confidentiality, integrity, and traceability. Last but not least, the scheme in [60] and the proposed scheme can accomplish the unforgeability property.

The comparison of the security properties of the proposed scheme with the schemes in [5860] is given in Table 3.

Table 3
www.frontiersin.org

Table 3. Security properties comparison.

9.2 Computational cost

According to MIRACL and PBC, the average calculation time for particular operations is derived from 100,000 experiments, as shown in Table 4. The operating cost is calculated using a computer with an Intel Core i3-1005G1 CPU, 8 GB of RAM, and Windows 10 installed. “y” and “x” represent the lattice’s dimension and rank, respectively, in our system, and y=x=251 bits are taken following the NTRU standard [61].

Table 4
www.frontiersin.org

Table 4. The running times for the operation of computation.

In the proposed protocol, we have considered the values s=Om2,y=Omlogs,andx=Omlogs for the security parameter “m”. For ease, we consider s=m2,y=mlogs=mlogm2=2mlogm,x=mlogs=mlogm2=2mlogm to analyze the performance of the proposed scheme. Note that these options are enough to ensure the security of SIS/ISIS assumptions. The outcomes show that our plan is more effective, safe, and useful in real-world applications. At the same time, we compared our proposed plan with the schemes in reference [5860], and Table 5 shows the number of operations that were carried out.

Table 5
www.frontiersin.org

Table 5. Comparison of the number of operations performed.

It can be seen that TM,TA,andTH with minimal computation cost are employed in this protocol, and not TMEandTP with a relatively high computation cost.

Table 6 compares the computational cost in milliseconds (ms) of the schemes [5860] and our proposed scheme.

Table 6
www.frontiersin.org

Table 6. Comparison of the computational cost (ms).

Figure 4 presents a comparison of the computational cost of the proposed scheme with other schemes [5860] in the form of a line graph. The Red Line represents the overall trend or trajectory of the computational cost across the schemes. Specifically, it is a trend line showing how the computational cost decreases progressively from older schemes [5860] to the proposed scheme.

Figure 4
Line graph titled

Figure 4. Comparison of the computational cost.

9.3 Communication cost

The communication cost of our proposed scheme is calculated in this section. The evaluation of the communication cost is estimated for the message C=D,C2,B,T,S, where B=btPZs1×x,T=T,S=SSM.X.bZsx×1. The total communication cost of the proposed scheme comes out to be 3x.s+T.

We provide a comparison of the communication cost of the proposed scheme with existing schemes [62, 63] in the literature.

A comparison of the suggested scheme’s communication cost with current schemes is shown in Table 7.

Table 7
www.frontiersin.org

Table 7. Comparison of communication costs.

The comparison of the communication cost (in bits) of the proposed scheme with existing schemes [62, 63] is presented in Table 8.

Table 8
www.frontiersin.org

Table 8. Comparison of communication cost (in bits).

Figure 5 presents a comparison of the communication cost of the proposed scheme with other schemes [62, 63] in the form of a bar graph. From the graph, it can be shown that the communication cost of the proposed scheme is very small as compared to other existing schemes [62, 63] in the literature.

Figure 5
Bar chart titled

Figure 5. Comparison of the communication cost.

9.4 Storage cost

The total cost of storing private keys, that is, SSMandSCCZsx×y, is estimated as 2xy.s, and a square matrix PZsy×x requires y2.s where s=logs. Hence, the overall storage cost of the proposed scheme is computed as 2xy+y2.s.

We provide a comparison of the storage cost of the proposed scheme with existing schemes [62, 63] in the literature.

Table 9 presents a comparison of the storage cost of the proposed scheme with existing schemes.

Table 9
www.frontiersin.org

Table 9. Comparison of the storage cost.

We have also utilized the AVISPA simulation tool to prove the efficiency of the proposed protocol against adversarial attacks. Figures 69 display the output of the AVISPA simulation program under different backend models. From the results shown in the figures, it is clear that the proposed protocol is secure, efficient, and resistant to known attacks, including quantum attacks posed by the upcoming quantum computers.

