Quantum and Blockchain for Computing Paradigms Vision and Advancements

Quantum and Blockchain for Computing Paradigms Vision and Advancements

Neha Gupta
Copyright: © 2022 |Pages: 20
DOI: 10.4018/978-1-6684-5072-7.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Blockchain and quantum technology breakthroughs are currently being debated publicly across a variety of forums. There are numerous applications and capabilities that can provide transparent, redundant, secure, accountable environments thanks to these technologies. To ensure resource-dependent high security requirements, certain cryptographic primitives and protocols can be used effectively. Quantum proofs, safe quantum solutions, and anti-quantum systems will assess any system for quantum attacks and create a secure quantum computing system. Therefore, this work intends to encourage experts from different fields to provide technology-integrated solutions that combine cost-effective and quality service, quickly, securely, and meet requirements. Researchers will be encouraged to provide helpful overviews and guidance in dealing with real-time applications from post-quantum technologies.
Chapter Preview
Top

Introduction

The blockchain quantum is more concerned with security. For example, the fragility of Shor's method makes RSA public key encryption an important transitional technology for applications (LaPierre, 2021). For readers and practitioners who want to learn how to build, test, operate, deploy and maintain a next-generation system with interfaces, this book is an excellent resource. Secure cryptography expertise and innovation. Ultimately, this chapter might serve as a useful guide for IT professionals to assist them comprehend the importance of technological transition and quantum computing activities during this transition(Grover, 1996). Future applications could benefit greatly from emerging technologies like quantum computing, configuration, design, and communication interfaces. There are enough safe bits in the computing world to protect networks from quantum attacks if these environments are used (Hilal et al., 2022; Sarmah, 2019). Using protocols like semi-DIQIP, it is possible to strengthen the security of a secure network by automatically identifying sections of the system and creating a trust network. It's not just software that quantum computing and quantum research come in handy, though. As a way to exhibit quantum technology, businesses can utilise devices such as quantum memory and quantum repeaters to show off their capabilities. When it comes to long-distance quantum communication, for example, a single quantum repeater could help reduce costs and improve security. One of the most current and most popular technologies is quantum computing. It has been almost a century since any practical application of quantum mechanics has been developed, yet now is the perfect time for virtually any organisation to begin working on it. A number of researchers in 1979 pointed to the theoretical underpinning of quantum computers in the late 1970s and early 1980s, according to the research. It was suggested that quantum computers could be built (Arulprakash & Jebakumar, 2022; L. Wang & Wang, 2022).

The Quantum Gate Model is being offered as a first answer by many businesses claiming to be working on quantum computers, including IBM. Google, Microsoft, and a slew of other companies are investigating devices of this type. It is extremely risky to use quantum computers to address all utility problems. There will be both classical and quantum computers in the universal infrastructure, with the quantum computer having substantial performance limitations. It is possible to solve some problems substantially more quickly with quantum algorithms like Grover's or Shor's (Berman et al., 2005; Fluhrer, 2017). Previously unsolved issues will now be dealt with promptly. A number of researchers, both academic and industry, have expressed an interest in quantum computing as a result of recent developments. Because of the development of quantum computers, which were unable to provide the same level of security as blockchain technology before it, the technology began to advance. Smart contracts can be hacked, and eventually, all technology will stop working altogether.

Figure 1.

Model of how the cryptosystem works

978-1-6684-5072-7.ch008.f01

Key Terms in this Chapter

Cryptocurrencies: Cryptocurrencies are digital tokens. They are a type of digital currency that allows people to make payments directly to each other through an online system. Cryptocurrencies have no legislated or intrinsic value; they are simply worth what people are willing to pay for them in the market.

Protocols: Protocols are crucial components of Blockchain technologies that enable information to be shared automatically across cryptocurrency networks securely and reliably. In the field of computing, protocols are essentially rules that define how data is allowed to be transferred between different computer systems.

Quantum Bitcoin: Quantum computers will eventually break much of today's encryption, and that includes the signing algorithm of Bitcoin and other cryptocurrencies.

Quantum Cryptography: Quantum cryptography is a method of encryption that uses the naturally occurring properties of quantum mechanics to secure and transmit data in a way that cannot be hacked. Cryptography is the process of encrypting and protecting data so that only the person who has the right secret key can decrypt it.

Grover's Algorithm: In quantum computing, Grover's algorithm, also known as the quantum search algorithm, refers to a quantum algorithm for unstructured search that finds with high probability the unique input to a black box function that produces a particular output value, using just evaluations of the function, where N is the size of the function's domain. It was devised by Lov Grover in 1996.

Post-Quantum Cryptography: Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. These complex mathematical equations take traditional computers months or even years to break. However, quantum computers running Shor’s algorithm will be able to break math-based systems in moments.

Shor's Algorithm: It is a quantum computer algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician.

Complete Chapter List

Search this Book:
Reset