A Secure Scheme Based on a Hybrid of Classical-Quantum Communications Protocols for Managing Classical Blockchains

Blockchain technology affords data integrity protection and building trust mechanisms in transactions for distributed networks, and, therefore, is seen as a promising revolutionary information technology. At the same time, the ongoing breakthrough in quantum computation technology contributes toward large-scale quantum computers, which might attack classic cryptography, seriously threatening the classic cryptography security currently employed in the blockchain. As a better alternative, a quantum blockchain has high expectations of being immune to quantum computing attacks perpetrated by quantum adversaries. Although several works have been presented, the problems of impracticality and inefficiency in quantum blockchain systems remain prominent and need to be addressed. First, this paper develops a quantum-secure blockchain (QSB) scheme by introducing a consensus mechanism—quantum proof of authority (QPoA) and an identity-based quantum signature (IQS)—wherein QPoA is used for new block generation and IQS is used for transaction signing and verification. Second, QPoA is developed by adopting a quantum voting protocol to achieve secure and efficient decentralization for the blockchain system, and a quantum random number generator (QRNG) is deployed for randomized leader node election to protect the blockchain system from centralized attacks like distributed denial of service (DDoS). Compared to previous work, our scheme is more practical and efficient without sacrificing security, greatly contributing to better addressing the challenges in the quantum era. Extensive security analysis demonstrates that our scheme provides better protection against quantum computing attacks than classic blockchains. Overall, our scheme presents a feasible solution for blockchain systems against quantum computing attacks through a quantum strategy, contributing toward quantum-secured blockchain in the quantum era.


Introduction
Since the introduction of Bitcoin in 2008 [1], its underlying technology, the blockchain, has attracted significant research attention and has been widely applied in different fields, such as finance and medical health. In a typical blockchain system, a consensus mechanism elects a representative node for bookkeeping and to reach consistency on a new block; the signing and verification of a transaction are accomplished through a digital signature, and the integrity protection of the transaction records is achieved by a hash function. The accelerating development of quantum computing technology seriously threatens the security of classical blockchains. Specifically, this is reflected in three areas: attacks against consensus mechanisms, attacks against digital signatures, and attacks against hash functions. (1) Regarding consensus mechanisms, proof of work (PoW) is vulnerable to mining attacks [2], while proof of stake (PoS) exposes stakers to the risk of losing their integrity on this quantum blockchain is quite complex, resulting in their scheme still being somewhat impractical under current technological conditions. Moreover, the QS in their scheme is one-time, a signature generated by the signer can only be verified once and then disappears. If n verifiers want to verify the transaction, the signer needs to perform the signing process n times. The security of QS depends on the number of quantum public keys, resulting in inefficiency and high quantum resource overhead. In 2022, Ye et al. [16] proposed a quantum blockchain scheme-QboT-for IoT by a QS, in QBoT, quantum state public keys are stored in blocks which is considered to be unpractical using current technology, as "Long-term data storage is not possible because decoherence in the quantum world rapidly corrupts information, making it very difficult to rely on quantum memories/storage" [17]. In 2022, Wang et al. [18] proposed a blockchain scheme based on an improved DPoS consensus algorithm and a quantum signature. In their consensus, the voting process is somewhat neglected, their work would have been better if the post-quantum security of the voting protocol had been taken into consideration.
The above work has made useful explorations into post-quantum security of blockchain systems, yet the following problems still exist: (1) lack of a secure and efficient consensus mechanism, e.g., the BFT of [10] limits the scale of the blockchain system, the schemes of [16] and [18] are based on DPoS, which may be fragile to quantum computing attacks during the voting process, while the scheme of [15] lacks a consensus mechanism. (2) The schemes are not practical and efficient enough, such as the block structure design [4,16] that stores quantum state information will face the problem of suffering from noise interference, and the quantum swap test circuit has the problem of non-negligible error rate when judging two different quantum strings [14]. (3) The transaction verification process consumes large quantum resources or the signature scheme is not practical enough. For example, in the scheme of [4], a quantum state public key needs to be consumed for each verification of the signature of a transaction; in the scheme of [18], the signature can only be verified once by the designated verifier and cannot be reverified.
At the same time, the rapid development of quantum cryptography provides us with a key to unlock the toolbox for eliminating quantum computing attacks. Some quantum hash function schemes with good collision resistance have been proposed [19,20], and several secure quantum digital signature schemes based on the physical properties of quantum mechanics have been constructed [21][22][23]. All these quantum cryptography components open a new path for us to design a post-quantum secure blockchain scheme. Inspired by the above work, this study proposes a quantum-secure blockchain scheme (QSB) by introducing an improved proof of authority (PoA) [24] consensus algorithm and an IQS. As the quantum state particles collapse after measurement, a signature in quantum states will always "disappear" after verification, leading to a new problem for the QS. Specifically, a signature generated by QS can be verified only once, disappear, and cannot be verified again after the one-time verification. Therefore, many QS schemes do not support verifying a signature multiple times, unlike a classic public-key signature that can be verified by different parties as often as required. In a QS scheme, if a third party other than the signer and the verifier wants to check the validity of a signature after verification, he will fail in obtaining the quantum-state signature because it disappeared in the first verification. This QS characteristic will restrain applying QS in the blockchain.
To address this issue, a QS with signature proof retained is needed. Therefore, this paper proposes an IQS scheme. Given the robustness of a QS to quantum computing attacks, it can be used for transaction signing in the blockchain, as although the IQS can be verified only once and will collapse after verification, the signature proof will be left, convincing an unrelated party that the signature has been verified successfully. A third party other than the designated verifier can check the validity of the signature by the proof. Thus, the trust in QSB is improved in that IQS overcomes the weakness of a general QS.
The main contributions of this paper are concluded as follows.

1.
A quantum-secure blockchain scheme (QSB) is proposed by utilizing a consensus mechanism, QPoA, and IQS. The QPoA is leveraged for block generation while the IQS is deployed in transaction verification. The QPoA adopts a behavior-scoring mechanism to improve the reliability of the validating nodes, and the IQS utilizes the validating node as a trusted third party to verify a transaction. By combining QPoA and IQS, QSB achieves a perfect balance of post-quantum security and practicality.

2.
A consensus algorithm-QPoA-is developed in QSB for new block generation. First, QPoA adopts the Knuth shuffling algorithm with QRNG to rearrange validating nodes in an unpredictable random manner, which offers non-transparency of the leader node's identity and immunity from centralized attacks. Second, by deploying a quantum voting protocol instead of classical voting, the post-quantum security of new block generation is enhanced. Third, by adopting an updating mechanism of validating nodes in QPoA, the trustworthiness of validating nodes is improved, therefore the trust establishment between two users in a transaction is better achieved. 3.
An IQS scheme with an arbitrator is utilized in QSB to improve the security and efficiency of transactions. By storing the verification proof of the transaction in IQS, re-verification for a transaction is achieved, solving the disputation of a lost quantum signature and making our IQS more trustworthy and practical.

