Data from: Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack
Quantum computers are expected to have a dramatic impact on numerous fields, due to their anticipated ability to solve classes of mathematical problems much more efficiently than their classical counterparts. This particularly applies to domains involving integer factorisation and discrete logarithm...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Dataset |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Stewart, Iain Ilie, Dragos Zamyatin, Alexei Werner, Sam Torshizi, Maryam F. Knottenbelt, William J. |
description | Quantum computers are expected to have a dramatic impact on numerous
fields, due to their anticipated ability to solve classes of mathematical
problems much more efficiently than their classical counterparts. This
particularly applies to domains involving integer factorisation and
discrete logarithms, such as public key cryptography. In this paper we
consider the threats a quantum-capable adversary could impose on Bitcoin,
which currently uses the Elliptic Curve Digital Signature Algorithm
(ECDSA) to sign transactions. We then propose a simple but slow
commit--delay--reveal protocol, which allows users to securely move their
funds from old (non-quantum-resistant) outputs to those adhering to a
quantum-resistant digital signature scheme. The transition protocol
functions even if ECDSA has already been compromised. While our scheme
requires modifications to the Bitcoin protocol, these can be implemented
as a soft fork. |
doi_str_mv | 10.5061/dryad.46vm261 |
format | Dataset |
fullrecord | <record><control><sourceid>datacite_PQ8</sourceid><recordid>TN_cdi_datacite_primary_10_5061_dryad_46vm261</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_5061_dryad_46vm261</sourcerecordid><originalsourceid>FETCH-datacite_primary_10_5061_dryad_46vm2613</originalsourceid><addsrcrecordid>eNqVjjsOwjAQRN1QIKCk3wskxHxSpCSAOAC9tXLsyCK2g70B5faYCA5A9TTSzOgxtuZFfihKvmnCiE2-L592W_I58yckBB28raD21hoi41ogD48BHQ0WgoomEjqpKkCInX9Bo7RKGbQPcDQkvXGALRoXKVU0JvzW0tt-mC6RCOV9yWYau6hWXy5Ydjnf6mvWJA9pSIk-GIthFLwQH2ExCYuv8O7f_hseBFIx</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>dataset</recordtype></control><display><type>dataset</type><title>Data from: Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack</title><source>DataCite</source><creator>Stewart, Iain ; Ilie, Dragos ; Zamyatin, Alexei ; Werner, Sam ; Torshizi, Maryam F. ; Knottenbelt, William J.</creator><creatorcontrib>Stewart, Iain ; Ilie, Dragos ; Zamyatin, Alexei ; Werner, Sam ; Torshizi, Maryam F. ; Knottenbelt, William J.</creatorcontrib><description>Quantum computers are expected to have a dramatic impact on numerous
fields, due to their anticipated ability to solve classes of mathematical
problems much more efficiently than their classical counterparts. This
particularly applies to domains involving integer factorisation and
discrete logarithms, such as public key cryptography. In this paper we
consider the threats a quantum-capable adversary could impose on Bitcoin,
which currently uses the Elliptic Curve Digital Signature Algorithm
(ECDSA) to sign transactions. We then propose a simple but slow
commit--delay--reveal protocol, which allows users to securely move their
funds from old (non-quantum-resistant) outputs to those adhering to a
quantum-resistant digital signature scheme. The transition protocol
functions even if ECDSA has already been compromised. While our scheme
requires modifications to the Bitcoin protocol, these can be implemented
as a soft fork.</description><identifier>DOI: 10.5061/dryad.46vm261</identifier><language>eng</language><publisher>Dryad</publisher><subject>bitcoin ; blockchain ; ECDSA ; Quantum computing ; quantum resistance</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,1888</link.rule.ids><linktorsrc>$$Uhttps://commons.datacite.org/doi.org/10.5061/dryad.46vm261$$EView_record_in_DataCite.org$$FView_record_in_$$GDataCite.org$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Stewart, Iain</creatorcontrib><creatorcontrib>Ilie, Dragos</creatorcontrib><creatorcontrib>Zamyatin, Alexei</creatorcontrib><creatorcontrib>Werner, Sam</creatorcontrib><creatorcontrib>Torshizi, Maryam F.</creatorcontrib><creatorcontrib>Knottenbelt, William J.</creatorcontrib><title>Data from: Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack</title><description>Quantum computers are expected to have a dramatic impact on numerous
fields, due to their anticipated ability to solve classes of mathematical
problems much more efficiently than their classical counterparts. This
