A Survey and Comparison of Post-quantum and Quantum Blockchains

Zebo Yang,Haneen Alfauri,Behrooz Farkiani,Raj Jain,Roberto Di Pietro,Aiman Erbad
DOI: https://doi.org/10.1109/COMST.2023.3325761
2024-09-03
Abstract:Blockchains have gained substantial attention from academia and industry for their ability to facilitate decentralized trust and communications. However, the rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies. Notably, the emergence of Shor's and Grover's algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains. Consequently, it is essential to develop methods that reinforce blockchain technology against quantum attacks. In response to this challenge, two distinct approaches have been proposed. The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. The second approach explores quantum blockchains, which leverage the power of quantum computers and networks to rebuild the foundations of blockchains. This paper aims to provide a comprehensive overview and comparison of post-quantum and quantum blockchains while exploring open questions and remaining challenges in these domains. It offers an in-depth introduction, examines differences in blockchain structure, security, privacy, and other key factors, and concludes by discussing current research trends.
Cryptography and Security,Quantum Physics
What problem does this paper attempt to address?
The core problem that this paper attempts to solve is: **The rapid development of quantum computing poses a serious threat to the security of existing blockchain technologies, especially the destructive effects of Shor's algorithm and Grover's algorithm on classical encryption systems. Therefore, new methods that can resist quantum attacks need to be developed to enhance the security of blockchain technologies.** Specifically, the paper mainly focuses on the following points: 1. **Threats of quantum computing**: - The progress of quantum computing has made Shor's algorithm and Grover's algorithm possible. These algorithms can respectively and efficiently crack public - key encryption based on large - integer factorization (such as RSA) and accelerate the collision search of hash functions. - The existence of these algorithms threatens the encryption technologies and hash functions commonly used in blockchains, thereby weakening the security and integrity of blockchains. 2. **Exploration of solutions**: - The paper proposes two main coping strategies: - **Post - quantum blockchains**: Use classical encryption algorithms resistant to quantum attacks to ensure that the existing blockchain systems remain secure in the event of the emergence of quantum computers. - **Quantum blockchains**: Utilize the power of quantum computers and quantum networks to fundamentally reconstruct the infrastructure of blockchains, providing higher security and performance. 3. **Comparison and analysis**: - The paper compares these two methods in detail and explores their differences in security, privacy, structure, and other key factors. - Through this comparison, the paper aims to help researchers, developers, and decision - makers understand the advantages and limitations of each technology, thereby providing guidance for future research and applications. 4. **Research trends and challenges**: - The paper also discusses the current research trends and the challenges faced, including how to achieve a smooth transition from classical computing to quantum computing, and how to ensure the compatibility and interoperability between new and old systems. In summary, the main purpose of this paper is to provide a clear understanding framework for the academic and industrial communities through a comprehensive review and comparison of post - quantum blockchains and quantum blockchains, in order to meet the challenges brought by quantum computing and promote the development of more secure and efficient blockchain technologies.