4.
Based on QSB, a digital document exchange platform is designed to secure digital documents' transmission and record receiving and sending operations accurately. Security analysis demonstrates that QSB is secure from both classical and post-quantum perspectives. Overall, the proposed QSB is a secure, practical, and efficient blockchain solution in the post-quantum era.
The remainder of this paper is organized as follows. Section 2 constructs a quantumsecure blockchain (QSB) scheme based on the QPoA consensus mechanism and the IQS, QPoA adopts a quantum voting protocol and QRNG for leader node election and leverages a dynamic updating mechanism to maintain the authority of nodes. Section 3 represents a transaction process in QSB by IQS. Section 4 conducts a security analysis of the proposed blockchain scheme, and Section 5 discusses the usage of QSB in a digital document exchange application scenario. Finally, Section 6 concludes this work.

Quantum-Secure Blockchain Scheme
QKD is a protocol whereby two communicating parties establish a key by transmitting quantum state particles with the aim of sharing a string of keys (consisting of classical random bits, but also known as "quantum keys" because they are established quantumly) between the two parties. In 1984, Bennett and Brassard first introduced quantum cryptography and gave the first QKD protocol, the BB84 protocol [11]. After nearly forty years of development, various QKD protocols [25][26][27][28][29][30] have been proposed based on different quantum mechanical properties, and the security of some typical QKD protocols has been rigorously proven to be information-theoretic secure. Although some security threats against QKD such as eavesdropping [31] may exist due to the imperfect nature of physical devices, adjusting parameters to increase the proportion of decoy-state particles during the post-processing of QKD can effectively mitigate such threats. As both QKD and one-time pad (OTP) encryption algorithms are information-theoretic secure, they can be used in combination to achieve perfectly secure and confidential communications.
Practical research of QKD is also progressing rapidly. In 2021, Pan et al. demonstrated an air-to-ground quantum network. Based on the quantum satellite Micius, all users in the QKD network can communicate with each other over a distance of up to 4600 km through an integrated optical fiber and free-space QKD network [32]. In 2022, Li et al. demonstrated an experiment for quantum state transfer (QST) across a distance of over 1200 km based on the entanglement between two far-away parties utilizing the quantum satellite Micius [33].
QRNG technology [34] is developing rapidly to be applied to QKD. Currently, QRNG is in the process of commercialization and the QRNG chip is maturing. In 2022, Quantum Entropy 2023, 25, 811 5 of 23 eMotion, a Canadian company, announced the design completion of its first blockchain application of QRNG technology.
In the network architecture of QSB, there are two layers of network in the distributed system, a classical network and a QKD network. All nodes are connected to each other by an authenticated quantum channel, and they can also communicate with each other in a classical channel. Any two nodes can implement the QKD protocol to share secret keys.

Blockchain Structure of QSB
The architecture of QSB is shown in Figure 1. Each block consists of two parts: a block head and a block body. The block head contains the block proposer who generated and proposed the block, the QHF value of the previous block, the timestamp of block generation, and other necessary information. The block body contains transactions arranged in chronological order by their timestamps. Each block stores the QHF value of its previous block, and all blocks are linked to form a chain structure in this way.
Entropy 2023, 25, x FOR PEER REVIEW 5 1200 km based on the entanglement between two far-away parties utilizing the quan satellite Micius [33]. QRNG technology [34] is developing rapidly to be applied to QKD. Currently, QR is in the process of commercialization and the QRNG chip is maturing. In 2022, Quan eMotion, a Canadian company, announced the design completion of its first blockc application of QRNG technology.
In the network architecture of QSB, there are two layers of network in the distribu system, a classical network and a QKD network. All nodes are connected to each othe an authenticated quantum channel, and they can also communicate with each other classical channel. Any two nodes can implement the QKD protocol to share secret ke

Blockchain Structure of QSB
The architecture of QSB is shown in Figure 1. Each block consists of two parts: a b head and a block body. The block head contains the block proposer who generated proposed the block, the QHF value of the previous block, the timestamp of block gen tion, and other necessary information. The block body contains transactions arrange chronological order by their timestamps. Each block stores the QHF value of its prev block, and all blocks are linked to form a chain structure in this way.

Consensus Mechanism in QSB
PoW and PoS are the mainstream consensus mechanisms of blockchain systems. PoW consensus mechanism elects a bookkeeping node by solving a cryptographic pu (mining), i.e., the miner node that successfully solves the specified cryptographic pu first will receive the mining rewards and obtain bookkeeping rights, which is resou consuming. In the PoS consensus mechanism, verifiers compete for bookkeeping righ the new block by their stakes, and the one who has the most stake (including stake amo and holding time) will win the game and propose the new block. While PoS has g energy efficiency, there is a risk that the stake may become concentrated in the hands few participants, leading to a monopoly. The PoA is a blockchain consensus mechan other than PoW and PoS, which Gavin Wood, the founder of Ethereum, first propo PoA is a reputation-based consensus mechanism that provides faster transactions. Ba on the identity as a stake (IAS) mechanism, PoA provides a practical and efficient solu for blockchain networks (especially private blockchains). In QSB, an improved PoA sensus mechanism-QPoA-is developed.
The basic idea of PoA is to elect a central authority-leader node-to unify e node's state, and the PoA network usually uses distributed accounting, where each n has a ledger. The consensus algorithm ensures that the state of each node is consisten prevent inconsistency in everyone's ledgers. The validator in the PoA network is the thority elected by everyone, and after the leader node proposes and validates a new bl

