Browse Subject Headings
Quantum Blockchain : An Emerging Cryptographic Paradigm
Quantum Blockchain : An Emerging Cryptographic Paradigm
Click to enlarge
ISBN No.: 9781119836223
Pages: 384
Year: 202208
Format: Trade Cloth (Hard Cover)
Price: $ 310.50
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface xix 1 Introduction to Classical Cryptography 1 Vani Rajasekar, Premalatha J., Rajesh Kumar Dhanaraj and Oana Geman 1.1 Introduction 2 1.2 Substitution Ciphers 2 1.2.1 Caesar Cipher 3 1.2.2 Polyalphabetic Cipher 4 1.


2.2.1 Working of Polyalphabetic Cipher 4 1.2.2.2 Cracking of Cipher Text 5 1.2.3 Hill Cipher 5 1.


2.4 Playfair Cipher 7 1.2.4.1 Rules for Encrypting the Playfair Cipher 7 1.3 Transposition Cipher 8 1.3.1 Columnar Transposition 8 1.


3.2 Rail Fence Transposition 9 1.3.3 Route Cipher 9 1.3.4 Double Transposition 10 1.4 Symmetric Encryption Technique 10 1.4.


1 Key Management 11 1.4.2 Key Generation 12 1.4.3 Key Exchange 12 1.4.4 Data Encryption Standard 12 1.4.


4.1 Structure of DES 13 1.4.4.2 Fiestel Function 14 1.4.5 Advanced Encryption Standard 15 1.4.


5.1 Operation in AES 15 1.4.6 Applications of Symmetric Cipher 17 1.4.7 Drawback of Symmetric Encryption 17 1.4.7.


1 Key Exhaustion 17 1.4.7.2 Key Management at Large Scale 17 1.4.7.3 Attribution Data 17 1.5 Asymmetric Encryption Technique 17 1.


5.1 Rivest-Shamir-Adleman Encryption Algorithm 18 1.5.2 Elliptic Curve Cryptography 19 1.5.2.1 Elliptic Curve 19 1.5.


2.2 Difference Between ECC and RSA 20 1.5.2.3 Advantages and Security of ECC 20 1.5.3 Hyperelliptic Curve Cryptography 21 1.6 Digital Signatures 22 1.


6.1 Working of Digital Signature 22 1.6.2 Creation of Digital Signature 23 1.6.3 Message Authentication Code 24 1.6.3.


1 Limitation on MAC 25 1.6.3.2 One Time MAC 25 1.6.4 Secure Hash Algorithm 26 1.6.4.


1 Characteristics of SHA 26 1.6.4.2 Applications of SHA 27 1.6.5 Advantages and Disadvantages of Digital Signature 27 1.6.5.


1 Advantages of Digital Signature 27 1.6.5.2 Disadvantages of Digital Signature 27 1.6.6 Conclusion 28 References 28 2 Quantum Cryptographic Techniques 31 Malathy S., Santhiya M. and Rajesh Kumar Dhanaraj 2.


1 Post-Quantum Cryptography 32 2.2 Strength of Quantum Cryptography 32 2.3 Working Principle of Quantum Cryptography 32 2.4 Example of Quantum Cryptography 33 2.5 Fundamentals of Quantum Cryptography 34 2.5.1 Entanglement 34 2.5.


1.1 Entanglement State 34 2.6 Problems With the One-Time Pad and Key Distribution 35 2.7 Quantum No-Cloning Property 36 2.8 Heisenberg Uncertainty Principle 37 2.9 Quantum Key Distribution 38 2.10 Cybersecurity Risks Prevailing in Current Cryptographic Techniques 39 2.11 Implementation of Quantum-Safe Cryptography 40 2.


12 Practical Usage of Existing QKD Solutions 41 2.13 Attributes of Quantum Key Distribution 41 2.13.1 Key Rate 42 2.13.2 Length of the Link 43 2.13.3 Key Material Production 43 2.


