Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Blockchains in the Quantum Era - Chinese Translation
Blockchains in the Quantum Era - Chinese Translation

Blockchains in the Quantum Era - Chinese Translation

Release Date: 02/06/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application developers have successfully leveraged the blockchain characteristics of decentralization, immutability, cryptographic security and transparency to create the solution benefits of redundancy, non-repudiation and enhanced auditing/compliance. Blockchain infrastructures make very extensive use of digital signature algorithms, hashing algorithms and public-key cryptography. The rapid pace of progress that is being experienced with quantum computing technology has made the prospect of quantum computer cyber attacks a very real possibility.

Initiatives are therefore underway to augment today’s DLT/blockchain infrastructures with cryptographic algorithms that are highly resistant to quantum computer attack. These post-quantum algorithms are based on computational problems that are known to be very difficult for quantum computers to solve by using either Shor’s algorithm or Grover’s algorithm. This paper provides an introduction to DLT/blockchain technology, some of its representative applications, and an overview of the leading post-quantum algorithm candidates that are actively being pursued.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
AI Model Risk Management Framework
AI Model Risk Management Framework
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
An Agile Data Doctrine for a Secure Data Lake
An Agile Data Doctrine for a Secure Data Lake
Integrating PSO with AI: The Future of Adaptive Cybersecurity
Integrating PSO with AI: The Future of Adaptive Cybersecurity
Published: 07/23/2024
Enhancing AI Reliability: Introducing the LLM Observability & Trust API
Enhancing AI Reliability: Introducing the LLM Observability & Trust...
Published: 07/19/2024
Quantum Readiness Importance: A Comprehensive Guide
Quantum Readiness Importance: A Comprehensive Guide
Published: 07/03/2024
And now for something completely different… a Cloud Security Alliance RFI
And now for something completely different… a Cloud Security Allian...
Published: 07/01/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training