Quantum Computing Threats: Study the Potential Threats that Quantum Computing Poses to Blockchain Security

Authors

  • Krutika Gadge Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University), Pune, India
  • Pradyna Borkar Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University), Pune, India
  • Shreyash Daduria Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University), Pune, India
  • Sagarkumar Badhiye Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University), Pune, India
  • Abhishek Sarodaya Symbiosis Institute of Technology, Nagpur Campus Symbiosis International (Deemed University), Pune, India
  • Roshani Raut Department of Information Technology, Pimpri Chinchwad College of Engineerin,Pune

Keywords:

superposition, cybersecurity, decentralization, imperatives

Abstract

With its amazing features like entanglement and superposition, quantum computing has the potential to completely transform industries like cybersecurity. However, it also presents a serious threat to current encryption standards, which are crucial to the security of blockchain technology, raising questions about their viability. Proactive tactics are necessary to address this dual challenge. Blockchain's resilience in the quantum era depends on embracing quantum-secure consensus techniques, maintaining scalability and decentralization, and implementing transitional plans using hybrid cryptography techniques. The future of digital security is largely dependent on how the revolutionary possibilities of quantum computing are balanced with the security imperatives. This study highlights the importance of stakeholder cooperation and quantum-resistant cryptography in achieving this goal, examining the ways in which these tactics strengthen the digital environment.

Downloads

Download data is not yet available.

References

Sharma, R., Kumar, R., & Singh, S. (2023). Navigating the quantum computing threat landscape for blockchains: A comprehensive survey. IEEE Access, 11, 10022-10041.

Shor, P. W. (1994). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 23(5), 1010-1036.

Sathya, B. S., Kumar, R., & Srinivasan, D. (2023). A review of quantum computing threats to blockchain security and mitigation strategies. Computer Science Review, 49, 100580.

Kawase, K., & Gambetta, J. (2022, May 31). Building Japan’s quantum future with IBM Quantum System one. IBM Reseach-https://research.ibm.com/blog/japan-quantum-system-one?mhsrc=ibmsearch%_%a&mhq=IBM+Quantum+System+One%26period%3B (referred on 10/2023)

Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., Biswas, R., Boixo, S., Brandão, F. G. S. L., Buell, D. A., Burkett, B., Chen, Y., Chen, Z., Chiaro, B., Collins, R., Courtney, W., Dunsworth, A., Farhi, E., Foxen, B., . . . Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505–510. https://doi.org/10.1038/s41586-019-1666-5

Chen, Z., He, D., & Zhang, Y. (2022). Quantum computing: A threat to blockchain security? IEEE Transactions on Emerging Topics in Computational Intelligence, 7(1), 134-142.

He, D., Chen, Z., Zhang, Y., & Wang, X. (2022). Post-quantum cryptography for blockchain security. IEEE Transactions on Reliability, 71(4), 1693-1704.

Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder,S.(2016).Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press.

Kerenidis, I., & Prakash, A. (2018). Quantum attacks on Bitcoin, and how to protect against them. arXiv preprint arXiv:1803.08220.

Moody, D., Chen, L., & Perlner, R. (2021). Post-quantum cryptography: A NIST perspective. NIST Interagency Report (NISTIR), 8309.

Chailloux, A., Plosker, S., & Winter, A. W. (2022). The impact of quantum computing on present cryptography. arXiv preprint arXiv:2202.07077.

Lipton, R. J., & Stark, E. S. (2019). Quantum attacks on public-key cryptosystems. Annual Reviews of Computer Science, 4(1), 343-368.k

Camenisch, J., & Neven, G. (2022). Quantum-resistant cryptography for blockchain. Nature, 601(7893), 470-477

Downloads

Published

07.01.2024

How to Cite

Gadge, K. ., Borkar, P. ., Daduria, S. ., Badhiye, S. ., Sarodaya, A. ., & Raut, R. . (2024). Quantum Computing Threats: Study the Potential Threats that Quantum Computing Poses to Blockchain Security. International Journal of Intelligent Systems and Applications in Engineering, 12(10s), 342–348. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4382

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.