Figure 6
Application interface for SPAN 1.6 software showing protocol verification details for integrating blockchain with lattice-based cryptography. The interface displays textual information about a safe summary, protocol details, and the goal of enhancing smart grid security. Buttons for saving and viewing files, and simulation options like protocol and attack simulation, are visible below the text area. A checked box for session compilation and empty fields for depth and path inputs are also present.

Figure 6. OFMC summary for HLPSL.

Figure 7
Software interface for SPAN 1.6 showing protocol verification and security validation for a file named h3.hlpsl. The summary notes it as safe, detailing a strongly typed model for privacy using lattice-based cryptography. Options include executing simulations and choosing search algorithms.

Figure 7. CL-ATSE summary for HLPSL.

Figure 8
Software interface for SPAN 1.6, displaying protocol verification and security validation data. The text summarizes encryption specifications and confirms secure data protocols. Control buttons include

Figure 8. SATMC summary for HLPSL.

Figure 9
Software interface for SPAN 1.6 Protocol Verification: Security Validation. Contains protocol details, summary, tools, and options. Highlighted options include HPLSL, HPLSL2IF, and TA4SP. Shows verification model, intruder knowledge settings, and execution commands.

Figure 9. TA4SP summary for HLPSL.

10 Conclusion

With the advancement of computer networks and communication technology, information security has grown in importance. To enable a secure data connection, encryption techniques are required, particularly when managing large volumes of sensitive data in the SG network. The idea is to combine the intricate encryption offered by lattice-based cryptography with the distributed and unchangeable features of blockchain technology to offer an extra degree of security. For the SG network, we created an effective and safe quantum-resistant privacy-preservation system. To make the data resistant to manipulation and quantum attacks, we integrated lattice-based cryptography with the consortium blockchain. Based on the achieved results, it is evident that our scheme outperforms competing schemes in terms of computational cost, communication cost, storage cost, and security features, which makes it ideal for the lightweight smart devices utilized in SG networks. The suggested scheme is suitable for SGNs with modest resources due to its simplicity and ease of deployment.

Data availability statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author contributions

UH: Software, Visualization, Writing – original draft, Writing – review and editing. MB: Conceptualization, Methodology, Supervision, Writing – review and editing. JI: Conceptualization, Formal Analysis, Writing – review and editing. FH: Methodology, Validation, Writing – review and editing. IU: Conceptualization, Validation, Writing – review and editing.

Funding

The author(s) declared that financial support was received for this work and/or its publication. This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2026R236), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflict of interest

The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Generative AI statement

The author(s) declared that generative AI was not used in the creation of this manuscript.

Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

1. Khattak HA, Tehreem K, Almogren A, Ameer Z, Din IU, Adnan M. Dynamic pricing in industrial internet of things: blockchain application for energy management in smart cities. J Inf Secur Appl (2020) 55:102615. doi:10.1016/j.jisa.2020.102615

CrossRef Full Text | Google Scholar

2. Karthick T, Chandrasekaran K. Design of IoT-based smart compact energy meter for monitoring and controlling the usage of energy and power quality issues with demand side management for a commercial building. Sustain Energ Grids Netw (2021) 26:100454. doi:10.1016/j.segan.2021.100454

CrossRef Full Text | Google Scholar

3. Shruti RS, Sah DK, Gianini G. Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey. Sensors (Basel) (2023) 23:5921. doi:10.3390/s23135921

PubMed Abstract | CrossRef Full Text | Google Scholar

4. Dileep G. A survey on smart grid technologies and applications. Renew Energ (2020) 146:2589–625. doi:10.1016/j.renene.2019.08.092

CrossRef Full Text | Google Scholar

5. Li B, Lu R, Choo KKR, Wang W, Luo S. On reliability analysis of smart grids under topology attacks: a stochastic Petri net approach. ACM Trans Cyber-phys Syst (2018) 3:1–25. doi:10.1145/3127021

CrossRef Full Text | Google Scholar

6. Kumar P, Lin Y, Bai G, Paverd A, Dong JS, Martin A. Smart grid metering networks: a survey on security, privacy and open research issues. IEEE Commun Surv Tutor (2019) 21:2886–927. doi:10.1109/comst.2019.2899354

CrossRef Full Text | Google Scholar

7. Ganguly P, Nasipuri M, Dutta S. Challenges of the existing security measures deployed in the smart grid framework. In: Proc. IEEE 7th int conf smart energy grid eng (SEGE). IEEE (2019). p. 1–5.

