Quantum Computing Threats: Study the Potential Threats that Quantum Computing Poses to Blockchain Security
Keywords:
superposition, cybersecurity, decentralization, imperativesAbstract
With its amazing features like entanglement and superposition, quantum computing has the potential to completely transform industries like cybersecurity. However, it also presents a serious threat to current encryption standards, which are crucial to the security of blockchain technology, raising questions about their viability. Proactive tactics are necessary to address this dual challenge. Blockchain's resilience in the quantum era depends on embracing quantum-secure consensus techniques, maintaining scalability and decentralization, and implementing transitional plans using hybrid cryptography techniques. The future of digital security is largely dependent on how the revolutionary possibilities of quantum computing are balanced with the security imperatives. This study highlights the importance of stakeholder cooperation and quantum-resistant cryptography in achieving this goal, examining the ways in which these tactics strengthen the digital environment.
Downloads
References
Sharma, R., Kumar, R., & Singh, S. (2023). Navigating the quantum computing threat landscape for blockchains: A comprehensive survey. IEEE Access, 11, 10022-10041.
Shor, P. W. (1994). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 23(5), 1010-1036.
Sathya, B. S., Kumar, R., & Srinivasan, D. (2023). A review of quantum computing threats to blockchain security and mitigation strategies. Computer Science Review, 49, 100580.
Kawase, K., & Gambetta, J. (2022, May 31). Building Japan’s quantum future with IBM Quantum System one. IBM Reseach-https://research.ibm.com/blog/japan-quantum-system-one?mhsrc=ibmsearch%_%a&mhq=IBM+Quantum+System+One%26period%3B (referred on 10/2023)
Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., Biswas, R., Boixo, S., Brandão, F. G. S. L., Buell, D. A., Burkett, B., Chen, Y., Chen, Z., Chiaro, B., Collins, R., Courtney, W., Dunsworth, A., Farhi, E., Foxen, B., . . . Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505–510. https://doi.org/10.1038/s41586-019-1666-5
Chen, Z., He, D., & Zhang, Y. (2022). Quantum computing: A threat to blockchain security? IEEE Transactions on Emerging Topics in Computational Intelligence, 7(1), 134-142.
He, D., Chen, Z., Zhang, Y., & Wang, X. (2022). Post-quantum cryptography for blockchain security. IEEE Transactions on Reliability, 71(4), 1693-1704.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder,S.(2016).Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton University Press.
Kerenidis, I., & Prakash, A. (2018). Quantum attacks on Bitcoin, and how to protect against them. arXiv preprint arXiv:1803.08220.
Moody, D., Chen, L., & Perlner, R. (2021). Post-quantum cryptography: A NIST perspective. NIST Interagency Report (NISTIR), 8309.
Chailloux, A., Plosker, S., & Winter, A. W. (2022). The impact of quantum computing on present cryptography. arXiv preprint arXiv:2202.07077.
Lipton, R. J., & Stark, E. S. (2019). Quantum attacks on public-key cryptosystems. Annual Reviews of Computer Science, 4(1), 343-368.k
Camenisch, J., & Neven, G. (2022). Quantum-resistant cryptography for blockchain. Nature, 601(7893), 470-477
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.