Skip to main content
Log in

The quantum threat to blockchain: summary and timeline analysis

  • Research Article
  • Published:
Quantum Machine Intelligence Aims and scope Submit manuscript

Abstract

Blockchain technology has emerged in the last decade and has been increasingly adopted in real-world applications. It relies on several cryptographic techniques, namely cryptographic hashing and digital signatures, which are threatened by the development of quantum computers. Quantum computing can potentially implement algorithms which can invalidate assumptions underlying these systems, namely pre-image resistance, and the intractability of certain hidden subgroup problems. Several research works have investigated the nature of the threats posed by quantum computing to blockchain, and have proposed potential countermeasures to secure the systems. In this paper we will analyse the timeline along which such threats are likely to become real for blockchain implementations, and assess the level of threat posed given the proposed countermeasures. After providing a reasoned summary of the quantum computing threats to blockchain and possible solutions, we discuss the time frame within which, by integrating the insights provided by recent research on their evolution, quantum computers may become mature enough to support the implementation of algorithms that could actually break the current public blockchain implementations, like Bitcoin.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Availability of data and materials

The submission has no data or other materials to be made available.

References

  • Aaronson S, Arkhipov A (2011) The computational complexity of linear optics. In: Proceedings of the forty-third annual ACM symposium on Theory of computing. pp 333–342

  • Aggarwal D, Brennen G, Lee T, et al (2018) Quantum attacks on bitcoin, and how to protect against them. Ledger 3

  • Aono Y, Liu S, Tanaka T, et al (2022) The present and future of discrete logarithm problems on noisy quantum computers. IEEE Trans Quantum Eng

  • Arikan E (2003) An information-theoretic analysis of grover’s algorithm. In: Quantum Communication and Information Technologies. Springer, p 339–347

  • Arute F, Arya K, Babbush R et al (2019) Quantum supremacy using a programmable superconducting processor. Nature 574(7779):505–510

    Article  Google Scholar 

  • Barabasi S, Barrera J, Bhalani P, et al (2019) Student user experience with the ibm qiskit quantum computing interface. In: Future of Information and Communication Conference. Springer, pp 547–563

  • Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549(7671):188–194

    Article  Google Scholar 

  • Cacciapuoti AS, Caleffi M, Tafuri F et al (2019) Quantum internet: networking challenges in distributed quantum computing. IEEE Netw 34(1):137–143

    Article  Google Scholar 

  • Chow J, Dial O, Gambetta J (2021) Ibm quantum breaks the 100-qubit processor barrier. IBM Research Blog

  • Dennis R, Disso JP (2019) An analysis into the scalability of bitcoin and ethereum. In: Third International Congress on Information and Communication Technology. Springer, pp 619–627

  • Deutsch D, Jozsa R (1992) Rapid solution of problems by quantum computation. Proc R Soc Lond Ser A Math Phys Sci 439(1907):553–558

    MathSciNet  MATH  Google Scholar 

  • Devoret MH, Schoelkopf RJ (2013) Superconducting circuits for quantum information: an outlook. Science 339(6124):1169–1174

    Article  Google Scholar 

  • Edwards M, Mashatan A, Ghose S (2020) A review of quantum and hybrid quantum/classical blockchain protocols. Quantum Inf Process 19(6):1–22

    Article  MathSciNet  MATH  Google Scholar 

  • Ekert A, Jozsa R (1996) Quantum computation and shor’s factoring algorithm. Rev Mod Phys 68(3):733

    Article  MathSciNet  Google Scholar 

  • Fedorov AK, Kiktenko EO, Lvovsky AI (2018) Quantum computers put blockchain security at risk. Nature 563(7729):465–468

    Article  Google Scholar 

  • Fernandez-Carames TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091–21116

    Article  Google Scholar 

  • Friedman JR, Patel V, Chen W et al (2000) Quantum superposition of distinct macroscopic states. Nature 406(6791):43–46

    Article  Google Scholar 

  • Grimes RA (2019) Cryptography apocalypse: preparing for the day when quantum computing breaks today’s crypto. Wiley

  • Grover LK (1996) A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. pp 212–219

  • Horan K, Kahrobaei D (2018) The hidden subgroup problem and post-quantum group-based cryptography. In: International Congress on Mathematical Software. Springer, pp 218–226

  • Ikeda K (2018) Security and privacy of blockchain and quantum computation. In: Advances in Computers, vol 111. Elsevier, p 199–228

  • Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur 1(1):36–63

    Article  Google Scholar 

  • Kappert N, Karger E, Kureljusic M (2021) Quantum computing-the impending end for the blockchain? In: Pacific Asia Conference on Information Systems (PACIS). Dubai

  • Koshy P, Koshy D, McDaniel P (2014) An analysis of anonymity in bitcoin using p2p network traffic. In: International Conference on Financial Cryptography and Data Security. Springer, pp 469–485

  • Madsen LS, Laudenbach F, Askarani MF et al (2022) Quantum computational advantage with a programmable photonic processor. Nature 606(7912):75–81

    Article  Google Scholar 

  • Mosca M (2018) Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur Priv 16(5):38–41

    Article  Google Scholar 

  • Nakamoto S (2008) A peer-to-peer electronic cash system. Bitcoin. 4:2. https://bitcoin.org/bitcoin.pdf

  • Rodenburg B, Pappas SP (2017) Blockchain and quantum computing. Tech. rep., The MITRE Corporation

  • Sevilla J, Riedel CJ (2020) Forecasting timelines of quantum computing. arXiv preprint arXiv:2009.05045

  • Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332

    Article  MathSciNet  MATH  Google Scholar 

  • Skosana U, Tame M (2021) Demonstration of Shor’s factoring algorithm for N=21 on IBM quantum processors. Sci Rep 11(1):1–12

    Article  Google Scholar 

  • Stewart I, Ilie D, Zamyatin A et al (2018) Committing to quantum resistance: a slow defence for bitcoin against a fast quantum computing attack. R Soc Open Sci 5(6):180410

    Article  Google Scholar 

  • Zhong HS, Wang H, Deng YH et al (2020) Quantum computational advantage using photons. Science 370(6523):1460–1463

    Article  Google Scholar 

  • Zhu H (2001) Survey of computational assumptions used in cryptography broken or not by shor’s algorithm

Download references

Author information

Authors and Affiliations

Authors

Contributions

K.S. analysed the literature, developed the framework and wrote the main draft of the manuscript. M.C. supervised the project, provided background knowledge on blockchain technology, and revised the paper. All authors reviewed the manuscript.

Corresponding author

Correspondence to Marco Comuzzi.

Ethics declarations

Human and animal ethics

Not applicable

Consent for publication

All authors have checked the manuscript and agree with the submission.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Schärer, K., Comuzzi, M. The quantum threat to blockchain: summary and timeline analysis. Quantum Mach. Intell. 5, 19 (2023). https://doi.org/10.1007/s42484-023-00105-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42484-023-00105-4

Keywords

Navigation