Consensus Mechanism in QSB
PoW and PoS are the mainstream consensus mechanisms of blockchain systems. The PoW consensus mechanism elects a bookkeeping node by solving a cryptographic puzzle (mining), i.e., the miner node that successfully solves the specified cryptographic puzzle first will receive the mining rewards and obtain bookkeeping rights, which is resourceconsuming. In the PoS consensus mechanism, verifiers compete for bookkeeping rights of the new block by their stakes, and the one who has the most stake (including stake amount and holding time) will win the game and propose the new block. While PoS has good energy efficiency, there is a risk that the stake may become concentrated in the hands of a few participants, leading to a monopoly. The PoA is a blockchain consensus mechanism other than PoW and PoS, which Gavin Wood, the founder of Ethereum, first proposed. PoA is a reputation-based consensus mechanism that provides faster transactions. Based on the identity as a stake (IAS) mechanism, PoA provides a practical and efficient solution for blockchain networks (especially private blockchains). In QSB, an improved PoA consensus mechanism-QPoA-is developed.
The basic idea of PoA is to elect a central authority-leader node-to unify every node's state, and the PoA network usually uses distributed accounting, where each node has a ledger. The consensus algorithm ensures that the state of each node is consistent to prevent inconsistency in everyone's ledgers. The validator in the PoA network is the authority elected by everyone, and after the leader node proposes and validates a new block, the validating nodes synchronize the data from the leader node. PoA is a feasible consensus mechanism to maintain the consistency of all nodes' states and effectively prevents double-spending attacks.
In the blockchain system, when a leader node has proposed a new block and has packaged it into the blockchain, we define it as one consensus. When all nodes in the list of validating nodes (denoted as LV) have been elected as the leader node for one time, we define it as one consensus round. The transaction process in one consensus is shown in Figure 2.
the validating nodes synchronize the data from the leader node. PoA is a feasible consensus mechanism to maintain the consistency of all nodes' states and effectively prevents double-spending attacks. In the blockchain system, when a leader node has proposed a new block and has packaged it into the blockchain, we define it as one consensus. When all nodes in the list of validating nodes (denoted as LV) have been elected as the leader node for one time, we define it as one consensus round. The transaction process in one consensus is shown in Figure 2. Generating a new block in PoA is implemented by voting. All validating nodes vote on the candidate block proposed by the leader node, and the new block will be accepted and included in the blockchain if it gets at least 1 2 V  +   affirmative votes (V is the number of validating nodes). Otherwise, it will be rejected.
Unlike mining in PoW, PoA maintains a list LV in the blockchain system, and the nodes in this list will generate a new block in turn. It should be noted that this is an energysaving process. Regarding the PoA process, for instance, before a new consensus round begins, V nodes are elected as the validating nodes, and the LV is generated and kept in the blockchain system. According to the order of nodes in the LV, the role of the leader node is passed from one validating node to the next in turn. At the beginning of a consensus, one node in the LV will be elected as the leader node to generate a new block.
For better understanding, the mathematical symbols in the article are defined in the notation  Generating a new block in PoA is implemented by voting. All validating nodes vote on the candidate block proposed by the leader node, and the new block will be accepted and included in the blockchain if it gets at least V 2 + 1 affirmative votes (V is the number of validating nodes). Otherwise, it will be rejected.
Unlike mining in PoW, PoA maintains a list LV in the blockchain system, and the nodes in this list will generate a new block in turn. It should be noted that this is an energy-saving process. Regarding the PoA process, for instance, before a new consensus round begins, V nodes are elected as the validating nodes, and the LV is generated and kept in the blockchain system. According to the order of nodes in the LV, the role of the leader node is passed from one validating node to the next in turn. At the beginning of a consensus, one node in the LV will be elected as the leader node to generate a new block.
For better understanding, the mathematical symbols in the article are defined in the notation table, Table 1.

The Election of Leader Node in a Consensus
In PoA, the order of nodes in the LV is kept constant, and the validating nodes take turns acting as the leader node by this fixed sequence. This will bring about the problem of over-exposure of the leader node's identity, which will attract attacks. Once the leader node is attacked, the progress of new block generation will be delayed, thus reducing the efficiency of the whole blockchain system.
To tackle this issue, we introduce the Knuth shuffling algorithm [35] to elect the leader node randomly to conceal its identity in each consensus. By adopting the quantum multiparty secure computing method, all validating nodes participate together to share a public parameter P M before the start of the Mth consensus round. In the Mth consensus round, the newly generated leader node in each consensus is shared among all validating nodes by encryption of P M , which is only known to the validating nodes, and other unrelated parties including ordinary nodes know nothing about it.
Moreover, by utilizing the fundamental randomness of certain quantum processes [36], a QRNG can be used for random number generation in our scheme. The deployment of a QRNG in QPoA will make the leader node election totally unpredictable.
Specifically, to conceal the real identity of the leader node, we harness a QRNG [34] to reorder the LV, concealing the identity of the leader node in each consensus. In this way, the leader nodes can be effectively protected from concentrated attacks like DDoS due to the randomization of the leader node's appearance order. As shown in Figure 3, each element of LV array stores the identity of a leader node.

The Election of Leader Node in a Consensus
In PoA, the order of nodes in the LV is kept constant, and the validating nodes ta turns acting as the leader node by this fixed sequence. This will bring about the proble of over-exposure of the leader node's identity, which will attract attacks. Once the lead node is attacked, the progress of new block generation will be delayed, thus reducing t efficiency of the whole blockchain system.
To tackle this issue, we introduce the Knuth shuffling algorithm [35] to elect t leader node randomly to conceal its identity in each consensus. By adopting the quantu multi-party secure computing method, all validating nodes participate together to sha a public parameter PM before the start of the Mth consensus round. In the Mth consens round, the newly generated leader node in each consensus is shared among all validatin nodes by encryption of PM, which is only known to the validating nodes, and other unr lated parties including ordinary nodes know nothing about it.
Moreover, by utilizing the fundamental randomness of certain quantum process [36], a QRNG can be used for random number generation in our scheme. The deployme of a QRNG in QPoA will make the leader node election totally unpredictable.
Specifically, to conceal the real identity of the leader node, we harness a QRNG [3 to reorder the LV, concealing the identity of the leader node in each consensus. In this wa the leader nodes can be effectively protected from concentrated attacks like DDoS due the randomization of the leader node's appearance order. As shown in Figure 3, each e ment of LV array stores the identity of a leader node.  The inputs are LV and N (N denotes the number of blocks in the current blockcha ledger), and the output is a reordered LV. tN is the timestamp of block N that is used the seed parameter for the QRNG. That is, tN is used as a random seed of QRNG to ge erate a random number C[i] and the Knuth shuffling algorithm uses C[i] to generate a ne leader node in the next consensus. The algorithm for the leader node selection is present in Algorithm 1.  The inputs are LV and N (N denotes the number of blocks in the current blockchain ledger), and the output is a reordered LV. t N is the timestamp of block N that is used as the seed parameter for the QRNG. That is, t N is used as a random seed of QRNG to generate a random number C[i] and the Knuth shuffling algorithm uses C[i] to generate a new leader node in the next consensus. The algorithm for the leader node selection is presented in Algorithm 1.
The newly generated list LV determines the leader node in the forthcoming consensus. The exact process of the leader node election in one consensus is shown in Figure 4. The newly generated list LV determines the leader node in the forthcoming consensus. The exact process of the leader node election in one consensus is shown in Figure 4.
The leader node selection algorithm LV In each consensus round, all validating nodes use a verifiable multi-party QKD protocol [37] to secretly share a classical public key P, i.e., the shared parameter in the Mth consensus round is PM. In a consensus of the Mth consensus round, a leader node IDl is elected by the reordering algorithm in Algorithm 1, then PM is used to encrypt the identity of the new leader node IDl and IDl is published among all validating nodes in a secure quantum channel. Figure 5 illustrates the leader node election in a complete consensus round by QPoA. will be elected as the leader node in the forthcoming (K+1)th consensus In each consensus round, all validating nodes use a verifiable multi-party QKD protocol [37] to secretly share a classical public key P, i.e., the shared parameter in the Mth consensus round is P M . In a consensus of the Mth consensus round, a leader node ID l is elected by the reordering algorithm in Algorithm 1, then P M is used to encrypt the identity of the new leader node ID l and ID l is published among all validating nodes in a secure quantum channel. Figure 5 illustrates the leader node election in a complete consensus round by QPoA. Input: L, V, l, t N //L is an array to store LV, each element stores an ID of a validating node; V denotes the number of elements in LV; l denotes the number of validating nodes that have already acted as the leader node in a consensus round; t N denotes the timestamp of the latest block B N .