CrossRef Full Text | Google Scholar

8. Wood G, Newborough M. Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design. Energy Build (2003) 35:821–41. doi:10.1016/s0378-7788(02)00241-4

CrossRef Full Text | Google Scholar

9. Dharmesh F, Nestoras C, Vlachou S, Kalopoulou O, Maglaras L. Cybersecurity in smart grids: challenges and solutions. AIMS Electron Electr Eng (2021) 5:24–37.

Google Scholar

10. Badotra S, Panda SN. A review on software-defined networking enabled IoT cloud computing. IIUM Eng J (2019) 20:105–26. doi:10.31436/iiumej.v20i2.1130

CrossRef Full Text | Google Scholar

11. Centobelli P, Cerchione R, Del VP, Oropallo E, Secundo G. Blockchain technology for bridging trust, traceability and transparency in circular supply chain. Inf Manag (2022) 59:103508. doi:10.1016/j.im.2021.103508

CrossRef Full Text | Google Scholar

12. Nair R, Zafrullah SN, Vinayasree P, Singh P, Zahra MMA, Sharma T, et al. Blockchain-based decentralized cloud solutions for data transfer. Comput Intell Neurosci (2022) 2022:1–10. doi:10.1155/2022/8209854

PubMed Abstract | CrossRef Full Text | Google Scholar

13. Singh R, Dwivedi AD, Srivastava G. Internet of things based blockchain for temperature monitoring and counterfeit pharmaceutical prevention. Sensors (Basel) (2020) 20:3951. doi:10.3390/s20143951

PubMed Abstract | CrossRef Full Text | Google Scholar

14. Miah A, Rahouti M, Jagatheesaperumal SK, Ayyash M, Xiong K, Fernandez F, et al. Blockchain in financial services: current status, adoption challenges, and future vision. Int J Innov Technol Manag (2023) 20:2330004. doi:10.1142/s0219877023300045

CrossRef Full Text | Google Scholar

15. Rahouti M, Xiong K, Ghani N. Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access (2018) 6:67189–205. doi:10.1109/access.2018.2874539

CrossRef Full Text | Google Scholar

16. Bieniek J, Rahouti M, Xiong K, Ferreira Araujo G. SecureCare: a blockchain-assisted wearable body area network for secure and scalable IoT healthcare services. Secur Privacy (2024) 7:e431. doi:10.1002/spy2.431

CrossRef Full Text | Google Scholar

17. Rahouti M, Drid H, Hamouid K, Massmi K, Mehenna SE. BRAVE-SDN: blockchain-reliant authentication for versatile east–west bound in distributed SDNs. Int J Inf Secur (2025) 24:1–15. doi:10.1007/s10207-024-00962-5

CrossRef Full Text | Google Scholar

18. Paykari N, Lyons DM, Rahouti M. Enhancing visual homing in robotics: a study on blockchain integration and consensus algorithms. Distrib Ledger Technol Res Pract (2025) 4:1–27. doi:10.1145/3688813

CrossRef Full Text | Google Scholar

19. Uddin SS, Joysoyal R, Sarker SK, Muyeen S, Ali MF, Hasan MM, et al. Next-generation blockchain enabled smart grid: conceptual framework, key technologies and industry practices review. Energy AI (2023) 12:100228. doi:10.1016/j.egyai.2022.100228

CrossRef Full Text | Google Scholar

20. Soner S, Litoriya R, Pandey P. Exploring blockchain and smart contract technology for reliable and secure land registration and record management. Wirel Pers Commun (2021) 121:2495–509. doi:10.1007/s11277-021-08833-1

CrossRef Full Text | Google Scholar

21. Hassan A, Ali MI, Ahammed R, Khan MM, Alsufyani N, Alsufyani A. Secured insurance framework using blockchain and smart contract. Sci Program (2021) 2021:1–11. doi:10.1155/2021/6787406

