The Rise of Post-Quantum Distributed Ledger Technologies: Exploring Quantum Cryptography and Post-Quantum Cryptography

Understanding the Implications and Advancements in Post-Quantum Distributed Ledger Technologies

The advent of quantum computing has raised concerns about the security of traditional cryptographic algorithms. As quantum computers become more powerful, they pose a threat to the encryption methods that underpin our digital infrastructure. In response to this challenge, researchers and developers have been exploring post-quantum distributed ledger technologies (PQDLTs) as a potential solution. PQDLTs aim to provide secure and resilient blockchain systems that can withstand attacks from quantum computers. In this article, we will delve into the world of PQDLTs, exploring the two main approaches: quantum cryptography and post-quantum cryptography.

Planning Review: Identifying the Needs and Research Questions

The first step in conducting a systematic literature review (SLR) for PQDLTs is to identify the needs and research questions. This involves analyzing existing research surveys and identifying gaps in the literature. Several review papers have been published in this field, but they have their limitations. For example, some focus only on specific algorithms or schemes, while others overlook important aspects of the technology. To address these deficiencies, the research questions for this study are:

1. What are post-quantum distributed ledger technologies and why are they important?

2. How are these technologies implemented, and what parameters are used in their implementations? How do they differ from existing works?

3. What makes these technologies secure, relevant, and useful in the upcoming quantum computing era?

4. What are the applications and benefits of post-quantum distributed ledger technologies?

Conducting Review: Collecting and Analyzing Research Works

To conduct the review, a methodical technique was employed to collect relevant research papers on PQDLTs. The selection criteria included papers from trusted conferences, journals, and transactions, while excluding non-English language-based papers, book chapters, theses, non-peer-reviewed papers, and white papers. After careful revision, 20 papers were selected for analysis.

Figure 14 illustrates the number of papers published in different years, showing a significant increase in 2018 compared to 2017. However, there has been no substantial increase in the number of research papers on PQDLTs from 2018 to 2020. It is only in 2021 that the number of publications has seen a notable rise.

Documenting Review: Quantum Cryptography and Post-Quantum Cryptography Approaches

In this phase, the selected papers were organized into two categories based on the approaches used: quantum cryptography and post-quantum cryptography.

Quantum cryptography employs the principles of quantum mechanics to secure data transmission. One paper proposed a two-layer network protocol in a blockchain network, combining Quantum Key Distribution (QKD) and classical hashing algorithms. Another paper focused on using the generalized Gram-Schmidt method and dimensional lifting for encrypting transaction data in a multiple-qubit form. A different study explored the use of quantum-assisted blockchain for electronic voting, utilizing Quantum Key Distributions, Quantum Random Number Generators, and Quantum Secret sharing.

Post-quantum cryptography, on the other hand, refers to cryptographic schemes that are resistant to attacks by quantum computers. One paper proposed the use of lattice-based encryption schemes in a blockchain system, storing public keys in an interplanetary file system (IPFS). Another study explored the implementation of a digital signature scheme based on lattice problems, ensuring security against both quantum and classical attacks.

Comparative Analysis and Considerations

The selected papers were analyzed in terms of their merits, demerits, and methodologies. A comparative study was conducted, highlighting the advantages and disadvantages of each approach. The analysis revealed that most schemes in the post-quantum cryptography category were based on lattice cryptography, while a few utilized code-based and multivariate cryptography.

Conclusion:

Post-quantum distributed ledger technologies offer a promising solution to the security challenges posed by quantum computing. Quantum cryptography and post-quantum cryptography approaches provide different strategies for achieving quantum-resistant blockchain systems. While quantum cryptography utilizes the principles of quantum mechanics to secure data transmission, post-quantum cryptography focuses on cryptographic schemes that are resistant to attacks by quantum computers. Both approaches have their advantages and limitations, and further research is needed to optimize their scalability, efficiency, and performance. As the quantum era approaches, the development of secure and resilient blockchain systems will be crucial for safeguarding our digital infrastructure.


Posted

in

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *