Details

Quantum Blockchain


Quantum Blockchain

An Emerging Cryptographic Paradigm
1. Aufl.

von: Rajesh Kumar Dhanaraj, Vani Rajasekar, SK Hafizul Islam, Balamurugan Balusamy, Ching-Hsien Hsu

173,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 21.06.2022
ISBN/EAN: 9781119836711
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>QUANTUM BLOCKCHAIN</b></p> <p><b>While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography for engineering researchers and students in the realm of information security.</b></p> <p>Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. By utilizing unique quantum features of nature, quantum cryptography methods offer everlasting security.</p> <p>The applicability of quantum cryptography is explored in this book. It describes the state-of-the-art of quantum blockchain techniques and sketches how they can be implemented in standard communication infrastructure. Highlighting a wide range of topics such as quantum cryptography, quantum blockchain, post-quantum blockchain, and quantum blockchain in Industry 4.0, this book also provides the future research directions of quantum blockchain in terms of quantum resilience, data management, privacy issues, sustainability, scalability, and quantum blockchain interoperability. Above all, it explains the mathematical ideas that underpin the methods of post-quantum cryptography security.</p> <p>Readers will find in this book a comprehensiveness of the subject including:</p> <ul> <li>The key principles of quantum computation that solve the factoring issue.</li> <li>A discussion of a variety of potential post-quantum public-key encryption and digital signature techniques.</li> <li>Explanations of quantum blockchain in cybersecurity, healthcare, and Industry 4.0.</li> </ul> <p><b>Audience </b></p> <p>The book is for security analysts, data scientists, vulnerability analysts, professionals, academicians, researchers, industrialists, and students working in the fields of (quantum) blockchain, cybersecurity, cryptography, and artificial intelligence with regard to smart cities and Internet of Things.</p>
<p>Preface xix</p> <p><b>1 Introduction to Classical Cryptography 1<br /> </b><i>Vani Rajasekar, Premalatha J., Rajesh Kumar Dhanaraj and Oana Geman</i></p> <p>1.1 Introduction 2</p> <p>1.2 Substitution Ciphers 2</p> <p>1.3 Transposition Cipher 8</p> <p>1.4 Symmetric Encryption Technique 10</p> <p>1.5 Asymmetric Encryption Technique 17</p> <p>1.6 Digital Signatures 22</p> <p>References 28</p> <p><b>2 Quantum Cryptographic Techniques 31<br /> </b><i>Malathy S., Santhiya M. and Rajesh Kumar Dhanaraj</i></p> <p>2.1 Post-Quantum Cryptography 32</p> <p>2.2 Strength of Quantum Cryptography 32</p> <p>2.3 Working Principle of Quantum Cryptography 32</p> <p>2.4 Example of Quantum Cryptography 33</p> <p>2.5 Fundamentals of Quantum Cryptography 34</p> <p>2.6 Problems With the One-Time Pad and Key Distribution 35</p> <p>2.7 Quantum No-Cloning Property 36</p> <p>2.8 Heisenberg Uncertainty Principle 37</p> <p>2.9 Quantum Key Distribution 38</p> <p>2.10 Cybersecurity Risks Prevailing in Current Cryptographic Techniques 39</p> <p>2.11 Implementation of Quantum-Safe Cryptography 40</p> <p>2.12 Practical Usage of Existing QKD Solutions 41</p> <p>2.13 Attributes of Quantum Key Distribution 41</p> <p>2.14 Quantum Key Distribution Protocols 44</p> <p>2.15 Applications of Quantum Cryptography 49</p> <p>2.16 Conclusion 52</p> <p>References 52</p> <p><b>3 Evolution of Quantum Blockchain 55<br /> </b><i>Dinesh Komarasamy and Jenita Hermina J.