Generation of a New Block by Quantum Voting
In PoA, the leader node proposes a new block and sends it to all validating nodes for validation. The acceptance of a new block is implemented through classical voting. However, classical voting usually relies on a classic public-key cryptographic algorithm. For instance, in the PoA-based blockchain system Apla, the leader node signs a new block with a private key by the ECDSA algorithm in the voting process. This is quite insecure

Generation of a New Block by Quantum Voting
In PoA, the leader node proposes a new block and sends it to all validating nodes for validation. The acceptance of a new block is implemented through classical voting. However, classical voting usually relies on a classic public-key cryptographic algorithm. For instance, in the PoA-based blockchain system Apla, the leader node signs a new block with a private key by the ECDSA algorithm in the voting process. This is quite insecure when quantum adversaries are considered due to the post-quantum vulnerability of classic public-key cryptosystems. In contrast, this problem does not exist in a quantum voting scheme since its security is guaranteed by the principles of quantum mechanics. Therefore, adopting a quantum voting protocol will make the blockchain system immune from underlying quantum computing attacks. In 2017, Thapliyal et al. [38] proposed an efficient quantum binary voting protocol by deploying controlled deterministic secure quantum communication (CDSQC) with a permutation of qubits. By exploiting the Bell state, the operation on a qubit can perform a voting ballot. By adopting this quantum voting protocol in QPoA, voting on the new block can be achieved post-quantum securely.
QPoA adopts a quantum voting scheme based on CDSQC with a permutation of qubits [38] for voting on a candidate block. The candidate block will be accepted and included in the blockchain if it gets more than half of the validating nodes' affirmative votes. Otherwise, it will be discarded. Specifically, the leader node (for instance, David) publishes the new block on a bulletin board to enable all validating nodes to vote on it. The quantum voting in QPoA consists of three phases: initializing, voting, and counting. The detailed voting process is as follows.
(1) Initializing There are N blocks in the blockchain ledger, and Charlie is the previous leader node that successfully packaged the latest block B N on the blockchain. Charlie acts as the scrutineer in the voting process. David is the current leader node, and he generates a new block B N+1 as the candidate block. David initiates voting on B N+1 by sending B N+1 to all validating nodes, and David is the tallyman. The voters are all validating nodes except Charlie.
I-Step 1: The controller, Charlie, sets up a bulletin board to release announcements. The data on the bulletin board cannot be tampered with as all nodes supervise it. By performing a multi-party QKD protocol [30], a secret parameter P is shared among all validating nodes, including David. The sharing of the QHF parameter P is illustrated in Figure 6. David calculates an authentication code h N+1 for B N+1 by a parameterized QHF [19] with P.h N+1 = QHF(P, B N+1 ).Then David broadcasts (B N+1 ,c N+1 ) to all validating nodes, and the integrity of B N+1 can be verified by h N+1 . (1) Initializing There are N blocks in the blockchain ledger, and Charlie is the previous leader node that successfully packaged the latest block N B on the blockchain. Charlie acts as the scrutineer in the voting process. David is the current leader node, and he generates a new block  I-Step 1: The controller, Charlie, sets up a bulletin board to release announcements. The data on the bulletin board cannot be tampered with as all nodes supervise it. By performing a multi-party QKD protocol [30], a secret parameter P is shared among all validating nodes, including David. The sharing of the QHF parameter P is illustrated in can be verified by

I-Step 2:
Through the QKD protocol [11,[25][26][27][28][29][30], David performs identity authentication for all voters. Then David initiates a voting request to all voters by publishing the candidate block B N+1 with a deadline that is a time point t end . David publishes the voting rule that all voters should obey. That is, performing I on the received qubit represents a negative vote, while performing the Pauli gate X represents an affirmative vote.
The Bell states are denoted as follows: Let I = 1 0 0 1 be the unitary operator, X = 0 1 1 0 be the X operator.
(2) Voting Phase V-Step 1: Charlie prepares n pairs of Bell state particles selected in Φ + , Φ − , Ψ + , Ψ − , which is denoted as {|S 1 , |S 2 }, |S 1 represents the sequence of the first qubits and |S 2 represents the sequence of the second qubits. Charlie sends the first qubit of the ith Bell state to the ith voter and prepares an n-qubit sequence with the second qubits of all the Bell states, which is denoted as |S 2 . After that, he performs a permutation operator on each particle in |S 2 to generate a new sequence Ŝ 2 and sends Ŝ 2 to David. V-Step 2: According to the previously established voting rules, every voter casts a vote by performing a corresponding operator on the received qubit. A voter operates I on the qubit for a negative vote or operates X on the qubit for an affirmative vote. The quantum circuit of quantum voting is illustrated in Figure 7. Then the voter sends the voting result (the transformed qubit) to David, these transformed qubits formed a new sequence Ŝ 1 .

V-Step 3:
After David receives the qubits of Bell states that carry the ballot information from all voters or the time reaches t end , David informs Charlie that the collection of votes is accomplished.

(3) Counting Phase
Charlie informs David about the original state and the permutation operator information. Then David figures out that the specific qubit in Ŝ 2 was originally entangled with the qubit in Ŝ 1 . After receiving the information from Charlie, David performs Bell measurements on each partner particle to get the voting result cast by every voter, as he already knows the original Bell states. For example, Charlie prepares a Bell state Φ + = 1 √ 2 (|00 + |11 ) and sends the first particle to a voter. If the voter performs an X operator on the first particle, and Charlie performs an I operator on the second particle. After measurement by David, the outcome is Ψ + = 1 √ 2 (|10 + |01 ), Charlie announces the initial state Φ + = 1 √ 2 (|00 + |11 ). Based on his measurement result and the initial state, David can deduce that the voter performed operation X, i.e., voted in approval. Due to the statistical nature of quantum measurements, judging whether two quantum states are identical is not as straightforward as comparing two classical numbers. In order to tell whether two quantum states are the same, the Quantum Swap Test Circuit (QSTC) proposed by Buhrman is used, as shown in Figure 8. will be used as a seed of QRNG to elect the next leader node from the left validating nodes in LV.

