IT PARK
    Most Popular

    Five effective business models of Internet of Things

    Jul 28, 2025

    What is AI?

    Jul 07, 2025

    Blockchain technology helps track new crown virus

    Jul 11, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      What are "Other" and "Other System Data" on iPhone and how do I clean them up?

      Aug 01, 2025

      Cell phone "a daily charge" and "no power to recharge", which is more harmful to the battery?

      Jul 31, 2025

      Why does the phone turn off when the remaining battery is not zero

      Jul 30, 2025

      Internet era! How to prevent personal information leakage

      Jul 29, 2025

      Which one to choose for mobile power? Analysis of the three major types of battery cells

      Jul 28, 2025
    • AI

      Coping with the "blind spot" of application in the age of artificial intelligence, and finding the "point of view" from the power of time.

      Aug 01, 2025

      AI fraud is efficient and low cost, and the "three magic tricks" effectively prevent potential threats

      Jul 31, 2025

      Many people use AI to help them work: less time to work and more money to earn

      Jul 30, 2025

      Driving Generative AI Pervasiveness: Intel's "duty to do so"

      Jul 29, 2025

      First U.S. Election in the Generative AI Era

      Jul 28, 2025
    • Big Data

      3 Ways to Overcome Big Data Obstacles

      Aug 01, 2025

      How big data analytics is reshaping the future of smart cities

      Jul 31, 2025

      3 Ways to Successfully Manage and Protect Your Data

      Jul 30, 2025

      Big data is transforming education

      Jul 29, 2025

      How data can help organizations achieve their environmental goals

      Jul 28, 2025
    • CLO

      How India can seize a rare opportunity in cloud computing

      Aug 01, 2025

      To make more environmentally friendly use of the cloud IT infrastructure, start with these aspects

      Jul 31, 2025

      Cloud computing, what are the main security challenges

      Jul 30, 2025

      What is cloud computing?

      Jul 29, 2025

      Four advantages are highlighted, and cloud computing is the trend

      Jul 28, 2025
    • IoT

      Iot and Internet misconceptions, which ones do you know?

      Aug 01, 2025

      5 Secrets to Maximizing Return on Investment in IoT

      Jul 31, 2025

      The Role of Industrial IoT Technology in Smart Factories

      Jul 30, 2025

      Is it too early to exit the IoT?

      Jul 29, 2025

      Five effective business models of Internet of Things

      Jul 28, 2025
    • Blockchain

      What does blockchain mining mean?

      Aug 01, 2025

      NFT, from the "art" of Internet natives to the marketing tools of business

      Jul 31, 2025

      What are the main areas of potential application of blockchain in the construction industry?

      Jul 30, 2025

      Difference between blockchain games and regular games

      Jul 29, 2025

      What is a smart contract?

      Jul 28, 2025
    IT PARK
    Home » Blockchain » After the collision between quantum computing and blockchain - quantum blockchain
    Blockchain

    After the collision between quantum computing and blockchain - quantum blockchain

    In a new study, scientists proposed a conceptual design of "quantum blockchain", which may protect the blockchain system from quantum computer hackers. The new coding program can be interpreted as non classically influencing the past; Therefore, this decentralized quantum blockchain can be regarded as a quantum networked time machine.
    Updated: Jul 06, 2025
    After the collision between quantum computing and blockchain - quantum blockchain

    In a new study, scientists proposed a conceptual design of "quantum blockchain", which may protect the blockchain system from quantum computer hackers. The new coding program can be interpreted as non classically influencing the past; Therefore, this decentralized quantum blockchain can be regarded as a quantum networked time machine.

    Blockchain is a classic database type, which stores information related to the past, such as financial or other transaction history. The unique design makes it difficult to tamper with, and does not require a central agency to maintain its continuous accuracy. The most famous application of blockchain is known as Bitcoin. However, in recent years, various startups, enterprise alliances and research projects have explored many other potential uses of blockchain technology.

    According to the 2015 World Economic Forum survey, it is estimated that by 2027, 10% of global GDP will be stored in blockchain technology.

    However, blockchain may face trouble due to another major technology coming soon - quantum computer. The traditional computer represents the data as 1 and 0 by controlling the transistor on or off, while the quantum computer uses quantum bits. Due to some surreal characteristics of quantum physics, quantum bits can be in the superposition state of 0 and 1 at the same time.

    Now scientists have developed a quantum technology to ensure the security of each blockchain. In other words, this new blockchain encryption method uses exactly the quantum computing technology that poses a security threat to the blockchain itself.

    Evgeny Kiktenko, a researcher of Quantum Research Center, and his team have designed, built and tested the first quantum blockchain system. As the name implies, the system will ensure the security of the blockchain with quantum encryption technology. At present, this technology has been put into commercial application.

    The quantum identification system built by Evgeny Kiktenko team is based on solid and reliable physical laws to solve the consensus mechanism problem, which can ensure that each party involved can safely and accurately authenticate the other party. At the same time, because everyone's "quantum information" is associated with all transactions, the information becomes relatively open, and it is not easy to tamper with it.

    Evgeny Kiktenko said that they had built a quantum identification system described above using the commercial quantum encryption system of the Swiss company ID Quantique. They said: "We have developed a blockchain protocol based on information theory security authentication. In this network, each pair of nodes are connected through a quantum key distribution link."

    In order to verify the feasibility of the quantum blockchain technology, the team has tested it in a network with four users, and one of the users tried to verify the reliability of the system by making double expenditures. "This agreement only identified and cancelled the transaction application with double expenditure through two rounds of information communication, and formed a block that only allowed legal transactions at the same time."

    In any case, the development of quantum technology is like this. A mature quantum computer can not only capture any information saved using traditional cryptography, but also be used to combine with blockchain technology to improve the security level of password protection. It has to be said that technology is progressing bit by bit in such self contradiction.

    blockchain quantum computing research
    Previous Article Use the Internet of Things to find new business models
    Next Article NFT, from the "art" of Internet natives to the marketing tools of business

    Related Articles

    Blockchain

    Ten application scenarios for blockchain

    Jun 29, 2025
    Blockchain

    How do you make a blockchain investment?

    Jul 23, 2025
    Blockchain

    Killing more worthless projects will be a victory for cryptocurrency

    Jun 26, 2025
    Most Popular

    Five effective business models of Internet of Things

    Jul 28, 2025

    What is AI?

    Jul 07, 2025

    Blockchain technology helps track new crown virus

    Jul 11, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.