Quantum Attacks on Bitcoin, and How to Protect Against Them

作者: Divesh Aggarwal , Gavin Brennen , Troy Lee , Miklos Santha , Marco Tomamichel

DOI: 10.5195/LEDGER.2018.127

关键词:

摘要: The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer. One particular area at risk is cryptocurrencies, a market currently worth over 100 billion USD. We investigate the risk posed to Bitcoin, and other cryptocurrencies, by attacks using quantum computers. We find that the proof-of-work used by Bitcoin is relatively resistant to substantial speedup by quantum computers in the next 10 years, mainly because specialized ASIC miners are extremely fast compared to the estimated clock speed of near-term quantum computers. On the other hand, the elliptic curve signature scheme used by Bitcoin is much more at risk, and could be completely broken by a quantum computer as early as 2027, by the most optimistic estimates. We analyze an alternative proof-of-work called Momentum, based on finding collisions in a hash function, that is even more resistant to speedup by a quantum computer. We also review the available post-quantum signature schemes to see which one would best meet the security and efficiency requirements of blockchain applications.

参考文章(47)
Léo Ducas, Phong Q. Nguyen, Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures Advances in Cryptology – ASIACRYPT 2012. ,vol. 7658, pp. 433- 450 ,(2012) , 10.1007/978-3-642-34961-4_27
Vadim Lyubashevsky, Lattice Signatures without Trapdoors Advances in Cryptology – EUROCRYPT 2012. ,vol. 7237, pp. 738- 755 ,(2012) , 10.1007/978-3-642-29011-4_43
Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann, Practical lattice-based cryptography: a signature scheme for embedded systems cryptographic hardware and embedded systems. pp. 530- 547 ,(2012) , 10.1007/978-3-642-33027-8_31
Martin Suchara, John D Kubiatowicz, Gerardo Paz, Arvin Faruque, Ching-Yi Lai, Frederic Chong, Estimating the Resources for Quantum Computation with the QuRE Toolbox ,(2013)
Aram W. Harrow, Avinatan Hassidim, Seth Lloyd, Quantum algorithm for linear systems of equations. Physical Review Letters. ,vol. 103, pp. 150502- 150502 ,(2009) , 10.1103/PHYSREVLETT.103.150502
Jintai Ding, Dieter Schmidt, Rainbow, a New Multivariable Polynomial Signature Scheme Applied Cryptography and Network Security. pp. 164- 175 ,(2005) , 10.1007/11496137_12
Phong Q. Nguyen, Oded Regev, Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Advances in Cryptology - EUROCRYPT 2006. pp. 271- 288 ,(2006) , 10.1007/11761679_17
Gerardo A. Paz-Silva, Gavin K. Brennen, Jason Twamley, Fault Tolerance with Noisy and Slow Measurements and Preparation Physical Review Letters. ,vol. 105, pp. 100501- ,(2010) , 10.1103/PHYSREVLETT.105.100501
Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier, How to Achieve a McEliece-Based Digital Signature Scheme international conference on the theory and application of cryptology and information security. ,vol. 2248, pp. 157- 174 ,(2001) , 10.1007/3-540-45682-1_10