IT PARK
    Most Popular

    Ten application scenarios for blockchain

    Jun 29, 2025

    What is the relationship between cloud computing and cloud storage? The 3 major disadvantages of cloud computing explained!

    Jun 01, 2025

    6 Ways the Internet of Things is Transforming Agriculture

    Jul 01, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      What is a port?

      Jul 01, 2025

      What to do with a laptop blue screen

      Jun 30, 2025

      Is it better to save the file as a zip archive or as the original file?

      Jun 29, 2025

      What is cross-site scripting attack

      Jun 28, 2025

      The difference between SLR and digital cameras

      Jun 27, 2025
    • AI

      Can AI Painting Replace Human Painters

      Jul 01, 2025

      Who owns the copyright of the paintings created by AI for you?

      Jun 30, 2025

      How does the meta universe "feed" artificial intelligence models?

      Jun 29, 2025

      Amazon Bedrock: How to Stay Competitive in Generative AI

      Jun 28, 2025

      AGI Avengers! Google Brain and DeepMind officially announced a merger

      Jun 27, 2025
    • Big Data

      Transforming the construction industry through digital twin modeling

      Jul 01, 2025

      How does big data start? From small data to big data

      Jun 30, 2025

      What is big data? What can big data do?

      Jun 29, 2025

      Benefits of big data analysis and how to analyze big data

      Jun 28, 2025

      Six benefits of big data for enterprises

      Jun 27, 2025
    • CLO

      Essential factors to consider for a successful cloud transformation journey

      Jul 01, 2025

      Building a Smart City: The Importance of Cloud Storage

      Jun 30, 2025

      SaaS sprawl: meaning, hazard, status quo and mitigation plan

      Jun 29, 2025

      What are the advantages and disadvantages of hybrid cloud?

      Jun 28, 2025

      Cloud computing has many applications in our daily life, what are the main ones?

      Jun 27, 2025
    • IoT

      6 Ways the Internet of Things is Transforming Agriculture

      Jul 01, 2025

      4 Big Challenges for IoT Data Collection and Management

      Jun 30, 2025

      Most enterprises expect a return on investment within one year of IoT deployment

      Jun 29, 2025

      What are the main applications of IoT in our real life?

      Jun 28, 2025

      IoT systems and why they are so important

      Jun 27, 2025
    • Blockchain

      Blockchain Common Consensus Mechanisms

      Jul 01, 2025

      How energy company Powerledger (POWR) is using blockchain to improve the world

      Jun 30, 2025

      Ten application scenarios for blockchain

      Jun 29, 2025

      What is a privacy coin? What is the difference between them and Bitcoin?

      Jun 28, 2025

      The difference between Bitcoin cash and Bitcoin

      Jun 27, 2025
    IT PARK
    Home » Blockchain » After the collision between quantum computing and blockchain - quantum blockchain
    Blockchain

    After the collision between quantum computing and blockchain - quantum blockchain

    In a new study, scientists proposed a conceptual design of "quantum blockchain", which may protect the blockchain system from quantum computer hackers. The new coding program can be interpreted as non classically influencing the past; Therefore, this decentralized quantum blockchain can be regarded as a quantum networked time machine.
    Updated: May 16, 2025
    After the collision between quantum computing and blockchain - quantum blockchain

    In a new study, scientists proposed a conceptual design of "quantum blockchain", which may protect the blockchain system from quantum computer hackers. The new coding program can be interpreted as non classically influencing the past; Therefore, this decentralized quantum blockchain can be regarded as a quantum networked time machine.

    Blockchain is a classic database type, which stores information related to the past, such as financial or other transaction history. The unique design makes it difficult to tamper with, and does not require a central agency to maintain its continuous accuracy. The most famous application of blockchain is known as Bitcoin. However, in recent years, various startups, enterprise alliances and research projects have explored many other potential uses of blockchain technology.

    According to the 2015 World Economic Forum survey, it is estimated that by 2027, 10% of global GDP will be stored in blockchain technology.

    However, blockchain may face trouble due to another major technology coming soon - quantum computer. The traditional computer represents the data as 1 and 0 by controlling the transistor on or off, while the quantum computer uses quantum bits. Due to some surreal characteristics of quantum physics, quantum bits can be in the superposition state of 0 and 1 at the same time.

    Now scientists have developed a quantum technology to ensure the security of each blockchain. In other words, this new blockchain encryption method uses exactly the quantum computing technology that poses a security threat to the blockchain itself.

    Evgeny Kiktenko, a researcher of Quantum Research Center, and his team have designed, built and tested the first quantum blockchain system. As the name implies, the system will ensure the security of the blockchain with quantum encryption technology. At present, this technology has been put into commercial application.

    The quantum identification system built by Evgeny Kiktenko team is based on solid and reliable physical laws to solve the consensus mechanism problem, which can ensure that each party involved can safely and accurately authenticate the other party. At the same time, because everyone's "quantum information" is associated with all transactions, the information becomes relatively open, and it is not easy to tamper with it.

    Evgeny Kiktenko said that they had built a quantum identification system described above using the commercial quantum encryption system of the Swiss company ID Quantique. They said: "We have developed a blockchain protocol based on information theory security authentication. In this network, each pair of nodes are connected through a quantum key distribution link."

    In order to verify the feasibility of the quantum blockchain technology, the team has tested it in a network with four users, and one of the users tried to verify the reliability of the system by making double expenditures. "This agreement only identified and cancelled the transaction application with double expenditure through two rounds of information communication, and formed a block that only allowed legal transactions at the same time."

    In any case, the development of quantum technology is like this. A mature quantum computer can not only capture any information saved using traditional cryptography, but also be used to combine with blockchain technology to improve the security level of password protection. It has to be said that technology is progressing bit by bit in such self contradiction.

    blockchain quantum computing research
    Previous Article How Polygon is outperforming Ether for three big reasons
    Next Article What are the key factors that enterprises need to consider when designing IoT devices?

    Related Articles

    Blockchain

    How blockchain is revolutionizing cybersecurity

    Jun 16, 2025
    Blockchain

    Emerging economies in Africa, South and Southeast Asia lead the global cryptocurrency trend

    Jun 13, 2025
    Blockchain

    Explanation of the consensus mechanism of blockchain

    May 28, 2025
    Most Popular

    Ten application scenarios for blockchain

    Jun 29, 2025

    What is the relationship between cloud computing and cloud storage? The 3 major disadvantages of cloud computing explained!

    Jun 01, 2025

    6 Ways the Internet of Things is Transforming Agriculture

    Jul 01, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.