2023
DOI: 10.1038/s41598-023-32701-6
|View full text |Cite
|
Sign up to set email alerts
|

Quantum-resistance in blockchain networks

Abstract: The advent of quantum computing threatens blockchain protocols and networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor’s algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover’s algorithm concedes a quadratic adva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(9 citation statements)
references
References 69 publications
0
9
0
Order By: Relevance
“…Here, we take a look at various current blockchain models and compare them to the proposed quantum blockchain. Table 6 displays the pertinent comparisons among the references [39][40][41].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we take a look at various current blockchain models and compare them to the proposed quantum blockchain. Table 6 displays the pertinent comparisons among the references [39][40][41].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
“…The study [41] goes over the well-known area of quantum computing, how present encryption is threatened by it, and how algorithms are being developed to estimate how many qubits would be needed to crack the system of blockchain security.…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
“…A paper [76] evaluated the viability of using the Falcon signature algorithm in the context of blockchain, specifically within the Ethereum mainnet. The analysis revealed a prohibitive cost for Falcon signature verification, consuming an average of 500 million gas units.…”
Section: Blockchain Technologymentioning
confidence: 99%
“…Because of the ability to effectively use quantum superposition, this computing paradigm poses a threat to the public key encryption protocols, currently regarded as the most resilient protocols in use (Allende et al, 2023). In 1994, Peter Shor developed the super algorithm now known as Shor's algorithm.…”
Section: Note Qiskitvisualization Librarymentioning
confidence: 99%