We initiate the study of quantum races, games where two or more quantum computers compete to solve a computational problem. While the problem of dueling algorithms has been studied for classical deterministic algorithms, the quantum case presents additional sources of uncertainty for the players. The foremost among these is that players do not know if they have solved the problem until they measure their quantum state. This question of `when to measure?' presents a very interesting strategic problem. We develop a game-theoretic model of a multiplayer quantum race, and find an approximate Nash equilibrium where all players play the same strategy. In the two-party case, we further show that this strategy is nearly optimal in terms of payoff among all symmetric Nash equilibria. A key role in our analysis of quantum races is played by a more tractable version of the game where there is no payout on a tie; for such races we completely characterize the Nash equilibria in the two-party case.
One application of our results is to the stability of the Bitcoin protocol when mining is done by quantum computers. Bitcoin mining is a race to solve a computational search problem, with the winner gaining the right to create a new block. Our results inform the strategies that eventual quantum miners should use, and also indicate that the collision probability---the probability that two miners find a new block at the same time---would not be too high in the case of quantum miners. Such collisions are undesirable as they lead to forking of the Bitcoin blockchain.
[1]
O. Mangasarian,et al.
Two-person nonzero-sum games and quadratic programming
,
1964
.
[2]
Or Sattath,et al.
On the insecurity of quantum Bitcoin mining
,
2018,
International Journal of Information Security.
[3]
Aggelos Kiayias,et al.
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
,
2017,
CRYPTO.
[4]
Alex Biryukov,et al.
Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem
,
2016,
NDSS.
[5]
Lov K. Grover.
A fast quantum mechanical algorithm for database search
,
1996,
STOC '96.
[6]
Emin Gün Sirer,et al.
Majority Is Not Enough: Bitcoin Mining Is Vulnerable
,
2013,
Financial Cryptography.
[7]
Peter Høyer,et al.
Exact quantum lower bound for grover's problem
,
2009,
Quantum Inf. Comput..
[8]
Adam Tauman Kalai,et al.
Dueling algorithms
,
2011,
STOC '11.
[9]
Adam Back,et al.
Hashcash - A Denial of Service Counter-Measure
,
2002
.
[10]
Miguel Oom Temudo de Castro,et al.
Practical Byzantine fault tolerance
,
1999,
OSDI '99.
[11]
Troy Lee,et al.
Quantum Attacks on Bitcoin, and How to Protect Against Them
,
2017,
Ledger.
[12]
Hubert Ritzdorf,et al.
On the Security and Performance of Proof of Work Blockchains
,
2016,
IACR Cryptol. ePrint Arch..
[13]
W. Dorn.
Duality in Quadratic Programming...
,
2011
.
[14]
Eric van Damme,et al.
Non-Cooperative Games
,
2000
.