organization for dealing with uncertain, diverse, and
complex environments. It can be seen that the
development of Blockchain shows a trend of
diversification, practicality, and popularization (Hao
et al, 2017, Buterin, 2014, Wang et al, 2019).
Based on the analysis of the above technologies,
the article points out that there is a close technical
correlation between decentralized encrypted
communication programs and Blockchain Based on
Blockchain, these encrypted communication
programs have a safe and reliable operating
platform, ensuring the traceability and immutability
of information data in the communication process
(Nakamoto, 2008).
In the entire process, the decentralized encrypted
communication program will also use Blockchain
technology to verify the user's identity and exchange
relevant information. This not only improves the
efficiency of communication, but also reduces the
dependence on the central server due to its
decentralized structural characteristics, further
reduces the potential risk of failure, and improves
the stability of the entire communication network. In
addition, the immutable nature of the Blockchain
itself also means that the relevant information data
can’t be tampered with by anyone once it is
recorded(Nakamoto, 2008), which provides a strong
guarantee for the authenticity and traceability of
digital communications. In general, the decentralized
encrypted communication programs based on
Blockchain technology can provide users with a
more secure and efficient new communication
platform, and with further development, its
application range and application scope and
potential are continuing to expand (Sarıtekin et al,
2018).
In general, Blockchain technology is not only the
cornerstone of virtual digital currencies but also a
key factor in building secure and efficient
decentralized cryptographic communication
programs (Nakamoto, 2008).
2.2.2 End-to-End Encryption Technology
E2EE technology plays a particularly prominent role
in ensuring the communication security of
decentralized encrypted communication programs.
Its core principle is to ensure that only the
communication parties, that is, the sender and
receiver of information, can process and obtain
effective information in the process of
communication, and the security of information will
not be affected by the unreliability of the middle
node of the network. In E2EE's workflow, messages
are encrypted on the sender's device and then
decrypted on the receiver's device. This mechanism
ensures that even if a message is intercepted during
transmission by a third party, including an Internet
Service Provider (ISP), communication program
platform, or other entity monitoring the
communication, those third parties cannot read the
original message content (Ermoshina et al, 2016).
In 1991, Phil Zimmerman et al proposed Pretty
Good Privacy (PGP) (Garfinkel, 1995), which is
recognized as the first program on the Internet that
allows users to communicate over long distances
without being monitored. Since then, E2EE
technology has played a vital role in email
communication, becoming the common standard
used for email encryption. In 2004, the advent of the
Off-the-Record Messaging (OTR) protocol further
improved the privacy and security of instant
messaging systems (Di Raimondo et al, 2005). In
contrast, PGP is mainly concerned with the
encryption of email messages, and OTR is more
concerned with the privacy and security of instant
communications. More recently, in 2013, Open
Whisper Systems developed Signal (S1SxMq,
2024), a non-federated protocol that provides E2EE
for group communications, which is widely used in
modern communications applications.
Taken together, E2EE technology has made
significant progress and plays an important role in
protecting the privacy and security of email
communications and instant digital communications.
In decentralized encrypted communication
programs, these technologies further reinforce their
critical role in protecting communication data
security and user privacy.
But with the rapid development of quantum
computing technology, E2EE faces new challenges
now. Traditional encryption methods, such as the
RSA algorithm, will be vulnerable to quantum
computing attacks in the future. According to
relevant predictions, quantum computers are
expected to crack the RSA algorithm by 2030 or
earlier. Because of this situation, the global
information security community is accelerating the
research and application promotion of Post-Quantum
Cryptography (PQC) to cope with the great
challenges to traditional encryption methods in the
post-quantum era (Bernstein & Lange, 2017). These
outreach efforts are essential to maintaining the
stability and security of decentralized encrypted
communication programs and to protect against