Chapter Seven - Security and Privacy of Blockchain and Quantum Computation

Abstract Security and privacy are vital to the modern blockchain technology since it can exist without an authorized third party, which means that there may not be a trusted responsible person or organization in charge of systems. In this chapter we make a survey on this issue about blockchain systems. Security of the current systems is based on the computational hardness assumptions and many of the standard cryptography systems are known to be vulnerable against the advent of full-fledged quantum computers. On the other hand, it is possible to make a blockchain more secure by virtue of quantum information technology. In this chapter we give a pedagogical introduction to quantum information theory and quantum computation so that readers can follow advanced researches on application of quantum technology to the blockchain industry. We also explain a novel information system which accommodates quantum states in a peer-to-peer way. It would improve the level of privacy and security by the laws of physics, which is never achievable from nonquantum information theoretic viewpoints.

[1]  E. O. Kiktenko,et al.  Quantum-secured blockchain , 2017, Quantum Science and Technology.

[2]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[3]  H. Nishimori,et al.  Quantum annealing in the transverse Ising model , 1998, cond-mat/9804280.

[4]  Keisuke Fujii,et al.  Blind topological measurement-based quantum computation , 2011, Nature Communications.

[5]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[6]  Kazuki Ikeda Quantum Hall Effect and Langlands Program , 2017, Annals of Physics.

[7]  Alexei Kitaev,et al.  Topological phases and quantum computation , 2008, 0904.2771.

[8]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[9]  I. Chuang,et al.  Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance , 2001, Nature.

[10]  Kazuki Ikeda,et al.  qBitcoin: A Peer-to-Peer Quantum Cash System , 2017, Advances in Intelligent Systems and Computing.

[11]  M. Benedetti,et al.  Estimation of effective temperatures in quantum annealers for sampling applications: A case study with possible applications in deep learning , 2015, 1510.07611.

[12]  H. J. Kimble,et al.  The quantum internet , 2008, Nature.

[13]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[14]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[15]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[16]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[17]  Troy Lee,et al.  Quantum Attacks on Bitcoin, and How to Protect Against Them , 2017, Ledger.

[18]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[19]  Shuntaro Takeda,et al.  Deterministic quantum teleportation of photonic quantum bits by a hybrid technique , 2013, Nature.

[20]  Lectures on the Langlands program and conformal field theory , 2005, hep-th/0512172.

[21]  David Von Dollen,et al.  Traffic Flow Optimization Using a Quantum Annealer , 2017, Front. ICT.

[22]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[23]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[24]  R Raussendorf,et al.  A one-way quantum computer. , 2001, Physical review letters.

[25]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[26]  J. Dynes,et al.  Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.

[27]  Steven H. Adachi,et al.  Application of Quantum Annealing to Training of Deep Neural Networks , 2015, ArXiv.

[28]  Kimble,et al.  Unconditional quantum teleportation , 1998, Science.