2018
DOI: 10.5195/ledger.2018.127
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Attacks on Bitcoin, and How to Protect Against Them

Abstract: The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer. One particular area at risk are cryptocurrencies, a market currently worth over 150 billion USD. We investigate the risk of Bitcoin, and other cryptocurrencies, to attacks by quantum computers. We find that the proof-of-work used by Bitcoin is relatively resistant to substantial speedup by quantum computers in the next 10 year… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 107 publications
(92 citation statements)
references
References 42 publications
(25 reference statements)
0
86
0
Order By: Relevance
“…In the case of error rates, although error rates of 10 −3 combined with <100ns gate times have not yet been demonstrated, an ultimate error rate of 10 −5 may even be pessimistic, if more exotic technologies such as topological quantum computers come to fruition; an effective error rate of 10 −9 has been assumed elsewhere in the literature for such devices [84]. See [3] for a more detailed performance extrapolation.…”
Section: Parametermentioning
confidence: 99%
See 2 more Smart Citations
“…In the case of error rates, although error rates of 10 −3 combined with <100ns gate times have not yet been demonstrated, an ultimate error rate of 10 −5 may even be pessimistic, if more exotic technologies such as topological quantum computers come to fruition; an effective error rate of 10 −9 has been assumed elsewhere in the literature for such devices [84]. See [3] for a more detailed performance extrapolation.…”
Section: Parametermentioning
confidence: 99%
“…Here we outline our resource methdology, which follows a model developed by several previous works in this area [3,8,10,53,78]. The model assumes that the quantum computation is encoded using the surface code [53], a quantum error-correcting code with properties that make it an excellent candidate for implementation on near-term hardware platforms (e.g.…”
Section: Timing and Cost Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, there is always the case that personal data to become unreadable or available to everyone when the key is either lost or becomes accidentally known [78], [64], [79]. Taken into account that data shall remain encrypted across their life cycle, a further limitation derives from the rapid advancements in quantum computing which, according to experts, is going to break most encryption schemes used nowadays [80], [81], [82], [83]. To avoid information be susceptible to decryption once quantum computers become available, sensitive data need to be protected in the long term by using symmetric algorithms with long key lengths.…”
Section: A Bypassing Blockchain's Immutabilitymentioning
confidence: 99%
“…We note that the security of Bitcoin from the viewpoint of attacks from quantum computers has been considered in Ref. [6]. Large-scale quantum computers that enable to realize such an algorithm, however, are not yet available.…”
Section: Introductionmentioning
confidence: 99%