13.4 Robustness 43 2.13.5 Usage of the Key 43 2.14 Quantum Key Distribution Protocols 44 2.14.1 BB84 Protocol 44 2.14.


2 Decoy State Protocol 45 2.14.3 T12 Protocol 45 2.14.4 SARG04 Protocol 45 2.14.5 Six-State Protocol 46 2.14.


6 E91 Protocol 46 2.14.7 COW Protocol (Coherent One-Way Protocol) 46 2.14.8 HDQKD Protocol (High-Dimensional Quantum Key Distribution) 47 2.14.9 KMB09 Protocol 47 2.14.


10 B92 Protocol 47 2.14.11 MSZ96 Protocol 48 2.14.12 DPS Protocol 48 2.14.13 Three-Stage Quantum Protocol 48 2.14.


14 S09 Protocol 48 2.15 Applications of Quantum Cryptography 49 2.15.1 Multipoint Secure Computation 50 2.15.2 E-Commerce 51 2.15.3 Cloud Computing 51 2.


16 Conclusion 52 References 52 3 Evolution of Quantum Blockchain 55 Dinesh Komarasamy and Jenita Hermina J. 3.1 Introduction of Blockchain 55 3.2 Introduction of Quantum Computing 62 3.2.1 Background and History of Quantum Computers 63 3.2.2 Scope of Quantum Computers in Blockchain 65 3.


3 Restrictions of Blockchain Quantum 65 3.3.1 Post-Quantum Cryptography 65 3.3.1.1 Lattice Cryptography 66 3.3.2 Multivariate Cryptography 69 3.


3.3 Hash Cryptography 70 3.3.4 Code Cryptography 71 3.4 Post-Quantum Cryptography Features 72 3.5 Quantum Cryptography 73 3.5.1 Working of QKD 73 3.


5.2 Protocols of QKD 75 3.5.2.1 Prepare-and-Measure 75 3.5.2.2 Entanglement 76 3.


6 Comparison Between Traditional and Quantum-Resistant Cryptosystems 76 3.7 Quantum Blockchain Applications 77 3.8 Blockchain Applications 77 3.8.1 Financial Application 77 3.8.2 Non-Financial Application 78 3.9 Limitations of Blockchain 78 3.


10 Conclusion 79 References 79 4 Development of the Quantum Bitcoin (BTC) 83 Gaurav Dhuriya, Aradhna Saini and Prashant Johari 4.1 Introduction of BTC 84 4.2 Extract 87 4.3 Preservation 89 4.3.1 The Role of Cryptography in BTC 91 4.3.2 The Role of Decentralization in BTC 93 4.


3.3 The Role of Immutability in BTC 94 4.3.4 The Role of Proof-of-Exertion in BTC 95 4.4 The Growth of BTC 97 4.5 Quantum Computing (History and Future) 98 4.6 Quantum Computation 99 4.7 The Proposal of Quantum Calculation 101 4.


8 What Are Quantum Computers and How They Exertion? 102 4.9 Post-Quantum Cryptography 104 4.10 Difficulties Facing BTC 105 4.11 Conclusion 106 References 107 5 A Conceptual Model for Quantum Blockchain 109 Vijayalakshmi P., Abraham Dinakaran and Korhan Cengiz 5.1 Introduction 110 5.2 Distributed Ledger Technology 110 5.2.


1 Features of DLT 111 5.2.2 Quantum Computing 111 5.2.2.1 Growth of Quantum Computing 112 5.2.2.


2 A Comparison of Classical Computing and Quantum Computing 112 5.2.3 Blockchain and Quantum Blockchain 113 5.2.3.1 Characteristics of Blockchain 113 5.2.3.


2 Quantum Blockchain 114 5.3 Hardware Composition of the Quantum Computer 115 5.4 Framework Styles of Quantum Blockchain 115 5.4.1 Computational Elements 115 5.4.1.1 Qubits 115 5.


