IT PARK
    Most Popular

    How to prove you're human in the AI jungle?

    Mar 20, 2025

    Google has categorized 6 real-world AI attacks to prepare for immediately

    Apr 01, 2025

    Big Model + Big Computing Power Convergence What Cloud Computing Can Do for AIGC

    Apr 09, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      How do Bluetooth headsets achieve noise cancellation?

      May 09, 2025

      Wireless charging principle

      May 08, 2025

      How to solve the problem of computer blue screen? What about the blue screen of the computer?

      May 07, 2025

      How often should the router be turned off?

      May 06, 2025

      What is a port?

      May 05, 2025
    • AI

      AI reads brains and deciphers people's inner monologues! Will it read all my secrets?

      May 09, 2025

      When AI starts to have "subconsciousness"

      May 08, 2025

      Can AI Painting Replace Human Painters

      May 07, 2025

      Who owns the copyright of the paintings created by AI for you?

      May 06, 2025

      How does the meta universe "feed" artificial intelligence models?

      May 05, 2025
    • Big Data

      Benefits of big data analysis and how to analyze big data

      May 09, 2025

      Six benefits of big data for enterprises

      May 08, 2025

      Six big data mistakes that enterprises should avoid

      May 07, 2025

      Cloud-native Big Data, Lake-Warehouse Integration, AI for Data - Who's in charge in the future?

      May 06, 2025

      Why do 85% of Big Data projects end up in failure?

      May 05, 2025
    • CLO

      What are the advantages and disadvantages of hybrid cloud?

      May 09, 2025

      Cloud computing has many applications in our daily life, what are the main ones?

      May 08, 2025

      What are the characteristics of cloud computing?

      May 07, 2025

      How do I evaluate cloud providers? What are the cloud outage handling strategies?

      May 06, 2025

      Gartner's Latest Forecast: Global Cloud Revenue to Surpass Non-Cloud Revenue

      May 05, 2025
    • IoT

      The role of IoT devices in intelligent workplace technology

      May 09, 2025

      Protecting IT, OT, IOT and IoMT in Healthcare

      May 08, 2025

      How to protect the Internet of Things?

      May 07, 2025

      Is Predictive Maintenance the Ultimate Solution for the Internet of Things

      May 06, 2025

      Smart Museums: 6 IoT Applications for Museums and Galleries

      May 05, 2025
    • Blockchain

      Ten application scenarios for blockchain

      May 09, 2025

      What is a privacy coin? What is the difference between them and Bitcoin?

      May 08, 2025

      The difference between Bitcoin cash and Bitcoin

      May 07, 2025

      Killing more worthless projects will be a victory for cryptocurrency

      May 06, 2025

      What causes the bitcoin network hash rate to increase?

      May 05, 2025
    IT PARK
    Home » Blockchain » After the collision between quantum computing and blockchain - quantum blockchain
    Blockchain

    After the collision between quantum computing and blockchain - quantum blockchain

    In a new study, scientists proposed a conceptual design of "quantum blockchain", which may protect the blockchain system from quantum computer hackers. The new coding program can be interpreted as non classically influencing the past; Therefore, this decentralized quantum blockchain can be regarded as a quantum networked time machine.
    Updated: Mar 26, 2025
    After the collision between quantum computing and blockchain - quantum blockchain

    In a new study, scientists proposed a conceptual design of "quantum blockchain", which may protect the blockchain system from quantum computer hackers. The new coding program can be interpreted as non classically influencing the past; Therefore, this decentralized quantum blockchain can be regarded as a quantum networked time machine.

    Blockchain is a classic database type, which stores information related to the past, such as financial or other transaction history. The unique design makes it difficult to tamper with, and does not require a central agency to maintain its continuous accuracy. The most famous application of blockchain is known as Bitcoin. However, in recent years, various startups, enterprise alliances and research projects have explored many other potential uses of blockchain technology.

    According to the 2015 World Economic Forum survey, it is estimated that by 2027, 10% of global GDP will be stored in blockchain technology.

    However, blockchain may face trouble due to another major technology coming soon - quantum computer. The traditional computer represents the data as 1 and 0 by controlling the transistor on or off, while the quantum computer uses quantum bits. Due to some surreal characteristics of quantum physics, quantum bits can be in the superposition state of 0 and 1 at the same time.

    Now scientists have developed a quantum technology to ensure the security of each blockchain. In other words, this new blockchain encryption method uses exactly the quantum computing technology that poses a security threat to the blockchain itself.

    Evgeny Kiktenko, a researcher of Quantum Research Center, and his team have designed, built and tested the first quantum blockchain system. As the name implies, the system will ensure the security of the blockchain with quantum encryption technology. At present, this technology has been put into commercial application.

    The quantum identification system built by Evgeny Kiktenko team is based on solid and reliable physical laws to solve the consensus mechanism problem, which can ensure that each party involved can safely and accurately authenticate the other party. At the same time, because everyone's "quantum information" is associated with all transactions, the information becomes relatively open, and it is not easy to tamper with it.

    Evgeny Kiktenko said that they had built a quantum identification system described above using the commercial quantum encryption system of the Swiss company ID Quantique. They said: "We have developed a blockchain protocol based on information theory security authentication. In this network, each pair of nodes are connected through a quantum key distribution link."

    In order to verify the feasibility of the quantum blockchain technology, the team has tested it in a network with four users, and one of the users tried to verify the reliability of the system by making double expenditures. "This agreement only identified and cancelled the transaction application with double expenditure through two rounds of information communication, and formed a block that only allowed legal transactions at the same time."

    In any case, the development of quantum technology is like this. A mature quantum computer can not only capture any information saved using traditional cryptography, but also be used to combine with blockchain technology to improve the security level of password protection. It has to be said that technology is progressing bit by bit in such self contradiction.

    blockchain quantum computing research
    Previous Article What is the difference between cloud computing and virtualization?
    Next Article How Big Data is changing the nature of consumer lending

    Related Articles

    Blockchain

    Blockchain Foundation - What is Blockchain Technology

    Mar 30, 2025
    Blockchain

    Blockchain technology leads the wave of financial digitization

    Apr 06, 2025
    Blockchain

    What causes the bitcoin network hash rate to increase?

    May 05, 2025
    Most Popular

    How to prove you're human in the AI jungle?

    Mar 20, 2025

    Google has categorized 6 real-world AI attacks to prepare for immediately

    Apr 01, 2025

    Big Model + Big Computing Power Convergence What Cloud Computing Can Do for AIGC

    Apr 09, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.