Generation of LV in a Consensus Round
By conventional PoA, generating a new block can be delayed or even fail because of some anomalous or malicious behavior of the leader node. Generally, the leader node will not perform malicious behaviors. However, if the reward brought by malicious behaviors is much greater than the loss of authority, the leader node may harm the blockchain system at the risk of having that authority revoked. To address this issue, QPoA introduces a dynamic updating mechanism for validating nodes based on the credit scores of the nodes.
We define five types of nodes in a blockchain system with QpoA, as reported in Table  2, and we introduce a behavior-scoring mechanism in QpoA. The behaviors of the nodes are quantified by scores. A score will be set for each behavior based on how much the behavior damages the system, and a node will be assigned a corresponding score after performing each behavior.  T times, it will be demoted as a malicious node. The malicious behaviors are introduced as follows.
(fpb), represents the failure of proposing or including a valid block into the blockchain when it is a leader node . , (fvb), represents the failure of validating a valid block, i.e., giving a veto on a valid block . , Ultimately, by counting all votes, David publishes every voting result on the bulletin board and calculates the number of affirmative votes V a . If V a > V 2 , block B N+1 will be accepted and included in the blockchain. After the inclusion of block B N+1 , the timestamp of the (N + 1)-th block t N+1 will be used as a seed of QRNG to elect the next leader node from the left validating nodes in LV.

Generation of LV in a Consensus Round
By conventional PoA, generating a new block can be delayed or even fail because of some anomalous or malicious behavior of the leader node. Generally, the leader node will not perform malicious behaviors. However, if the reward brought by malicious behaviors is much greater than the loss of authority, the leader node may harm the blockchain system at the risk of having that authority revoked. To address this issue, QPoA introduces a dynamic updating mechanism for validating nodes based on the credit scores of the nodes.
We define five types of nodes in a blockchain system with QpoA, as reported in Table 2, and we introduce a behavior-scoring mechanism in QpoA. The behaviors of the nodes are quantified by scores. A score will be set for each behavior based on how much the behavior damages the system, and a node will be assigned a corresponding score after performing each behavior.
Furthermore, for a specific malicious behavior M b , a threshold T b is assigned, which means that the behavior M b can be performed no more than T b times. If a node has a behavior M b for more than T b times, it will be demoted as a malicious node. The malicious behaviors are introduced as follows. b = 1 (fpb), represents the failure of proposing or including a valid block into the blockchain when it is a leader node W b = w 1 , T b = t 1 . b = 2 (fvb), represents the failure of validating a valid block, i.e., giving a veto on a valid block W b = w 2 , T b = t 2 . b = 3 (fvt), represents the failure of submitting a valid transaction, i.e., submitting an invalid transaction to the leader node W b = w 3 , T b = t 3 . b = 4 (otherf), represents the communication response failure or offline status, or other where t ri denotes the number of times behavior r is implemented by node i. In QpoA, we develop an updating mechanism. Updating the validating nodes includes excluding old validating nodes and including new ones.
After a consensus round completes, all validating nodes have performed the role of leader node, and the LV will be updated. Each validating node will obtain two behavior scores, for node i, S mi denotes the malicious behavior score. For node i, if it has malicious behavior b more than T b times or S mi > S threshhold , it will be excluded from the LV and will be demoted as a malicious node, which cannot be elected as a validating node. After checking all validating nodes, the malicious nodes will be excluded, and the existing validating nodes and all authority nodes will form the set of validating node candidates for the next consensus round.
The behavior score is introduced to evaluate the behaviors of a node and is used to dynamically elect validating nodes to participate in each consensus round to enhance the degree of "decentralization".
After calculation, malicious nodes will be excluded and new authority nodes will be added to form the LV for the next consensus round. The updating process of the validating nodes in QPoA is presented in Figure 9.
(fvt), represents the failure of submitting a valid transaction, i.e., submitting an invalid transaction to the leader node . , 3 3 (otherf), represents the communication response failure or offline status, or other failures . , where ri t denotes the number of times behavior r is implemented by node i . In QpoA, we develop an updating mechanism. Updating the validating nodes includes excluding old validating nodes and including new ones.
After a consensus round completes, all validating nodes have performed the role of leader node, and the LV will be updated. Each validating node will obtain two behavior scores, for node i , mi S denotes the malicious behavior score. For node i , if it has malicious behavior b more than b T times or threshhold mi S S  , it will be excluded from the LV and will be demoted as a malicious node, which cannot be elected as a validating node. After checking all validating nodes, the malicious nodes will be excluded, and the existing validating nodes and all authority nodes will form the set of validating node candidates for the next consensus round.
The behavior score is introduced to evaluate the behaviors of a node and is used to dynamically elect validating nodes to participate in each consensus round to enhance the degree of "decentralization".
After calculation, malicious nodes will be excluded and new authority nodes will be added to form the LV for the next consensus round. The updating process of the validating nodes in QPoA is presented in Figure 9.
All validating nodes share their secret parameter with each other through a secure quantum channel. The algorithm in Algorithm 1 will output a new reordered list from the LV using their parameters. The nodes in the leader node list will act as leader nodes in turn.

Validating nodes
Leader nodes Compared to PoA, QPoA is more reliable since the validating node's reputation is fully taken into consideration. With the evaluation of malicious behaviors by scores, maliciousness can be reduced and the trustworthiness of the validating node is improved in the consensus.
In summary, QPoA improves on the PoA consensus mechanism in three aspects. First, QPoA discards the classical voting method in PoA and adopts a quantum binary voting protocol [38] instead, securing the voting process from quantum computing attacks. Second, QPoA deploys a quantum multi-party secure computing protocol [37] to generate a shared key P that is used to share the leader node's identity secretly. The Knuth All validating nodes share their secret parameter with each other through a secure quantum channel. The algorithm in Algorithm 1 will output a new reordered list from the LV using their parameters. The nodes in the leader node list will act as leader nodes in turn.
Compared to PoA, QPoA is more reliable since the validating node's reputation is fully taken into consideration. With the evaluation of malicious behaviors by scores, maliciousness can be reduced and the trustworthiness of the validating node is improved in the consensus.
In summary, QPoA improves on the PoA consensus mechanism in three aspects. First, QPoA discards the classical voting method in PoA and adopts a quantum binary voting protocol [38] instead, securing the voting process from quantum computing attacks. Second, QPoA deploys a quantum multi-party secure computing protocol [37] to generate a shared key P that is used to share the leader node's identity secretly. The Knuth shuffling method is adopted in the algorithm for the leader node selection, reordering the LV to hide the identity of the leader node from attacks. Third, by auditing the behavior of the validating nodes and quantifying malicious behaviors with a score, the authority of nodes can be dynamically adjusted according to their scores, which further improves the trustworthiness of the validating nodes and the efficiency of consensus.

