Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks (2402.00922v1)

Published 1 Feb 2024 in cs.CR and quant-ph

Abstract: Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability. In the case of blockchain, such characteristics are provided through public-key cryptography and hash functions. However, the fast progress of quantum computing has opened the possibility of performing attacks based on Grover's and Shor's algorithms in the near future. Such algorithms threaten both public-key cryptography and hash functions, forcing to redesign blockchains to make use of cryptosystems that withstand quantum attacks, thus creating which are known as post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. For such a purpose, this article first studies current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs. Moreover, the most relevant post-quantum blockchain systems are studied, as well as their main challenges. Furthermore, extensive comparisons are provided on the characteristics and performance of the most promising post-quantum public-key encryption and digital signature schemes for blockchains. Thus, this article seeks to provide a broad view and useful guidelines on post-quantum blockchain security to future blockchain researchers and developers.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (2)
Citations (248)

Summary

  • The paper examines the vulnerabilities of current blockchain cryptography to quantum attacks, focusing on threats from Shor's and Grover's algorithms.
  • It evaluates post-quantum cryptosystems—especially lattice-based schemes—analyzing execution speed, key sizes, and practical feasibility for blockchain implementation.
  • The study outlines transition strategies such as soft forks and hybrid methods to integrate quantum-resistant cryptography into existing blockchain systems.

A Technical Review of Post-Quantum Blockchain Cryptography

The manuscript under review, contributed by Tiago M. Fernández-Caramés and Paula Fraga-Lamas, offers a comprehensive examination of blockchain security in the context of the burgeoning field of quantum computing. It specifically focuses on the vulnerabilities posed by quantum computing algorithms, particularly Shor's and Grover's algorithms, to existing blockchain cryptographic mechanisms that rely heavily on public-key cryptography and hash functions. The paper posits the necessity for post-quantum, or quantum-resistant cryptographic methods to safeguard the integrity and security of blockchain technologies against such potential threats.

The authors provide an analytical overview of post-quantum cryptosystems, identifying those deemed most applicable to blockchain and DLTs, and meticulously categorize existing post-quantum cryptosystems into code-based, multivariate-based, lattice-based, supersingular elliptic curve isogeny-based, and hybrid schemes. The research is exhaustive, as it extends into practical aspects such as execution speed, key sizes, signature lengths, and computational efficiencies of these cryptosystems, providing both qualitative and quantitative insights.

Cryptographic Threats from Quantum Computing

Quantum computing, with its potential to undermine widely-used cryptographic systems such as RSA and ECC via Shor's polynomial-time algorithm, necessitates a critical evaluation of blockchain's reliance on classical cryptographic primitives. The paper illustrates how Grover's algorithm could speed up brute-force attacks significantly, thereby reducing the security level of third-party-secured blockchains. While quantum computing has yet to realize practical systems robust enough to execute these attacks, the forward-looking analysis warns stakeholders of the eventual arrival of such capabilities.

Post-Quantum Cryptographic Solutions

The review encapsulates a taxonomy of post-quantum cryptosystems and evaluates their performance in terms of classical versus quantum security, public and private key sizes, and the complexity of their execution. Notably, lattice-based cryptosystems have emerged as frontrunners in terms of security and operational efficiency, with algorithms such as SABER KEM and DILITHIUM offering promising speed and key management capabilities. Conversely, code-based systems like McEliece exhibit strength but suffer from larger key sizes, impacting practical deployment in blockchain architectures.

Practical Implementation and Future Directions

The exploration into system performance on operational hardware is a key highlight, providing empirical data that can guide real-world deployment strategies for blockchain developers wary of quantum threats. The results suggest that lattice-based schemes, given their operational efficiencies, are particularly suitable for blockchain nodes. Furthermore, consideration of lightweight solutions like Three Bears highlights the ongoing necessity to balance security with computational economy.

Transition strategies present another area of critical importance, detailing how blockchains might integrate post-quantum cryptosystems, either through soft forks or hybrid methods, to maintain security integrity during technological shifts. The manuscript suggests potential deployment paths, reinforced by examples of experimental initiatives within projects such as Ethereum and Bitcoin Post-Quantum, showcasing the proactive adaptation of existing platforms towards quantum resistance.

Implications and Research Challenges

While the evaluation underscores the inadequacy of existing cryptographic methods in a post-quantum context, the diverse set of post-quantum cryptosystems provides a rich vein for cryptographic exploration. Challenges such as key size management, execution efficiency, and standardization remain pertinent and pose significant research questions for both academic researchers and industry practitioners. Embedding these cryptosystems into IoT and resource-constrained environments spotlights the added complexity when aligning quantum resilience with efficiency.

Conclusion

The paper offers deep insights into the interplay between quantum computing advancements and blockchain security, emphasizing the urgency for innovation in quantum-resistant cryptographic mechanisms. Its comprehensive survey of current cryptosystems, along with a pragmatic view of their deployment in blockchain infrastructures, creates a pivotal resource for ongoing and future research aimed at ensuring the robustness of blockchain in the face of evolving technological threats. As standardization processes continue, this work provides a critical foundation for developing secure, scalable, and efficient post-quantum blockchain systems.