Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack.

作者: I. Stewart , D. Ilie , A. Zamyatin , S. Werner , M. F. Torshizi

DOI: 10.1098/RSOS.180410

关键词: Computer securityFork (file system)Protocol (object-oriented programming)Integer factorizationElliptic Curve Digital Signature AlgorithmPublic-key cryptographyQuantum computerScheme (programming language)Digital signatureComputer science

摘要: Quantum computers are expected to have a dramatic impact on numerous fields due their anticipated ability solve classes of mathematical problems much more efficiently than classical counterparts. This particularly applies domains involving integer factorization and discrete logarithms, such as public key cryptography. In this paper, we consider the threats quantum-capable adversary could impose Bitcoin, which currently uses Elliptic Curve Digital Signature Algorithm (ECDSA) sign transactions. We then propose simple but slow commit–delay–reveal protocol, allows users securely move funds from old (non-quantum-resistant) outputs those adhering quantum-resistant digital signature scheme. The transition protocol functions even if ECDSA has already been compromised. While our scheme requires modifications Bitcoin these can be implemented soft fork.

参考文章(36)
Leslie Lamport, Constructing Digital Signatures from a One Way Function SRI International. ,(2016)
Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Čapkun, Misbehavior in Bitcoin ACM Transactions on Information and System Security. ,vol. 18, pp. 1- 32 ,(2015) , 10.1145/2732196
Michele Mosca, Raymond Laflamme, Phillip Kaye, An Introduction to Quantum Computing ,(2007)
Ralph C. Merkle, A Certified Digital Signature international cryptology conference. pp. 218- 238 ,(1989) , 10.1007/0-387-34805-0_21
Meni Rosenfeld, Analysis of Hashrate-Based Double Spending arXiv: Cryptography and Security. ,(2014)
Eleanor Rieffel, Wolfgang Polak, An introduction to quantum computing for non-physicists ACM Computing Surveys. ,vol. 32, pp. 300- 335 ,(2000) , 10.1145/367701.367709
Isaac L. Chuang, Michael A. Nielsen, Quantum Computation and Quantum Information ,(2000)
Phong Q. Nguyen, Oded Regev, Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Journal of Cryptology. ,vol. 22, pp. 139- 160 ,(2009) , 10.1007/S00145-008-9031-0
Tony Forbes, Richard Crandall, Carl Pomerance, Prime numbers : a computational perspective The Mathematical Gazette. ,vol. 86, pp. 552- 554 ,(2002) , 10.2307/3621190