The Transaction Process in QSB
In QSB, there are three parties participating in a transaction, the transaction initiator-Alice-the transaction receiver-Bob-and the trusted validating node-Trent. Alice signs the transaction and generates a signature, Trent verifies the signature, and, if verification passes, Bob accepts the transaction. Otherwise, the transaction will be discarded. The security of transaction initiation and verification is governed by the physical properties of quantum signatures. In this section, we will describe the complete process of a transaction in detail, including the four phases of initialization, key generation, signing, and verification. Moreover, with the virtue of QPoA, the trustworthiness of validating nodes is guaranteed, the trusted validating nodes act as verifiers for transactions, ensuring the security of transactions in QSB.

Initialization Phase
Let H = 1 √ 2 1 1 1 −1 be the Hadamard operator. The effect of the H-gate operating on a particle is equivalent to multiplying its corresponding matrix by the particle's quantum state vector. The quantum logic gate H operation is depicted as follows: where I is the unit operator. For any strings x = (x 1 , x 2 , . . . , x n ) and y = (y 1 , y 2 , . . . , y n ), we define that x ⊕ y = (x 1 ⊕ y 1 , x 2 ⊕ y 2 , . . . , x n ⊕ y n ), where "⊕" denotes the addition operation under modular two. In this phase, Alice and Bob secretly saved a one-way function G : {0, 1} * → {0, 1} n as their master key, and the output of G is uniformly distributed. Suppose that the identification of Alice is ID A ∈ (0, 1) n , the identification of Bob is ID B ∈ (0, 1) n , and transaction information Tx is encoded into a binary string m = {m i } ∈ (0, 1) n , i = 1, 2, . . . , n.

Key Generation Phase
Alice, Bob, and Trent share their private keys by performing the following steps. K-step 1: Alice calculates p = G(ID A ) with the master key G. In the same way, Bob calculates q = G(ID B ). K-step 2: By performing the QKD protocol [11,[25][26][27][28][29][30], a temporary random secret key z = (z 1 , z 2 , . . . , z n ) is shared between Alice and Bob. Bob calculates l 1 ⊕ z = l 1 , l 2 ⊕ z = l 2 , and Bob publicly announces l 1 and l 2 . Based on the secret pad z, Alice decrypts the OTP ciphertexts l 1 and l 2 , then gets their private parameters l 1 = z ⊕ l 1 and l 2 = z ⊕ l 2 . K-step 3: By performing the QKD protocol [11,[25][26][27][28][29][30], the private key K AT is shared between Alice and Trent, and the private key K BT is shared between Bob and Trent. The structure of QS is shown in Figure 10.
S-step 5: After confirming that |α has been received by Bob, |β has been received by Alice, and |δ and |γ have been received by Trent, the initial states and location information of the decoy particles in |α and |δ will be announced by Alice. Moreover, the initial states and location information of the decoy particles in |β and |γ will be announced by Bob. After that, Alice and Bob measure the decoy particles in the provided positions with the corresponding basis and compare the initial states with the measured results, respectively. If there is no error in checking, Bob proceeds to the next step. Otherwise, the protocol will be restarted.
Similarly, Trent measures |γ , according to K BT . If K BT = 0, he will measure |γ with {|0 , |1 }, and if K BT = 1, he will measure |γ with {|+ , |− }. If |γ = |0 or |+ , then Trent sets v = 0, and if |γ = |1 or |− , then Trent sets v = 1. Trent secretly keeps u and v . V-step 5: According to sharing key K AT and K BT , Trent computes Finally, Trent compares the outcomes of Equations (14) and (15), and if µ 1 = µ 2 , the signature is valid. Trent publishes µ 1 and u ⊕ v , and Alice and Bob publish s, r, l 1 , l 2 . Otherwise, it will be abandoned. The whole process of signing and verification for a transaction is shown in Figure 11. Alice initiates a transaction Tx with Bob, Trent is a validating node and acts as the designated verifier to verify Tx by IQS. If the verification succeeds, Tx will be sent to the leader node David by Trent. David collects verified transactions from all validating nodes, adds them to the transaction queue, sorts them by their timestamp, and validates them one by one. A valid transaction will be packaged into a candidate block while an invalid one will be rejected. After valid transactions accumulate to a certain number or time reaches end t , the candidate block

Security and Analysis of QSB
QSB can effectively resist common attacks against blockchain systems, such as 51% attacks, double spending attacks, and Sybil attacks.
Regarding 51% attacks, in QPoA, an attacker is required to control over 51% of vali- Alice initiates a transaction Tx with Bob, Trent is a validating node and acts as the designated verifier to verify Tx by IQS. If the verification succeeds, Tx will be sent to the leader node David by Trent. David collects verified transactions from all validating nodes, adds them to the transaction queue, sorts them by their timestamp, and validates them one by one. A valid transaction will be packaged into a candidate block while an invalid one will be rejected. After valid transactions accumulate to a certain number or time reaches t end , the candidate block B N+1 will be published to all validating nodes for voting, if B N+1 is accepted by the voting result, then Tx is included in the chain.

Security and Analysis of QSB
QSB can effectively resist common attacks against blockchain systems, such as 51% attacks, double spending attacks, and Sybil attacks.
Regarding 51% attacks, in QPoA, an attacker is required to control over 51% of validating nodes, which is quite different from the case in the PoW-based blockchain where an attacker is required to obtain 51% of the computational power of the whole network. It is almost impossible for an attacker to obtain control of such a large percentage of validating nodes in a permissioned blockchain network, which is more difficult than obtaining computational power. For example, in a PoW-based network, an attacker can increase the computation power of its controlled nodes to improve the chance of obtaining bookkeeping rights, while this makes no sense for QPoA because QPoA is computation independent, the computational power of the node has no effect on the block generation decisions.
Double spending attacks are eliminated in QSB by the leader node, as all verified transactions will be validated by the leader node one by one in a strict chronological order, any spent assets will be taken into consideration when validating a transaction. Additionally, even if an invalid double-spending transaction has been packaged in a candidate block, before the generation of this block, during the voting process participated in by all validating nodes, the invalid transaction will easily be found and the block will be rejected by voting.
As for Sybil attacks, QSB conceals the identity of the leader node by the leader node selection algorithm, the timestamp of a block is unpredictable and the randomness of QRNG also guarantees the randomization of the leader node. Furthermore, the identity of the leader node is shared among all validating nodes through a secure quantum channel with the help of public key P generated by secure multi-party QKD protocol [37].