CrossRef Full Text | Google Scholar

22. Zakaret C, Peladarinos N, Cheimaras V, Tserepas E, Papageorgas P, Aillerie M, et al. Blockchain and secure element: a hybrid approach for secure energy smart meter gateways. Sensors (Basel) (2022) 22:9664. doi:10.3390/s22249664

PubMed Abstract | CrossRef Full Text | Google Scholar

23. Lyu L, Nandakumar K, Rubinstein B, Jin J, Bedo J, Palaniswami M. PPFA: privacy preserving fog-enabled aggregation in smart grid. IEEE Trans Ind Inform (2018) 14:3733–44. doi:10.1109/tii.2018.2803782

CrossRef Full Text | Google Scholar

24. Wang H, Wang Z, Domingo-Ferrer J. Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst (2018) 78:712–9. doi:10.1016/j.future.2017.02.032

CrossRef Full Text | Google Scholar

25. Ghiasi M, Niknam T, Wang Z, Mehrandezh M, Dehghani M, Ghadimi N. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electr Power Syst Res (2023) 215:108975. doi:10.1016/j.epsr.2022.108975

CrossRef Full Text | Google Scholar

26. Kim Y, Hakak S, Ghorbani A. Smart grid security: attacks and defence techniques. IET Smart Grid (2023) 6:103–23. doi:10.1049/stg2.12090

CrossRef Full Text | Google Scholar

27. Gunduz MZ, Das R. Smart grid security: an effective hybrid CNN-based approach for detecting energy theft using consumption patterns. Sensors (Basel) (2024) 24:1148. doi:10.3390/s24041148

PubMed Abstract | CrossRef Full Text | Google Scholar

28. Harishma B, Mathew P, Patranabis S, Chatterjee U, Agarwal U, Maheshwari M, et al. Safe is the new smart: PUF-based authentication for load modification-resistant smart meters. IEEE Trans Depend Secure Comput (2022) 19:663–80. doi:10.1109/tdsc.2020.2992801

CrossRef Full Text | Google Scholar

29. Hasan M, Ariffin N, Sani N. Efficient mutual authentication using kerberos for resource-constrained smart meter in advanced metering infrastructure. J Intell Syst (2023) 32:20210095. doi:10.1515/jisys-2021-0095

CrossRef Full Text | Google Scholar

30. Xia Z, Liu T, Wang J, Chen S. A secure and efficient authenticated key exchange scheme for smart grid. Heliyon (2023) 9:17240. doi:10.1016/j.heliyon.2023.e17240

PubMed Abstract | CrossRef Full Text | Google Scholar

31. Wang C, Li S, Ma M, Tong X, Zhang Y, Zhang B, et al. A novel and efficient ECC-based authenticated key agreement scheme for smart metering in the smart grid. Electronics (Basel) (2022) 11:3398. doi:10.3390/electronics11203398

CrossRef Full Text | Google Scholar

32. Li X, Wen M, He S, Lu R, Wang L. A privacy-preserving federated learning scheme against poisoning attacks in smart grid. IEEE Internet Things J (2024) 11:16805–16. doi:10.1109/jiot.2024.3365142

CrossRef Full Text | Google Scholar

33. Zhang J, Zhang W, Wei X, Liu H. EPri-MDAS: an efficient privacy-preserving multiple data aggregation scheme without trusted authority for fog-based smart grid. High-confidence Comput (2024) 4:100226. doi:10.1016/j.hcc.2024.100226

CrossRef Full Text | Google Scholar

34. Hu C, Zhuang H, Chen J, Hu P, Xiang T, Yu J. Achieving privacy-preserving online multi-layer perceptron model in smart grid. IEEE Trans Cloud Comput (2024) 12:777–88. doi:10.1109/tcc.2024.3399771

CrossRef Full Text | Google Scholar

35. Khan AA, Kumar V, Ahmad M. An elliptic curve cryptography-based mutual authentication scheme for smart grid communications using biometric approach. J King Saud Univ Comput Inf Sci (2022) 34:698–705. doi:10.1016/j.jksuci.2019.04.013

