Vulnerability of Blockchain Technologies to Quantum Attacks

  title={Vulnerability of Blockchain Technologies to Quantum Attacks},
  author={Joseph J. Kearney and Carlos A. P{\'e}rez-Delgado},

Tables from this paper

Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective
An analysis of the most important cryptocurrencies according to their ranking by market capitalization in the context of quantum threats, and a review of post-quantum blockchain (PQB) schemes proposals are provided.
Anonymous voting scheme using quantum assisted blockchain
An anonymous voting scheme based on quantum assisted blockchain is proposed by enhancing the advantages offered by blockchain with the quantum resources such as quantum random number generators and quantum key distribution to satisfy the requirements of a good voting scheme.
Evaluation of Cloud-Based Ethereum Network Performance
This paper elaborates Ethereum, a popular Blockchain 2.0 platform, and evaluates its performance on the cloud-based network, and some Ethereum nodes were set up on a cloud- based managed blockchain.
Transitioning organizations to post-quantum cryptography.
An organizational perspective of the post-quantum cryptography transition is presented and standards to start experimenting with now are suggested and a series of other recommendations are provided to allow organizations to achieve a smooth and timely PQC transition.
An Active and Passive Reputation Method for Secure Wideband Spectrum Sensing Based on Blockchain
A weighted fusion decision algorithm by using the blockchain technology that can build a trust-free platform for the cognitive radio collaborative networks and improve the security and the accuracy of cooperative spectrum sensing in cognitive radio networks.
Quantum Computing and its Impact on Cryptography


Threats and Opportunities: Blockchain meets Quantum Computation
It is demonstrated that incorporating some quantum properties into blockchain makes it more robust and more efficient and quantum synchronization and detectable Byzantine agreement can help the blockchain systems achieve faster consensus even if there exist a number of malicious nodes.
An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems
A Survey on Ethereum Systems Security
This work systematize three aspects of Ethereum systems security: vulnerabilities, attacks, and defenses, and draws insights into vulnerability root causes, attack consequences, and defense capabilities, which shed light on future research directions.
A Survey on the Security of Blockchain Systems
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses
This survey systematizes three aspects of Ethereum systems security: vulnerabilities, attacks, and defenses, and draws insights into, among other things, vulnerability root causes, attack consequences, and defense capabilities, which shed light on future research directions.
Security and Privacy on Blockchain
This article presents a comprehensive overview of the security and privacy of blockchain with respect to concept, attributes, techniques, and systems, and describes the basic security properties that are supported as the essential requirements and building blocks for Bitcoin-like cryptocurrency systems.
An Overview of Blockchain Security Analysis
The applications of blockchain in various fields are introduced, the security of each layer of the blockchain and possible cyber attacks are analyzed, the challenges brought by the blockchain to network supervision are expounded, and research progress in the protection technology is summarized.
A Security Reference Architecture for Blockchains
The main focus of this work is to systematize knowledge about security and privacy issues of blockchains by proposing a security reference architecture based on models that demonstrate the stacked hierarchy of various threats as well as threat-risk assessment using ISO/IEC 15408.
Quantum Attacks on Bitcoin, and How to Protect Against Them
It is found that the proof-of-work used by Bitcoin is relatively resistant to substantial speedup by quantum computers in the next 10 years, mainly because specialized ASIC miners are extremely fast compared to the estimated clock speed of near-term quantum computers.
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey
This survey aims to identify the key vulnerabilities in smart contracts on Ethereum in the perspectives of their internal mechanisms and software security vulnerabilities by correlating 16 Ethereum vulnerabilities and 19 software security issues.