Security of QPoA Consensus Mechanism
The QPoA can initially set up authorized nodes called validating nodes with transaction verification and voting rights. A new transaction needs to be verified by the validating nodes before its publishment on the chain. For a new validating node enrolled at a later stage, the current validating nodes can also decide whether to allow it to join the LV by voting. The QPoA can greatly increase the speed because it reduces the computational cost of reaching consensus.
In addition, due to the adoption of a quantum voting protocol that is immune from quantum computing attacks, QPoA is post-quantum secure.

Security of Transactions
In QSB, the security of a transaction is guaranteed by IQS. This section conducts a detailed security analysis of IQS, which includes unforgeability and resistance to repudiations and impersonation attacks.

Information-Theoretic Security of IQS
The quantum ciphertext should be information-theoretically indistinguishable for a secure quantum cryptosystem under a quantum chosen-plaintext attack (IND-CPA) [39].
Theorem 1 [40]. For all plaintexts x and y, let the density operators of the cipher states E(x) and E(y) be ρ x and ρ y , respectively. A quantum public-key encryption scheme is said to be informationtheoretically indistinguishable if, for every positive polynomial p(·) and every sufficiently large n, D ρ x , ρ y < 1/p(n).
Thus, based on Theorem 1, our scheme has ciphertext indistinguishability under quantum IND-CPA.
Proof. Let |α * and |α be the ciphertexts of different plaintexts m * and m, respectively. For an adversary Eve, the density operators of |α * and |α should take the possible values of private keys r. Note that f satisfies Equation (2), in which r, K AT , l 1 , and m have uniform distributions. Hence, the density operator of |α >can be computed as follows Similarly, the density operator of |α * can be computed as follows Let |b * and |b be the ciphertexts of different plaintexts m * and m, respectively. For an adversary Eve, the density operators of |b * and |b should take the possible values of private keys s. Note that s satisfies Equation (6), in which s, K BT , l 2 , and m have uniform distributions. Hence, the density operator of |b can be computed as follows Similarly, the density operator of |β * can be computed as follows Similarly, as Equations (17)- (20), it follows that D(ρ r,m , ρ r * ,m * ) = 0, According to Theorem 1, these bounds make IQS theoretically information IND-CPA secure.

Secrecy of the Private Key
In IQS, Trent is a trusted node who will never disclose the private key of Alice and Bob. Hence, the adversary, Eve, tries to retrieve the private key only from the public information.
First, Eve cannot retrieve the private key from the identity. In the key generation phase, Alice and Bob generate their private keys p = G(ID A ), q = G(ID B ) with the master key G. As G is a one-way function, if G is chosen as a random one-way function, Eve can succeed in guessing G with a negligible probability 1 (2n)! . Therefore, it is infeasible for Eve to retrieve the private key from the identity.
Second, in the key generation phase, it is infeasible for Eve to retrieve private parameters from l 1 and l 2 announced by Alice and Bob. Note that l 1 ⊕ z = l 1 , l 2 ⊕ z = l 2 where the secret z is generated by performing the secure QKD protocol. Therefore, Eve cannot get z due to the unconditional security of the QKD protocol. Here,z acts as a random pad, l 1 and l 2 can be seen as OTP ciphertexts [18] of the private parameters l 1 and l 2 . Since it is guaranteed by the unconditional security of OTP [24], it is unworkable for Eve to retrieve the private key l 1 and l 2 from the OTP ciphertext l 1 and l 2 without knowing the secret pad z. Therefore, the security of secret keys such as K AT , K BT , s, r, l 1 , l 2 is provided by the unconditional information theoretical security of QKD protocols and OTP.
Finally, Eve cannot get the quantum ciphertexts |α and |β , which contain the information of the signer's private key. In IQS, as decoy particles are utilized in eavesdropping checking in the quantum channel, Eve's eavesdropping attacks will necessarily cause disturbances to the decoy particles, which will be found by the receiver easily in the signing and signature verification phases. Even if Eve obtains the quantum ciphertexts |α and |β by chance, it is unworkable for Eve to retrieve the private key K AT and K BT from |α and |β which is guaranteed by the information-theoretical IND-CPA security of IQS. Therefore, it is unworkable for Eve to retrieve the signer's private key.

Security against Forgery
The unforgeability of QSB is analyzed in this section. According to the signing phase, the private key K AT and the secret pad l 1 are necessary for signing a message. However, according to the security analysis of the private key presented in Section 4.2.2, Eve cannot retrieve the private key K AT and the secret pad l 1 from the public information. Similarly, according to S-step3 in Section 3.1, the private key K BT and the secret pad l 2 are necessary for signing a message. However, according to the security analysis of the private key in Section 4.2.2, Eve cannot retrieve the private key K BT and the secret pad l 2 from the public information. Therefore, it is infeasible for Eve to forge a valid signature without K AT , K BT and secret pads l 1 and l 2 . Even Trent cannot forge the signer's signature since he knows nothing about the secret pads l 1 and l 2 , which are only possessed by Alice and Bob. Similarly, the receiver, Bob, cannot forge the signer's signature since he knows nothing about the key K AT and private parameter r that Alice secretly generates.

Security against Repudiations
Non-repudiation means that in a valid transaction, the signer, Alice, cannot deny the fact that she has signed the transaction, and the receiver, Bob, cannot deny the fact that he has accepted the verified signature.
In a typical transaction, the validating node Trent is a trusted third party that neither reveals the signer's private key nor impersonates the signer to sign any message. From Section 4.2.3, we know that the proposed QS is secure against forgery. Therefore, as long as the verification succeeds, the validity of the signature should not be denied by either the signer or the receiver.
In general, for a verified transaction, the state of the QS is changed after verification. This means both the signer and the receiver will lose the QS. Specifically, in our scheme, once the QS passes the verification by Trent, both Alice and Bob will lose the QS |δ . So, the signer Alice may deny the fact that she has ever generated a QS, while the receiver Bob may deny the fact that he has ever received a QS. We call this a disputation of a lost quantum signature. Most of the existing QS schemes cannot arbitrate this kind of disputation, while the proposed IQS can arbitrate this kind of disputation.
Noting that the signature proof (m, ID A , ID B , s, r, l 1 , l 2 , µ 1 , u ⊕ v ) is stored by Trent. Once the signer Alice denies the fact that she has ever generated the QS on m, Bob can submit a re-verification request to Trent with partial transaction data (m, ID A , ID B , s, l 1 , l 2 ). In response to the request, Trent recovers the corresponding signature proof (m, ID A , ID B , s, r, l 1 , l 2 , µ 1 , u ⊕ v ) in which r is published by Alice, s is published by Bob, l 1 , l 2 are copublished by Alice and Bob during the verification phase. Then Trent recovers the private key K AT , K BT from ID A , ID B respectively. Next, by Equations (2) and (6), Trent calculates f and g respectively. Moreover, according to Equations (10)- (14) and Equation (15), Trent performs the following two calculations respectively.
After that, Trent compares µ 1 * , µ 2 * with µ 1 . If µ 1 * = µ 2 * = µ 1 , Trent can confirm that Alice has generated the QS for Bob since only Alice can work out the valid f with the private key K AT and r. Similarly, Bob cannot deny the fact that he has ever received the valid QS because Trent has stored the signature proof (m, ID A , ID B , s, r, l 1 , l 2 , µ 1 , u ⊕ v ). According to the partial transaction data (m, ID A , ID B , r, l 1 , l 2 ) submitted by Alice and the signature proof (m, ID A , ID B , s, r, l 1 , l 2 , µ 1 , u ⊕ v ), Trent can calculate µ 1 * , µ 2 * and verify whether µ 1 * = µ 2 * = µ 1 as above. If µ 1 * = µ 2 * = µ 1 , Bob cannot deny the fact that he has ever received the valid QS, since only Bob can work out the valid g with the private key K BT and s. In summary, our scheme not only realizes transaction data non-repudiation but is also able to arbitrate the potential disputation of lost quantum signatures, which cannot be achieved in most QS schemes.