</i></p> <p>3.1 Introduction of Blockchain 55</p> <p>3.2 Introduction of Quantum Computing 62</p> <p>3.3 Restrictions of Blockchain Quantum 65</p> <p>3.4 Post-Quantum Cryptography Features 72</p> <p>3.5 Quantum Cryptography 73</p> <p>3.6 Comparison Between Traditional and Quantum-Resistant Cryptosystems 76</p> <p>3.7 Quantum Blockchain Applications 77</p> <p>3.8 Blockchain Applications 77</p> <p>3.9 Limitations of Blockchain 78</p> <p>3.10 Conclusion 79</p> <p>References 79</p> <p><b>4 Development of the Quantum Bitcoin (BTC) 83<br /> </b><i>Gaurav Dhuriya, Aradhna Saini and Prashant Johari</i></p> <p>4.1 Introduction of BTC 84</p> <p>4.2 Extract 87</p> <p>4.3 Preservation 89</p> <p>4.4 The Growth of BTC 97</p> <p>4.5 Quantum Computing (History and Future) 98</p> <p>4.6 Quantum Computation 99</p> <p>4.7 The Proposal of Quantum Calculation 101</p> <p>4.8 What Are Quantum Computers and How They Exertion? 102</p> <p>4.9 Post-Quantum Cryptography 104</p> <p>4.10 Difficulties Facing BTC 105</p> <p>4.11 Conclusion 106</p> <p>References 107</p> <p><b>5 A Conceptual Model for Quantum Blockchain 109<br /> </b><i>Vijayalakshmi P., Abraham Dinakaran and Korhan Cengiz</i></p> <p>5.1 Introduction 110</p> <p>5.2 Distributed Ledger Technology 110</p> <p>5.3 Hardware Composition of the Quantum Computer 115</p> <p>5.4 Framework Styles of Quantum Blockchain 115</p> <p>5.5 Fundamental Integrants 122</p> <p>5.6 Conclusion 124</p> <p>References 124</p> <p><b>6 Challenges and Research Perspective of Post–Quantum Blockchain 127<br /> </b><i>Venu K. and Krishnakumar B.</i></p> <p>6.1 Introduction 128</p> <p>6.2 Post–Quantum Blockchain Cryptosystems 136</p> <p>6.3 Post–Quantum Blockchain Performance Comparison 154</p> <p>6.4 Future Scopes of Post–Quantum Blockchain 168</p> <p>6.5 Conclusion 170</p> <p>References 170</p> <p><b>7 Post-Quantum Cryptosystems for Blockchain 173<br /> </b><i>K. Tamil Selvi and R. Thamilselvan</i></p> <p>7.1 Introduction 174</p> <p>7.2 Basics of Blockchain 174</p> <p>7.3 Quantum and Post-Quantum Cryptography 177</p> <p>7.4 Post-Quantum Cryptosystems for Blockchain 180</p> <p>7.5 Other Cryptosystems for Post-Quantum Blockchain 195</p> <p>7.6 Conclusion 196</p> <p>References 199</p> <p><b>8 Post-Quantum Confidential Transaction Protocols 201<br /> </b><i>R. Manjula Devi, P. Keerthika, P. Suresh, R. Venkatesan, M. Sangeetha, C. Sagana and K. Devendran</i></p> <p>8.1 Introduction 201</p> <p>8.2 Confidential Transactions 202</p> <p>8.3 Zero-Knowledge Protocol 203</p> <p>8.4 Zero-Knowledge Protocols 212</p> <p>8.5 Transformation Methods 216</p> <p>8.6 Conclusion 217</p> <p>References 218</p> <p><b>9 A Study on Post-Quantum Blockchain: The Next Innovation for Smarter and Safer Cities 221<br /> </b><i>G.K. Kamalam and R.S. Shudapreyaa</i></p> <p>9.1 Blockchain: The Next Big Thing in Smart City Technology 222</p> <p>9.2 Application of Blockchain Technology in Smart Cities 226</p> <p>9.3 Using Blockchain to Secure Smart Cities 228</p> <p>9.4 Blockchain Public Key Security 231</p> <p>9.5 Quantum Threats on Blockchain Enabled Smart City 233</p> <p>9.6 Post-Quantum Blockchain–Based Smart City Solutions 235</p> <p>9.7 Quantum Computing Fast Evolution 236</p> <p>9.8 Conclusion 238</p> <p>References 239</p> <p><b>10 Quantum Protocols for Hash-Based Blockchain 241<br /> </b><i>Sathya K., Premalatha J., Balamurugan Balusamy and Sarumathi Murali</i></p> <p>10.1 Introduction 242</p> <p>10.2 Consensus Protocols 242</p> <p>10.3 Quantum Blockchain 246</p> <p>10.4 Quantum Honest-Success Byzantine Agreement (QHBA) Protocol 255</p> <p>10.5 MatRiCT Protocol 258</p> <p>10.6 Conclusion 261</p> <p>References 261</p> <p><b>11 Post-Quantum Blockchain–Enabled Services in Scalable Smart Cities 263<br /> </b><i>Kumar Prateek and Soumyadev Maity</i></p> <p>11.1 Introduction 264</p> <p>11.2 Preliminaries 267</p> <p>11.3 Related Work 273</p> <p>11.4 Background of Proposed Work 274</p> <p>11.5 Proposed Work 278</p> <p>11.6 Conclusion 287</p> <p>References 288</p> <p><b>12 Security Threats and Privacy Challenges in the Quantum Blockchain: A Contemporary Survey 293<br /> </b><i>K. Sentamilselvan, Suresh P., Kamalam G. K., Muthukrishnan H., Logeswaran K. and Keerthika P.