ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Download Publication

Blockchains in the Quantum Era - Chinese Translation
Blockchains in the Quantum Era - Chinese Translation

Blockchains in the Quantum Era - Chinese Translation

Release Date: 02/06/2022

Working Group: Quantum-safe Security

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application developers have successfully leveraged the blockchain characteristics of decentralization, immutability, cryptographic security and transparency to create the solution benefits of redundancy, non-repudiation and enhanced auditing/compliance. Blockchain infrastructures make very extensive use of digital signature algorithms, hashing algorithms and public-key cryptography. The rapid pace of progress that is being experienced with quantum computing technology has made the prospect of quantum computer cyber attacks a very real possibility.

Initiatives are therefore underway to augment today’s DLT/blockchain infrastructures with cryptographic algorithms that are highly resistant to quantum computer attack. These post-quantum algorithms are based on computational problems that are known to be very difficult for quantum computers to solve by using either Shor’s algorithm or Grover’s algorithm. This paper provides an introduction to DLT/blockchain technology, some of its representative applications, and an overview of the leading post-quantum algorithm candidates that are actively being pursued.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Fortifying the Agentic Web: A Unified Zero Trust Architecture Against Logic-Layer Threats
Fortifying the Agentic Web: A Unified Zero Trust Architecture Again...
Published: 09/12/2025
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025
Securing the Agentic AI Control Plane: Announcing the MCP Security Resource Center
Securing the Agentic AI Control Plane: Announcing the MCP Security ...
Published: 08/20/2025
Agentic AI and Zero Trust
Agentic AI and Zero Trust
Published: 08/07/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training