Advancements in Quantum Blockchain With Real-time Applications

Автор: literator от 26-01-2023, 05:00, Коментариев: 0

Категория: КНИГИ » ОС И БД

Advancements in Quantum Blockchain With Real-time ApplicationsНазвание: Advancements in Quantum Blockchain With Real-time Applications
Автор: Mahendra Kumar Shrivas, Kamal Kant Hiran, Ashok Bhansali
Издательство: IGI Global
Серия: Advances in Data Mining and Database Management
Год: 2022
Страниц: 311
Язык: английский
Формат: epub (true)
Размер: 18.9 MB

The amalgamation of post-quantum cryptography in cyber-physical systems makes the computing system secure and also generates opportunities in areas like smart contracts, quantum blockchain, and smart security solutions. Sooner or later, all computing and security systems are going to adopt quantum-proof cryptography to safeguard these systems from quantum attacks. Post-quantum cryptography has tremendous potential in various domains and must be researched and explored further to be utilized successfully. Advancements in Quantum Blockchain With Real-Time Applications considers various concepts of computing such as quantum computing, post-quantum cryptography, quantum attack-resistant blockchain, quantum blockchains, and multidisciplinary applications and real-world use cases. The book also discusses solutions to various real-world problems within the industry. Covering key topics such as cybersecurity, data management, and smart society, this reference work is ideal for computer scientists, industry professionals, academicians, practitioners, scholars, researchers, instructors, and students, as it covers crucial topics like cybersecurity, data management, and the smart society.

After the Internet, blockchain is one of the most promising new technologies with the potential to radically alter our global society. Blockchain technology is being adopted and implemented across the entire spectrum of business and industry operations, following the initial phase of bitcoin and cryptocurrencies. The solutions that guarantee trust, transparency, non-repudiation, and redundancy have been developed by application developers who have taken advantage of the characteristics of the blockchain, such as decentralization, immutability, cryptographic security, and so on. Blockchain 3.0 provides a large amount of distributed storage space with minimal effort, scalability without compromising security, assistance in integrating data from multiple sources without compromising privacy, transparency without revealing ownerships, interoperability without excessive complexity, and authenticity in provenance. Blockchain's adaptability and multidimensional capability, combined with the incorporation of AI, ML, IoT, etc., promises to have a significant, positive impact on a wide range of industries and organizations, and opens exciting opportunities to deliver a superior value proposition to customers through novel products and services.

Digital signatures, hashing algorithms, and public-key cryptography are all heavily utilised in blockchain infrastructures to create a one-of-a-kind secure and reliable application backbone. Whether it's for digital signatures or encryption, the time it takes to solve certain mathematical problems is generally used as a yardstick of the strength of the various cryptographic methods currently in use. Due to the massive amount of time required relative to the available computational power, Blockchain deployments are safe from hacking for any practical purpose. The current blockchain encryption systems, however, are vulnerable to the emerging quantum computing. The prospect of quantum computer cyber-attacks on the Blockchain network is a very real possibility soon, given the rapid pace of progress being experienced with quantum computing technology.

Members of the Blockchain community and developers are working on projects to strengthen existing distributed ledger technology (DLT) and blockchain networks so that they are immune to attacks from quantum computers. These post-quantum algorithms are based on computational problems that Shor's algorithm, Grover's algorithm, or similar ones have proven to be infeasible for quantum computers. Secure computing is achieved through the incorporation of post-quantum cryptography in cyber-physical systems, which also opens up new possibilities in fields like smart contracts, quantum blockchain, and intelligent security solutions. There is a growing consensus that the only way to protect computing and security infrastructure from the imminent threat of quantum attacks is to implement quantum-proof cryptography. Post-quantum implementations of the Blockchain can be seen in projects like Ethereum 2.0 and Ethereum 3.0. Research into quantum Blockchain has attracted a lot of attention in recent years thanks to the growth of quantum computation and quantum information theory. Although post-quantum cryptography shows great promise in many areas, there is surprisingly little written on the subject from an applied perspective. For those unfamiliar with distributed ledger technology (DLT) and blockchain, this book offers a primer on the topic, as well as an overview of the most popular post-quantum algorithms and how they ensure the long-term viability of DLT-based applications.

Quantum blockchain is a decentralized, encrypted, quantum-based database. This is due to quantum computing progress and the need for quantum blockchains. Quantum blockchain is part of standardized algorithms, frameworks, models, tools, architectures, and databases. Quantum information theory and computation research has grown recently. The Chapter 1 analyses quantum blockchain using the PRISMA technique. Literature is analyzed using parameters and graphical and tabular representations.

Скачать Advancements in Quantum Blockchain With Real-time Applications

Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.