An In-depth Analysis of Quantum Cryptography and Post-Quantum Cryptography in Blockchain
Blockchain technology has revolutionized various industries, offering secure and transparent transactions. However, with the rise of quantum computing, there is a pressing need to address the potential vulnerabilities of traditional blockchain systems. Enter quantum-secured distributed ledger technologies (PQDLTs), which aim to provide quantum-resistant solutions to safeguard blockchain networks. In this article, we delve into the world of quantum cryptography and post-quantum cryptography, exploring their applications in blockchain and their potential to shape the future of decentralized systems.
Planning Review – Identifying the Need
To understand the current landscape of PQDLTs, we conducted a systematic literature review (SLR) to identify existing research surveys and pinpoint gaps in the field. We analyzed five relevant review papers, each with its own deficiencies, to lay the groundwork for our study.
Identifying the Research Question
In this section, we specify the research questions that guided our survey. These questions include: the definition and importance of PQDLTs, their implementation and parameters, their security and relevance in the quantum computing era, and their applications and benefits.
Conducting Review
The process of conducting our review involved collecting research works, extracting information from the literature, and synthesizing the findings. We followed a methodical technique, utilizing relevant keywords and selecting 20 papers from trusted conferences, journals, and transactions. We excluded non-English papers, non-peer-reviewed works, and white papers to ensure the reliability of our selection.
Documenting Review
In this phase, we observed the documents and described the results of our review. We categorized the papers into two groups: quantum cryptography and post-quantum cryptography. Within quantum cryptography, we explored techniques such as quantum key distribution (QKD) and quantum entanglement. In post-quantum cryptography, we examined lattice-based, code-based, and multivariate cryptographic approaches.
Quantum Cryptography
Quantum cryptography utilizes the principles of quantum mechanics to secure data transmission. One example is the two-layer network protocol proposed by Kiktenko et al. that combines QKD in the quantum layer and Toeplitz hashing in the classical layer. While this protocol provides transparency and security, it suffers from reduced transfer rates with longer channels.
Post-Quantum Cryptography
Post-quantum cryptography refers to cryptographic schemes that are resistant to attacks by quantum computers. Zhang et al. proposed a lattice-based signature scheme using qTESLA, which addresses the storage capacity issue of lattice-based systems by storing only hash values in blocks. Li et al. developed a protocol based on lattice cipher to secure existing channels in classical blockchain networks. Their scheme offers smaller key and signature sizes, improving performance.
Conclusion:
The emergence of quantum computing poses a significant threat to traditional blockchain systems. However, the development of quantum-secured distributed ledger technologies offers a promising solution to protect against quantum attacks. Through our systematic literature review, we have explored the applications of quantum cryptography and post-quantum cryptography in blockchain. While challenges such as scalability and efficiency still need to be addressed, these advancements pave the way for a secure and resilient future for decentralized systems. As the quantum era unfolds, the integration of quantum-secured technologies will play a crucial role in shaping the landscape of blockchain and ensuring the continued trust and security of digital transactions.

Leave a Reply