Promises and Perils of Post-Quantum Blockchain

Author:

Sheoran Savita Kumari1,Yadav Gayatri1

Affiliation:

1. Indira Gandhi University Meerpur, Rewari, India

Abstract

Abstract In recent years, blockchain technology has emerged as a powerful solution to address various concerns related to data transfer over distributed networks, such as privacy, transparency, redundancy, and accountability. Its ability to offer decentralized trust, secure data usage, and efficient functioning has led to its successful implementation in critical areas like finance, e-governance, defense, academia, research, reputation systems, and smart manufacturing. Blockchain is a unique type of distributed ledger that relies on hash functions and public-key cryptography to store information in blocks protected by hash signatures, which are resistant to security breaches. However, the emergence of quantum computing and its ability to solve knapsack problems in real-time through Grover’s and Shor’s algorithms has raised concerns about the future of classical key cryptography. It is feared that post-quantum computers may be able to modify the hash signature and compromise the blockchain security. To address this issue, there is an urgent need to develop a blockchain cryptosystem that is resilient towards potential eavesdropping in the post-quantum age. This paper aims to explore the possibilities of developing such a futuristic post-quantum information security system while examining the promises and perils of blockchain technology. The study includes a comparative analysis of public-key post-quantum cryptosystems and signing algorithms to formulate future research directions in this field.

Publisher

Research Square Platform LLC

Reference50 articles.

1. Blockchain research: A Scientometric Assessment of Global Literature during 2010-18;Gupta BM;DESIDOC J Libr Inf Technol,2020

2. Abbas QE, Sung-Bong J (2019) “A Survey of Blockchain and Its Applications,” 1st Int. Conf. Artif. Intell. Inf. Commun. ICAIIC no. February, pp. 1–3, 2019

3. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks;Fernandez-Carames TM;IEEE Access,2020

4. Ricardini and G. Zanon “Sharper ring-LWE signatures”;Barreto PS

5. Implementing confidential transactions with lattice techniques;Zhang H;IET Inf Secur,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3