CrossRef Full Text | Google Scholar

36. Li Y, Zhang D, Wang Z, Liu G. A blockchain-based cooperative authentication mechanism for smart grid. Appl Sci (Basel) (2023) 13:6831. doi:10.3390/app13116831

CrossRef Full Text | Google Scholar

37. Choudhary S, Kumar A, Kumar K. PKIF-AKA: a public key infrastructure-free authenticated key agreement protocol for smart grid communication. IETE J Res (2024) 70:3395–406. doi:10.1080/03772063.2023.2200381

CrossRef Full Text | Google Scholar

38. Asaar MR, Alrzij MHS. An authenticated key establishment protocol with perfect forward secrecy in smart grids. ISC Int J Inf Secur (2025) 17:1–12.

Google Scholar

39. Shekhawat H, Gupta DS. Quantum-safe lattice-based mutual authentication and key-exchange scheme for the smart grid. Trans Emerg Telecommun Technol (2024) 35:5017. doi:10.1002/ett.5017

CrossRef Full Text | Google Scholar

40. Xiong J, Shen L, Liu Y, Fang X. Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. Sci Rep (2025) 15:3. doi:10.1038/s41598-024-84427-8

PubMed Abstract | CrossRef Full Text | Google Scholar

41. Parvez I, Aghili M, Riggs H, Sundararajan A, Sarwat AI, Srivastava AK, et al. A novel authentication management for the data security of smart grid. IEEE Open Access J Power Energ (2024) 11:218–30. doi:10.1109/oajpe.2024.3393971

CrossRef Full Text | Google Scholar

42. Zhang L, Yang Q, Yang Y, Chen S, Gu J. Data sharing scheme of smart grid based on identity condition proxy Re-Encryption. Electronics (2024) 13:139. doi:10.3390/electronics13010139

CrossRef Full Text | Google Scholar

43. Liu W, P A. Smart grid environment using blockchain-based key agreements. Measurements: Sensors (2024) 31:100992. doi:10.1016/j.measen.2023.100992

CrossRef Full Text | Google Scholar

44. Ali ZA, Abduljabbar ZA, AL-Asadi HAA, Nyangaresi VO, Abduljaleel IQ, Aldarwish AJY. A provably secure anonymous authentication protocol for consumer and service provider information transmissions in smart grids. Cryptography (2024) 8:8020020. doi:10.3390/cryptography8020020

CrossRef Full Text | Google Scholar

45. Mosca M. Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur Privacy (2018) 16:38–41. doi:10.1109/msp.2018.3761723

CrossRef Full Text | Google Scholar

46. Fernández-Caramés TM. From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the internet of things. IEEE Internet Things J (2020) 7:6457–80. doi:10.1109/jiot.2019.2958788

CrossRef Full Text | Google Scholar

47. Chaudhary R, Aujla GS, Kumar N, Zeadally S. Lattice-based public key cryptosystem for internet of things environment: challenges and solutions. IEEE Internet Things J (2019) 6:4897–909. doi:10.1109/jiot.2018.2878707

CrossRef Full Text | Google Scholar

48. Shekhawat H, Gupta DS. Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure. Pervasive Mob Comput (2024) 100:101919. doi:10.1016/j.pmcj.2024.101919

CrossRef Full Text | Google Scholar

49. Dolev D, Yao A. On the security of public key protocols. IEEE Trans Inf Theor (1983) 29:198–208. doi:10.1109/tit.1983.1056650

CrossRef Full Text | Google Scholar

50. Nakamoto S. Bitcoin: a peer-to-peer electronic cash system (2008). Available online at: https://bitcoin.org/bitcoin.pdf (Accessed July 14, 2025).

Google Scholar

51. Tama BA, Kweka BJ, Park Y, Rhee KH. A critical review of blockchain and its current applications. In: Proc 2017 Int Conf Electr Eng Comput Sci (ICECOS); Palembang, Indonesia (2017). p. 109–13. doi:10.1109/icecos.2017.8167115

CrossRef Full Text | Google Scholar

52. Solidity. Introduction to smart contracts solidity (2018). Available online at: https://solidity.readthedocs.io/en/v0.5.3/index.html (Accessed July 14, 2025).

