2021
DOI: 10.48550/arxiv.2105.01815
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Vulnerability of Blockchain Technologies to Quantum Attacks

Joseph J. Kearney,
Carlos A. Perez-Delgado

Abstract: Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential subroutines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today-including Bitcoin, Ethereum, Litecoin and ZCash, and… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 42 publications
(58 reference statements)
0
1
0
Order By: Relevance
“…The cryptographic techniques such as Rivest, Shamir, Adleman (RSA), and Elliptic Curve (EC) are used to secure blockchains by protecting stored data [162]. The latest developments in the quantum computing domain can cause security issues that have never been considered before.…”
Section: ) Quantum Resistancementioning
confidence: 99%
“…The cryptographic techniques such as Rivest, Shamir, Adleman (RSA), and Elliptic Curve (EC) are used to secure blockchains by protecting stored data [162]. The latest developments in the quantum computing domain can cause security issues that have never been considered before.…”
Section: ) Quantum Resistancementioning
confidence: 99%