Journal of Guangdong University of Technology ›› 2021, Vol. 38 ›› Issue (02): 34-38.doi: 10.12052/gdutxb.200068

• Comprehensive Studies • Previous Articles     Next Articles

A Quantum-encrypted Blockchain Based on Delegated Proof of Stake (DPoS) Extension

Chen Bing-er, Wang Bang-hai, Lao Nan-xin   

  1. School of Computers, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2020-05-06 Online:2021-03-10 Published:2021-01-13

Abstract: The security of blockchain technology, depending on the encryption algorithms based on the one-way mathematical calculation difficulty, is vulnerable to the attack under exponential acceleration of quantum computers. Although a series of anti-quantum attack blockchains have been proposed, they are often too expensive to build and are not conducive to popularization. In this regard, a quantum-encrypted blockchain based on delegated proof of stake (DPoS) extension is proposed. Comparing with the original quantum-secured blockchain proposed by Kiktenko, the number of quantum key distribution (QKD) channels needed to be built is reduced from $O({n}^{2})$ to $ O\left(n\right) $, and the maximum number of communication rounds required is reduced from $ n/3+1 $ to $ k/3+1 $. It significantly reduces the construction cost, and improves the operation efficiency and expansion ability.

Key words: blockchain, delegated proof of stake, distributed technology, quantum cryptography

CLC Number: 

  • TP393.02
[1] PEDRO F. Understanding bitcoin: cryptography, engineering, and economics[M]. Hoboken: Wiley, 2014.
[2] EXTANCE A. The future of cryptocurrencies: Bitcoin and beyond [J]. Nature, 2015, 526(7571): 21-23.
[3] MARR B. How Blockchain technology could change the world [EB/OL]. [2016-05-27]. https://www.forbes.com/sites/bernardmarr/2016/05/27/how-blockchain-technology-could-change-the-world/#3c4d06f0725b.
[4] MELANIE S. Blockchain: blueprint for a new economy [M]. California: O'Reilly, 2015.
[5] WITTE J. The blockchain: a gentle introduction[J]. Social Science Research Network, 2016. https://dx.doi.org/10.2139/ssrn.2887567.
[6] 吴根, 资剑, 杨涛, 等. 量子计算技术发展现状与趋势[J]. 科技中国, 2017(9): 1-4.
[7] SCHNEIER B. Applied cryptography: protocols, algorithms, and source code in C [M]. 2nd ed. New York: John Wiley & Sons, Inc, 1995.
[8] GROVER L K. A framework for fast quantum mechanical algorithms [C]//Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing. New York: ACM, 1998: 53-62.
[9] BOYER M, BRASSARD G, HOEYER P, et al. Tight bounds on quantum searching [J]. Protein Science, 1998, 46(4-5): 493-505.
[10] SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509.
[11] SHOR P W. Algorithms for quantum computation: discrete logarithms and factoring [C]//Proceedings 35th Annual Symposium on Foundations of Computer Science. Santa Fe, NM, USA: IEEE Computer Society, 1994: 124-134.
[12] PROOS J, ZALKA C. Shor's discrete logarithm quantum algorithm for elliptic curves [J]. Quantum Information & Computation, 2003, 3(4): 317-344.
[13] ARUTE F, ARYA K, BABBUSH R, et al. Quantum supremacy using a programmable superconducting processor [J]. Nature, 2019, 574: 505-510.
[14] DIAMANTI E, LO H, QI B, et al. Practical challenges in quantum key distribution[J]. npj Quantum Information, 2016, 2, 16025. DOI: 10.1038/npjqi.2016.25.
[15] GISIN N, GREGOIRE R, TITTEL W, et al. Quantum cryptography [J]. Review of Modern Physics, 2002, 74(1): 145-195.
[16] BENNETT C H, BRASSARD G. An update on quantum cryptography [C]//Workshop on the Theory and Application of Cryptographic Techniques. Berlin: Springer-Verlag, 1985: 475-480.
[17] NIELSEN M A, CHUANG I L. Quantum computation and quantum information [J]. Mathematical Structures in Computer Science, 2007, 17(6): 558-559.
[18] KIKTENKO E O, POZHAR N O, ANUFRIEV M N, et al. Quantum-secured blockchain[J]. Quantum Physics, 2018. arXiv: 1705.09258v3.
[19] KIKTENKO E O, POZHAR N O, DUPLINSKIY A V, et al. Demonstration of a quantum key distribution network in urban fibre-optic communication lines [J]. Quantum Electronics, 2017, 47(9): 798-802.
[20] GAO Y, CHEN X, SUN Y, et al. A secure cryptocurrency scheme based on post-quantum blockchain [J]. IEEE Access, 2018, 6: 27205-27213.
[21] YIN W, WEN Q, LI W, et al. An anti-quantum transaction authentication approach in blockchain [J]. IEEE Access, 2018, 6: 5393-5401.
[22] WILSON A A T, RON S, AMIN S, et al. Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0) [C]//Australasian Conference on Information Security & Privacy. Cham: Springer, 2018: 558-576.
[23] RAJAN D, VISSER M. Quantum blockchain using entanglement in time [J]. Quantum Reports, 2019, 1(1): 3-11.
[24] LAMPORT L, SHOSTAK R, PEASE M, et al. The byzantine generals problem [J]. ACM Transactions on Programming Languages & Systems, 1982, 4(3): 382-401.
[25] 魏生, 戴科冕. 区块链金融场景应用分析及企业级架构探讨[J]. 广东工业大学学报, 2020, 37(2): 1-10.
WEI S, DAI K M. An analysis of blockchain applications in financial scenarios and an exploration of enterprise software architecture of blockchain as a service (BaaS) [J]. Journal of Guangdong University of Technology, 2020, 37(2): 1-10.
[1] Li Guang-cheng, Zhao Qing-lin, Xie Kan. A Design of Decentralized Data Processing Scheme [J]. Journal of Guangdong University of Technology, 2021, 38(06): 77-83.
[2] Wei Sheng, Dai Ke-mian. An Analysis of Blockchain Applications in Financial Scenarios and an Exploration of Enterprise Software Architecture of Blockchain as a Service(BaaS) [J]. Journal of Guangdong University of Technology, 2020, 37(02): 1-10.
[3] Wei Sheng, Dai Ke-mian. Revolution and Prospect of Private Equity Crowd-Funding Platform Based on Blockchain Technology [J]. Journal of Guangdong University of Technology, 2019, 36(02): 37-46.
[4] Xu Ke, Yao Wen-bing. Cyber Intelligent Economy and Blockchain [J]. Journal of Guangdong University of Technology, 2018, 35(03): 1-9.
[5] Leng Jie-wu, Jiang Ping-yu, Liu Jia-jun, Chen Qing-xin, Liu Qiang. Self-organizing of Product-oriented Prosumers Manufacturing Community Driven by the Blockchain Technique [J]. Journal of Guangdong University of Technology, 2017, 34(05): 1-9.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!