Google Scholar

53. Beck R. Beyond bitcoin: the rise of blockchain world. Computer (2018) 51:54–8. doi:10.1109/mc.2018.1451660

CrossRef Full Text | Google Scholar

54. Karame G, Capkun S. Blockchain security and privacy. IEEE Secur Privacy (2018) 16:11–2. doi:10.1109/msp.2018.3111241

CrossRef Full Text | Google Scholar

55. Luke MN, Lee SJ, Pekarek Z, Dimitrova A. Blockchain in electricity: a critical review of progress to date (2018). Available online at: https://www.researchgate.net/publication/332138382_Blockchain_in_Electricity_a_Critical_Review_of_Progress_to_Date (Accessed July 22, 2025).

Google Scholar

56. Moubarak J, Filiol E, Chamoun M. On blockchain security and relevant attacks. In: Proc IEEE Middle East North Africa commun conf (MENACOMM) (2018). p. 1–6.

Google Scholar

57. Kounelis I, Steri G, Giuliani R, Geneiatakis D, Neisse R, Nai-Fovino I, et al. Fostering consumers energy market through smart contracts. In: Proc int conf energy sustainability small developing econ (ES2DE) (2017). p. 1–6.

Google Scholar

58. Kong W, Shen J, Vijayakumar P, Cho Y, Chang V. A practical group blind signature scheme for privacy protection in smart grid. J Parallel Distrib Comput (2020) 136:29–39. doi:10.1016/j.jpdc.2019.09.016

CrossRef Full Text | Google Scholar

59. Xie S, Zhang F, Lin H, Tian Y. A new secure and anonymous metering scheme for smart grid communications. Energies (Basel). (2019) 12:4751. doi:10.3390/en12244751

CrossRef Full Text | Google Scholar

60. Wu F, Li X, Xu L, Kumari S, Rodrigues J. An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann Telecommun (2020) 75:307–17. doi:10.1007/s12243-020-00765-4

CrossRef Full Text | Google Scholar

61. Dharminder D, Mishra D. LCPPA: lattice-based conditional privacy-preserving authentication in vehicular communication. Trans Emerg Telecommun Technol (2019) 31:3810. doi:10.1002/ett.3810

CrossRef Full Text | Google Scholar

62. Chaudhary R, Aujla GS, Kumar N, Das AK, Saxena N, Rodrigues JJPC, et al. LaCSys: Lattice-based cryptosystem for secure communication in smart grid environment. 2018 IEEE International Conference on Communications (ICC). Kansas City, MO: IEEE (2018). p. 1–6.

CrossRef Full Text | Google Scholar

63. Darzi S, Akhbari B, Khodaiemehr H. LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust Comput (2022) 25:263–78. doi:10.1007/s10586-021-03387-0

CrossRef Full Text | Google Scholar

64. Musleh AS, Yao G, Muyeen SM. Blockchain applications in smart grid–review and frameworks. IEEE Access (2019) 7:86746–57. doi:10.1109/access.2019.2920682

CrossRef Full Text | Google Scholar

Keywords: blockchain technology, confidentiality, lattice-based cryptography, privacy preservation, smart grid

Citation: Habib U, Bano M, Iqbal J, Hajjej F and Ullah I (2026) Integrating blockchain with lattice-based cryptography for privacy-preserving and quantum-secure smart grid communications. Front. Phys. 13:1727394. doi: 10.3389/fphy.2025.1727394

Received: 17 October 2025; Accepted: 15 December 2025;
Published: 14 January 2026.

Edited by:

Jawad Ahmad, Prince Mohammad bin Fahd University, Saudi Arabia

Reviewed by:

Asima Razzaque, King Faisal University, Saudi Arabia
Muhammad Aslam, King Khalid University, Saudi Arabia

Copyright © 2026 Habib, Bano, Iqbal, Hajjej and Ullah. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Insaf Ullah, SW5zYWYudWxsYWhAZXNzZXguYWMudWs=

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.