particularly applies to domains involving integer factorisation and
discrete logarithms, such as public key cryptography. In this paper we
consider the threats a quantum-capable adversary could impose on Bitcoin,
which currently uses the Elliptic Curve Digital Signature Algorithm
(ECDSA) to sign transactions. We then propose a simple but slow
commit--delay--reveal protocol, which allows users to securely move their
funds from old (non-quantum-resistant) outputs to those adhering to a
quantum-resistant digital signature scheme. The transition protocol
functions even if ECDSA has already been compromised. While our scheme
requires modifications to the Bitcoin protocol, these can be implemented
as a soft fork.</description><subject>bitcoin</subject><subject>blockchain</subject><subject>ECDSA</subject><subject>Quantum computing</subject><subject>quantum resistance</subject><fulltext>true</fulltext><rsrctype>dataset</rsrctype><creationdate>2018</creationdate><recordtype>dataset</recordtype><sourceid>PQ8</sourceid><recordid>eNqVjjsOwjAQRN1QIKCk3wskxHxSpCSAOAC9tXLsyCK2g70B5faYCA5A9TTSzOgxtuZFfihKvmnCiE2-L592W_I58yckBB28raD21hoi41ogD48BHQ0WgoomEjqpKkCInX9Bo7RKGbQPcDQkvXGALRoXKVU0JvzW0tt-mC6RCOV9yWYau6hWXy5Ydjnf6mvWJA9pSIk-GIthFLwQH2ExCYuv8O7f_hseBFIx</recordid><startdate>20180524</startdate><enddate>20180524</enddate><creator>Stewart, Iain</creator><creator>Ilie, Dragos</creator><creator>Zamyatin, Alexei</creator><creator>Werner, Sam</creator><creator>Torshizi, Maryam F.</creator><creator>Knottenbelt, William J.</creator><general>Dryad</general><scope>DYCCY</scope><scope>PQ8</scope></search><sort><creationdate>20180524</creationdate><title>Data from: Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack</title><author>Stewart, Iain ; Ilie, Dragos ; Zamyatin, Alexei ; Werner, Sam ; Torshizi, Maryam F. ; Knottenbelt, William J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-datacite_primary_10_5061_dryad_46vm2613</frbrgroupid><rsrctype>datasets</rsrctype><prefilter>datasets</prefilter><language>eng</language><creationdate>2018</creationdate><topic>bitcoin</topic><topic>blockchain</topic><topic>ECDSA</topic><topic>Quantum computing</topic><topic>quantum resistance</topic><toplevel>online_resources</toplevel><creatorcontrib>Stewart, Iain</creatorcontrib><creatorcontrib>Ilie, Dragos</creatorcontrib><creatorcontrib>Zamyatin, Alexei</creatorcontrib><creatorcontrib>Werner, Sam</creatorcontrib><creatorcontrib>Torshizi, Maryam F.</creatorcontrib><creatorcontrib>Knottenbelt, William J.</creatorcontrib><collection>DataCite (Open Access)</collection><collection>DataCite</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Stewart, Iain</au><au>Ilie, Dragos</au><au>Zamyatin, Alexei</au><au>Werner, Sam</au><au>Torshizi, Maryam F.</au><au>Knottenbelt, William J.</au><format>book</format><genre>unknown</genre><ristype>DATA</ristype><title>Data from: Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack</title><date>2018-05-24</date><risdate>2018</risdate><abstract>Quantum computers are expected to have a dramatic impact on numerous
fields, due to their anticipated ability to solve classes of mathematical
problems much more efficiently than their classical counterparts. This
particularly applies to domains involving integer factorisation and
discrete logarithms, such as public key cryptography. In this paper we
consider the threats a quantum-capable adversary could impose on Bitcoin,
which currently uses the Elliptic Curve Digital Signature Algorithm
(ECDSA) to sign transactions. We then propose a simple but slow
commit--delay--reveal protocol, which allows users to securely move their
funds from old (non-quantum-resistant) outputs to those adhering to a
quantum-resistant digital signature scheme. The transition protocol
functions even if ECDSA has already been compromised. While our scheme
requires modifications to the Bitcoin protocol, these can be implemented
as a soft fork.</abstract><pub>Dryad</pub><doi>10.5061/dryad.46vm261</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.5061/dryad.46vm261 |
ispartof | |
issn | |
language | eng |
recordid | cdi_datacite_primary_10_5061_dryad_46vm261 |
source | DataCite |
subjects | bitcoin blockchain ECDSA Quantum computing quantum resistance |
title | Data from: Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T02%3A12%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-datacite_PQ8&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.au=Stewart,%20Iain&rft.date=2018-05-24&rft_id=info:doi/10.5061/dryad.46vm261&rft_dat=%3Cdatacite_PQ8%3E10_5061_dryad_46vm261%3C/datacite_PQ8%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |