Our new X account is live! Follow @wizwand_team for updates
WorkDL logo mark

A Survey and Comparison of Post-quantum and Quantum Blockchains

About

Blockchains have gained substantial attention from academia and industry for their ability to facilitate decentralized trust and communications. However, the rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies. Notably, the emergence of Shor's and Grover's algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains. Consequently, it is essential to develop methods that reinforce blockchain technology against quantum attacks. In response to this challenge, two distinct approaches have been proposed. The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. The second approach explores quantum blockchains, which leverage the power of quantum computers and networks to rebuild the foundations of blockchains. This paper aims to provide a comprehensive overview and comparison of post-quantum and quantum blockchains while exploring open questions and remaining challenges in these domains. It offers an in-depth introduction, examines differences in blockchain structure, security, privacy, and other key factors, and concludes by discussing current research trends.

Zebo Yang, Haneen Alfauri, Behrooz Farkiani, Raj Jain, Roberto Di Pietro, Aiman Erbad• 2024

Related benchmarks

TaskDatasetResultRank
VerificationBitcoin Simulation
Verification Time (ms)99.2422
54
Cryptography Algorithm PerformanceLaptop x64 hardware Security Level 1 or 2
Keypair Generation Time0.012
16
Cryptography Algorithm PerformanceDesktop hardware Security Level 1 or 2
Keypair Generation Time0.015
16
Cryptography Algorithm PerformanceLaptop ARM hardware Security Level 1 or 2
Keypair Generation Time0.0198
16
Cryptography Algorithm PerformanceLaptop ARM hardware Security Level 5
Keypair Generation Performance0.2838
16
Cryptography Algorithm PerformanceLaptop x64 hardware Security Level 5
Keypair Generation Time0.0866
16
Cryptography Algorithm PerformanceDesktop hardware Security Level 5
Keypair Generation Time0.1087
16
Cryptography Algorithm PerformanceLaptop ARM hardware Security Level 3
Keypair Time0.2426
14
Cryptography Algorithm PerformanceLaptop x64 hardware Security Level 3
Keypair Generation Time0.0775
14
Cryptography Algorithm PerformanceDesktop hardware Security Level 3
Keypair Generation Time0.1218
14
Showing 10 of 11 rows

Other info

Follow for update