Security of Transaction Records
A post-quantum secured QHF is utilized in the block structure to maintain the data integrity of transaction records. As the multi-party QKD protocol provides secure sharing of QHF parameters among all the validating nodes. Without the parameter p, an adversary can not implement the preimage collision attack for the QHF. Due to the adoption of confidential quantum walk parameters, QHF is resistant to preimage-collision attacks faced by classical hash functions. In this way, transaction records on the blockchain ledger can be protected from tampering.
Overall, the post-quantum security of QSB is enhanced from three aspects: consensus mechanism QPoA, transaction digital signature IQS, and tamper-proof QHF.

Analysis of the Efficiency of QSB
First, it is well known that quantum resources are expensive at the current state of the art and an efficient transaction should use as few quantum resources as possible. In the literature [4], in order to complete the verification of a single transaction, the distribution of O(n 2 ) copies of quantum public key among n nodes is implemented by O(n 2 ) times communications, which consumes large quantum resources and quantum communication resources. The high overheads of quantum resources in both storage and communication will lead to a reduction in transaction efficiency. While in QSB, a transaction requires only the distribution of O(1) copies of quantum keys among three nodes and it is implemented by O(1) times communications, which largely saves quantum storage resources and quantum communication resources.
Second, the QPoA maintains the LV for new block generation by a rigorous and standardized vetting process, which is fair and transparent. The generation of a new LV is through a dynamic updating mechanism that can maintain the blockchain performing well during a consensus round, the time complexity of a consensus round in QSB is O(V), while that of QDPoS is O(n) with n > V. QSB is also Byzantine fault tolerant, the tolerance rates of the faulty nodes is n/2, which is a comparable performance to the literature [4].
Third, in other quantum blockchain schemes, the nodes separately generate new blocks on their own, which is not robust. While in QSB, as the block is totally classical information that can be broadcast in a classical channel easily and no extra quantum information is required to be sent point-to-point, accelerating the block generation process. While Refs. [12,41] send quantum data through quantum channels for verification with an extra consumption of 2n qubits and n qubits, respectively.
In addition, in the QDPoS scheme, the election of one-time representative nodes is implemented through quantum voting with time complexity O(n). While in QSB, the election of validating nodes is accomplished by QPoA without any quantum resource consumption, the consensus time complexity of QSB is just O (1). From the perspective of quantum voting, our scheme is more efficient than Ref. [4].

Comparison
In QDPoS, the elected representative nodes take turns generating new blocks, this exposes the identity of the bookkeeping node which may attract attacks. Different from QDPoS, QPoA elects the leader node from the LV through a randomized algorithm with QRNG, which fully hides the identity of the leader node and protects the blockchain from centralized attacks, which may lead to a single point of failure.
As to the storage structure of blocks, [4] stores blocks in quantum states, which is expensive and not convenient for data validation as a quantum-state block can be used only once and collapse. While in QSB, blocks are stored in classical states, the storage costs are low and data can be reused for replication and validation, enabling the blockchain system to be more practical. The comparisons of quantum blockchain schemes are made in Table 3, demonstrating that QSB achieves a better balance of post-quantum security, practicality, and efficiency.

Application Scenario of QSB
The digital document exchange application scenario based on QSB is shown in Figure 12. A document is denoted as Doc, Alice is a data owner, and Bob is a data user. After Alice uploads Doc to the interplanetary file system (IPFS) storage system, she will receive the address of Doc from the storage system. Then Alice and Bob submit a transaction to the QSB. The transaction record includes the following information: sender (Alice), receiver (Bob), verifier, Doc, and timestamp. After the transaction has been recorded on the QSB, Bob is authorized to download the document Doc while an illegal user is forbidden to do so. After that, when Bob sends a download request to the storage platform, the storage platform will query the QSB for relevant transactions. If Bob is a receiver of Doc, the address of Doc will be sent to Bob. Then Bob can succeed in downloading Doc by uploading the required address. Otherwise, Bob's request will be rejected.

Conclusions
This paper proposes an IQS scheme, which can leave proof after verification, where the other nodes validate the signature after verification by proof. Second, we improve the conventional PoA from three aspects, i.e., we define five types of nodes with different permissions in the blockchain system, set an updating mechanism for validating nodes based on behavior scoring, and introduce QRNG to conceal the identity of leader nodes. Third, a QSB scheme is proposed using the IQS and the QPoA. Extensive security analysis demonstrates that our method affords an advantage in security against quantum computing attacks compared to conventional blockchains. Finally, we discuss the digital document exchange application scenario based on QSB.
In conclusion, the developed QSB scheme presents a feasible solution for quantumsecured blockchain systems through a quantum strategy. Although it is somewhat expensive to implement, we believe the overhead will decrease with the advancement of quantum technologies. Overall, our work will enrich the research of quantum blockchain in the quantum era.

Conclusions
This paper proposes an IQS scheme, which can leave proof after verification, where the other nodes validate the signature after verification by proof. Second, we improve the conventional PoA from three aspects, i.e., we define five types of nodes with different permissions in the blockchain system, set an updating mechanism for validating nodes based on behavior scoring, and introduce QRNG to conceal the identity of leader nodes. Third, a QSB scheme is proposed using the IQS and the QPoA. Extensive security analysis demonstrates that our method affords an advantage in security against quantum computing attacks compared to conventional blockchains. Finally, we discuss the digital document exchange application scenario based on QSB.
In conclusion, the developed QSB scheme presents a feasible solution for quantumsecured blockchain systems through a quantum strategy. Although it is somewhat expensive to implement, we believe the overhead will decrease with the advancement of quantum technologies. Overall, our work will enrich the research of quantum blockchain in the quantum era.