4.1.2 Quantum Gates and Quantum Computation 116 5.4.2 The Architectural Patterns 117 5.4.2.1 Layered Approach 117 5.


4.2.2 Securing Mechanisms for Quantum Blockchain 119 5.5 Fundamental Integrants 122 5.5.1 Interaction of Quantum Systems 122 5.5.2 Failure of Quantum Systems 122 5.


5.3 Security of Quantum Systems 123 5.5.4 Challenges and Opportunities 123 5.6 Conclusion 124 References 124 6 Challenges and Research Perspective of Post-Quantum Blockchain 127 Venu K. and Krishnakumar B. 6.1 Introduction 128 6.


1.1 Cryptocurrency 128 6.1.2 Blockchain 128 6.1.2.1 Bitcoin and Cryptocurrencies 129 6.1.


2.2 Insolent Bonds 129 6.1.2.3 Imminent Stage 129 6.1.3 Physiology of Blockchain 130 6.1.


4 Blockchain Network 131 6.1.5 Blockchain Securities 131 6.1.5.1 Public Key Cryptography an Asymmetric Cryptosystem 131 6.1.5.


2 Digital Signature''s Hashing Algorithm 132 6.1.6 Bitcoin Blockchain 132 6.1.7 Quantum Cryptography 132 6.1.8 Quantum Blockchain 135 6.1.


9 Post-Quantum Cryptography 136 6.2 Post-Quantum Blockchain Cryptosystems 136 6.2.1 Post-Quantum Blockchain Cryptosystems Based on Public Keys 137 6.2.1.1 Code-Based Cryptosystem 137 6.2.


1.2 Multivariant-Based Cryptosystem 142 6.2.1.3 Lattice-Based Cryptosystem 142 6.2.1.4 Super Singular Elliptic-Curve Isogeny Cryptosystem 146 6.


2.1.5 Hybrid-Based Cryptosystem 146 6.2.2 Post-Quantum Blockchain Signatures 146 6.2.2.1 Code-Centred Digital Signature 146 6.


2.2.2 Multivariant-Based Digital Signature 147 6.2.2.3 Lattice-Based Digital Signature 147 6.2.2.


4 Super Singular Elliptic-Curve Isogeny Digital Signature 153 6.2.2.5 Hash-Based Digital Signature 154 6.3 Post-Quantum Blockchain Performance Comparison 154 6.3.1 Encryption Algorithm 154 6.3.


2 Digital Signatures 162 6.4 Future Scopes of Post-Quantum Blockchain 168 6.4.1 NIST Standardization 168 6.4.2 Key and Signature Size 168 6.4.3 Faster Evolution 168 6.


4.4 Post-Quantum Blockchain From Pre-Quantum 169 6.4.5 Generation of Keys 169 6.4.6 Computational Efficiency 169 6.4.7 Choosing Hardware 169 6.


4.8 Overheads on Large Ciphertext 170 6.5 Conclusion 170 References 170 7 Post-Quantum Cryptosystems for Blockchain 173 K. Tamil Selvi and R. Thamilselvan 7.1 Introduction 174 7.2 Basics of Blockchain 174 7.3 Quantum and Post-Quantum Cryptography 177 7.


4 Post-Quantum Cryptosystems for Blockchain 180 7.4.1 Public Key Post-Quantum Cryptosystems 180 7.4.1.1 Code-Based Cryptosystems 180 7.4.1.


2 Lattice-Based Cryptosystems 184 7.4.1.3 Multivariate-Based Cryptosystem 186 7.4.1.4 Supersingular Elliptic Curve Isogency-Based Cryptosystems 187 7.4.


1.5 Hybrid Cryptosystems 189 7.4.2 Post-Quantum Signing Algorithms 190 7.4.2.1 Code-Based Cryptosystems 191 7.4.


2.2 Lattice-Based Cryptosystems 191 7.4.2.3 Multivariate Based Cryptosystem 193 7.4.2.4 Supersingular Elliptic Curve Isogency-Based Cryptosystem 193 7.


4.2.5 Hash-Based Cryptosystem 194 7.5 Other Cryptosystems for Post-Quantum Blockchain 195 7.6 Conclusion 196 References.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings