skip to main content
research-article

Enhancing e-KYC Security and Privacy: Harnessing Quantum Computing and Blockchain in Web 3.0

Published: 22 December 2024 Publication History

Abstract

By implementing a successful and effective Electronic-Know Your Customer (e-KYC) infrastructure, conventional defects and expenses may be greatly reduced. Strong authentication procedures are used by existing e-KYC solutions to guarantee safety and confidentiality. However, these technologies have shortcomings like as key administration expenses and dependency on encryption. We suggest a revolutionary strategy that integrates blockchain technology, Web 3.0, and quantum computing to get around these restrictions. In this research, we show how current e-KYC processes could possibly be improved, making them faster and more reliable, by integrating Web 3.0 with quantum computing. Our solution makes it simple to quickly verify several consumers, increasing productivity. We provide improved safety for online requests, transcending the weaknesses inherent in traditional encryption techniques by utilizing quantum computing technology and applying the concept of quantum encryption key methodology. We contribute to the development of safe and private solutions by addressing the shortcomings of the present e-KYC systems. The results of our research show how Web 3.0 and quantum computer technology have the power to completely alter the e-KYC environment.

References

[1]
Yew Kee Wong, Yifan Zhou, Xinlin Zhou, Yan Shing Liang, and Zi Yan Li. 2024. Novel Long Distance Free Space Quantum Secure Direct Communication for Web 3.0 Networks. DOI:
[2]
Esmot Ara Tuli, Jae-Min Lee, Dong-Seong Kim. 2024. Integration of Quantum Technologies into Metaverse: Applications, Potentials, and Challenges. IEEE Access 12, 16 (Feb 2024), 29995–30019. DOI:
[3]
Stefania Loredana Nita and Marius Iulian Mihailescu. 2024. A Novel Authentication Scheme Based on Verifiable Credentials Using Digital Identity in the Context of Web 3.0. Electronics 13, 6 (Mar. 2024), Article 1137. DOI:
[4]
S. Fugkeaw. 2022. Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain. IEEE Access 10 (2022), 49028–49039.
[5]
V. Schlatt, J. Sedlmeir, S. Feulner, and N. Urbach. 2022. Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity. Information & Management 59, 7 (2022), 103553.
[6]
M. E. Peck. 2017. Blockchain World-Do You Need a Blockchain? This Chart Will Tell You If Technology Can Solve Your Problem. IEEE Spectrum 54, 10 (2017), 38–60.
[7]
G. Wood. 2014. Ethereum: A Secure Decentralized Generalized Transaction Ledger.
[8]
N. Lalitha and D. Soujanya. 2019. Financial Sector Innovations: Empowering Microfinance through the Application of KYC Blockchain Technology. In Proceedings of the 2019 International Conference on Digitization (ICD), 237–243.
[9]
K. Takaragi, T. Kubota, S. Wohlgemuth, K. Umezawa, and H. Koyanagi. 2023. Secure Revocation Features in eKYC-Privacy Protection in Central Bank Digital Currency. In IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, 106, 3 (2023), 325–332.
[10]
Y. Zhong, M. Zhou, J. Li, J. Chen, Y. Liu, Y. Zhao, and M. Hu. 2021. Distributed Blockchain-Based Authentication and Authorization Protocol for Smart Grid. Wireless Communications and Mobile Computing, 1–15.
[11]
M. Xu, X. Ren, D. Niyato, J. Kang, C. Qiu, Z. Xiong, X. Wang, and V. C. Leung. 2023. When Quantum Information Technologies Meet Blockchain in Web 3.0. IEEE Network.
[12]
R. Norvill, M. Steichen, W. M. Shbair, and R. State. 2019. ”Blockchain for the Simplification and Automation of KYC Result Sharing. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 9–10.
[13]
D. Francesco Maesa, P. Mori, and L. Ricci. 2017. Blockchain-Based Access Control. In Distributed Applications and Interoperable Systems: 17th IFIP WG 6.1 International Conference, DAIS 2017, Held as Part of the 12th International Federated Conference on Distributed Computing Techniques (DisCoTec ’17), Proceedings. Springer International Publishing, 206–220.
[14]
R. Soltani, U. T. Nguyen, and A. An. 2018. A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), and IEEE Smart Data (SmartData). IEEE, 1129–1136.
[15]
A. Soni and R. Duggal. 2014. Reducing Risk in KYC (Know Your Customer) for Large Indian Banks Using Big Data Analytics. International Journal of Computer Applications 97, 9 (2014).
[16]
N. Mansoor, K. F. Antora, P. Deb, T. A. Arman, A. A. Manaf, and M. Zareei. 2023. A Review of Blockchain Approaches for KYC. IEEE Access 11 (2023), 121013–121042.
[17]
A. A. Monrat, O. Schelén, and K. Andersson. 2019. A Survey of Blockchain from the Perspectives of Applications, Challenges, and Opportunities. IEEE Access 7 (2019), 117134–117151.
[18]
P. Dutta, T. M. Choi, S. Somani, and R. Butala. 2020. ”Blockchain Technology in Supply Chain Operations: Applications, Challenges and Research Opportunities. Transportation Research Part E: Logistics and Transportation Review 142 (2020), 102067.
[19]
S. Nakamoto. 2020. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved February 23, 2020 from https://git.dhimmel.com/bitcoin-whitepaper/
[20]
J. Parra-Moyano, T. Thoroddsen, and O. Ross. 2018. Optimized and Dynamic KYC System based on Blockchain Technology. Available at SSRN 3248913.
[21]
H. Hanbar, V. Shukla, C. Modi, and C. Vyjayanthi. 2019. Optimizing e-KYC Process Using Distributed Ledger Technology and Smart Contracts. In Proceedings of the International Conference on Computational Intelligence, Security and Internet of Things, Springer, 2019, 132–145.
[22]
N. Singhal, M. K. Sharma, S. S. Samant, P. Goswami, and Y. A. Reddy. 2020. Smart KYC Using Blockchain and IPFS. Advances in Cybernetics, Cognition, and Machine Learning for Communication Technologies, 77–84.
[23]
U. A. Rajyashree, S. Doulani, and S. Pareek. 2019. Blockchain-Enabled e-KYC System. International Research Journal of Computer Science VI (2019), 137–143.
[24]
Y. Lootsma. 2017. Blockchain as the Newest Regtech Application-The Opportunity to Reduce the Burden of KYC for Financial Institutions. Bank Finance Service Policy Reports 36(8), 16–21.
[25]
D. Moher, D. G. Altman, A. Liberati, and J. Tetzlaff. 2011. Prisma Statement. Epidemiology 22(1), 128.
[26]
Know Your Customer, Wikipedia. Retrieved June 12, 2022 from https://en.wikipedia.org/wiki/Know_your_customer
[27]
J. Jaeger. 2021. Report: Financial Firms Fined 26b for AML, Sanctions, KYC Non-Compliance since 2008. Retrieved October 14, 2021 from https://www.complianceweek.com/report-financial-firms-fined-26b-for-aml-sanctionskyc-non-compliance-since-2008/8088.article
[28]
About Aadhaar Paperless Offline e-KYC—Unique Identification Authority of India: Government of India. Retrieved October 14, 2021 from https://uidai.gov.in/ecosystem/authentication-devices-documents/about-aadhaar-paperlessoffline-e-KYC.html
[29]
Myinfo: Speed Up e-KYC Processes for Individual Users Easily with Data from Government Sources. Retrieved October 14, 2021 from https://api.singpass.gov.sg/library/myinfo/business/introduction
[30]
Board of Governors of the Federal Reserve System: Joint Statement on Innovative Efforts to Combat Money Laundering and Terrorist Financing. Retrieved October 14, 2021 from https://www.federalreserve.gov/newsevents/pressreleases/files/bcreg20181203a1.pdf
[31]
RBI Allows Regulated Entities to Use Video-Based KYC. Retrieved October 14, 2021 from https://www.regulationasia.com/rbi-allowsregulated-entities-to-use-video-based-kyc/
[33]
K. N. Khaqqi, J. J. Sikorski, K. Hadinoto, and M. Kraft. 2018. Incorporating Seller/Buyer Reputation-Based System in Blockchain-Enabled Emission Trading Application. Applied Energy 209 (2018), 8–19.
[34]
R. A. K. Duncan and M. Whittington. 2016. Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail. Cloud Computing.
[35]
L. Gao and R. P. Srivastava. 2011. The Anatomy of Management Fraud Schemes: Analyses and Implications. Indian Account Review 15, 1 (2011), 1–23.
[36]
H. K. Khanuja and D. Adane. 2011. Database Security Threats and Challenges in Database Forensic: A Survey.In Proceedings of 2011 International Conference on Advancements in Information Technology (AIT 2011), 170–175.
[37]
K. H. Lee, X. Zhang, and D. Xu, Loggc: Garbage Collecting Audit Log. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 1005–1016.
[38]
American Cyber Defense Agency. Post-Quantum Cryptography Initiative. Retrieved from https://www.cisa.gov/quantum
[39]
NIST Cybersecurity White Paper. Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms. Retrieved from https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Distributed Ledger Technologies: Research and Practice
Distributed Ledger Technologies: Research and Practice  Volume 3, Issue 4
December 2024
213 pages
EISSN:2769-6480
DOI:10.1145/3613702
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 December 2024
Online AM: 05 August 2024
Accepted: 18 July 2024
Revised: 13 June 2024
Received: 17 October 2023
Published in DLT Volume 3, Issue 4

Check for updates

Author Tags

  1. e-KYC
  2. Quantum Computing
  3. Blockchain
  4. Web 3.0
  5. Privacy
  6. Security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 424
    Total Downloads
  • Downloads (Last 12 months)424
  • Downloads (Last 6 weeks)74
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media