Quantum-resistance in blockchain networks

  title={Quantum-resistance in blockchain networks},
  author={Marcos Allende and Diego L'opez Le'on and Sergio Cer'on and Antonio Leal and Adri{\'a}n Andr{\'e}s Pareja and Marcelo Da Silva and Alejandro Pardo and Duncan Jones and David Tom Worrall and Ben Merriman and Jonathan Gilmore and Nick Kitchener and Salvador El{\'i}as Venegas-Andraca},
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric… 



Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper)

The Rainbow algorithm with high signature efficiency is applied to the existing Ethereum platform, and the signature efficiency of Rainbow algorithm is compared with ECDSA, which is expected to provide direction and inspiration for future research on blockchain resistance to quantum computing.

Quantum-secured blockchain

A possible solution to the quantum era blockchain challenge is proposed and an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication is reported.

Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search

The analysis indicates that the security of the Bitcoin backbone protocol is guaranteed provided that the number of adversarial quantum queries is bounded so that each quantum query is worth O(p−1/2) classical ones, where p is the probability of success of a single classical query to the protocol’s underlying hash function.

Towards Encrypting Industrial Data on Public Distributed Networks

  • J. PreeceJ. Easton
  • Computer Science, Mathematics
    2018 IEEE International Conference on Big Data (Big Data)
  • 2018
The paper discusses the security of each along with individual advantages and disadvantages, and concludes that the SIDH is the most appropriate implementation for future use due to it being post-quantum secure.

Quantum Attacks on Bitcoin, and How to Protect Against Them

It is found that the proof-of-work used by Bitcoin is relatively resistant to substantial speedup by quantum computers in the next 10 years, mainly because specialized ASIC miners are extremely fast compared to the estimated clock speed of near-term quantum computers.

Report on Post-Quantum Cryptography

The National Institute of Standards and Technology (NIST)'s current understanding about the status of quantum computing and post-quantum cryptography is shared, and NIST’s initial plan to move forward is outlined.

Quantum cryptography: Public key distribution and coin tossing

Post-quantum cryptography

The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

Practical randomness and privacy amplification.

We present the first complete implementation of a randomness and privacy amplification protocol based on Bell tests. This allows the building of device-independent random number generators which

Bitcoin Security with Post Quantum Cryptography

It is shown that the post quantum signatures based on LWE and ring LWE are the most promising to use in the presence of large quantum computers running Shor’s algorithm.