Towards post-quantum blockchain: A review on blockchain cryptography
resistant to quantum computing attacks
- URL: http://arxiv.org/abs/2402.00922v1
- Date: Thu, 1 Feb 2024 17:29:07 GMT
- Title: Towards post-quantum blockchain: A review on blockchain cryptography
resistant to quantum computing attacks
- Authors: Tiago M. Fernandez-Carames, Paula Fraga-Lamas
- Abstract summary: This article studies current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs.
It provides comparisons on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Blockchain and other Distributed Ledger Technologies (DLTs) have evolved
significantly in the last years and their use has been suggested for numerous
applications due to their ability to provide transparency, redundancy and
accountability. In the case of blockchain, such characteristics are provided
through public-key cryptography and hash functions. However, the fast progress
of quantum computing has opened the possibility of performing attacks based on
Grover's and Shor's algorithms in the near future. Such algorithms threaten
both public-key cryptography and hash functions, forcing to redesign
blockchains to make use of cryptosystems that withstand quantum attacks, thus
creating which are known as post-quantum, quantum-proof, quantum-safe or
quantum-resistant cryptosystems. For such a purpose, this article first studies
current state of the art on post-quantum cryptosystems and how they can be
applied to blockchains and DLTs. Moreover, the most relevant post-quantum
blockchain systems are studied, as well as their main challenges. Furthermore,
extensive comparisons are provided on the characteristics and performance of
the most promising post-quantum public-key encryption and digital signature
schemes for blockchains. Thus, this article seeks to provide a broad view and
useful guidelines on post-quantum blockchain security to future blockchain
researchers and developers.
Related papers
- A Survey and Comparison of Post-quantum and Quantum Blockchains [4.965489431705061]
The rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies.
The emergence of Shor's and Grover's algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains.
It is essential to develop methods that reinforce blockchain technology against quantum attacks.
arXiv Detail & Related papers (2024-09-02T16:20:22Z) - Towards A Post-Quantum Cryptography in Blockchain I: Basic Review on Theoretical Cryptography and Quantum Information Theory [0.0]
The invention of quantum computers was so revolutionary that they bring transformative challenges in a variety of fields.
It becomes inevitable to consider to implement a post-quantum cryptography, which is also referred to as quantum-resistant cryptography.
arXiv Detail & Related papers (2024-07-19T05:59:21Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - From Portfolio Optimization to Quantum Blockchain and Security: A
Systematic Review of Quantum Computing in Finance [0.0]
We provide an overview of the recent work in the quantum finance realm from various perspectives.
The applications in consideration are Portfolio Optimization, Fraud Detection, and Monte Carlo methods for derivative pricing and risk calculation.
We give a comprehensive overview of the applications of quantum computing in the field of blockchain technology.
arXiv Detail & Related papers (2023-06-12T19:53:23Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Vulnerability of Blockchain Technologies to Quantum Attacks [0.0]
Quantum computation represents a threat to many cryptographic protocols in operation today.
It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048.
arXiv Detail & Related papers (2021-05-05T01:01:42Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.