</i></p> <p>12.1 Introduction 294</p> <p>12.2 Types of Blockchain 297</p> <p>12.3 Quantum Blockchain: State of the Art 298</p> <p>12.4 Voting Protocol 303</p> <p>12.5 Security and Privacy Issues in Quantum Blockchain 306</p> <p>12.6 Challenges and Research Perspective in Quantum Blockchain 308</p> <p>12.7 Security Threats in Quantum Blockchain 310</p> <p>12.8 Applications of Quantum Blockchain 311</p> <p>12.9 Characteristics of Post-Quantum Blockchain Schemes 313</p> <p>12.10 Conclusion 314</p> <p>References 314</p> <p><b>13 Exploration of Quantum Blockchain Techniques Towards Sustainable Future Cybersecurity 317<br /> </b><i>H. Muthukrishnan, P. Suresh, K. Logeswaran and K. Sentamilselvan</i></p> <p>13.1 Introduction to Blockchain 318</p> <p>13.2 Insights on Quantum Computing 322</p> <p>13.3 Quantum Computing Algorithms 332</p> <p>13.4 Quantum Secured Blockchain 333</p> <p>13.5 Conclusion 339</p> <p>References 339</p> <p><b>14 Estimation of Bitcoin Price Trends Using Supervised Learning Approaches 341<br /> </b><i>Prasannavenkatesan Theerthagiri</i></p> <p>14.1 Introduction 341</p> <p>14.2 Related Work 343</p> <p>14.3 Methodology 344</p> <p>14.4 Implementation of the Proposed Work 349</p> <p>14.5 Results Evaluation and Discussion 352</p> <p>14.6 Conclusion 353</p> <p>References 353</p> <p>Index 357</p>
<p><b>Rajesh Kumar Dhanaraj, PhD,</b> is a Professor in the School of Computing Science and Engineering at Galgotias University, Greater Noida, India. He has contributed around 25 authored and edited books on various technologies, 17 patents, and more than 40 articles and papers in various refereed journals and international conferences. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE).</p> <p><b>Vani Rajasekar,</b> is an assistant professor in the Department of Computer Science and Engineering at Kongu Engineering College, India, and is pursuing her PhD in information and communication engineering. She has authored and co-authored around 40 international and national journals, books, and book chapters.</p> <p><b>SK Hafizul Islam, PhD,</b> is currently an assistant professor in the Department of Computer Science and Engineering, Indian Institute of Information Technology Kalyani, West Bengal, India.</p> <p><b>Balamurugan Balusamy, PhD,</b> is a professor in the School of Computing Science and Engineering, Galgotias University, Greater Noida, India. He is a Pioneer Researcher in the areas of big data and the IoT and has published more than 70 articles in various top international journals.</p> <p><b>Ching-Hsien Hsu, PhD,</b> is Chair Professor of the College of Information and Electrical Engineering; Director of Big Data Research Center, Asia University, Taiwan. He is the Chair of the IEEE Technical Committee on Cloud Computing (TCCLD) and Fellow of the IET.</p>
<p><b>While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography for engineering researchers and students in the realm of information security.</b></p> <p>Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. By utilizing unique quantum features of nature, quantum cryptography methods offer everlasting security. <p>The applicability of quantum cryptography is explored in this book. It describes the state-of-the-art of quantum blockchain techniques and sketches how they can be implemented in standard communication infrastructure. Highlighting a wide range of topics such as quantum cryptography, quantum blockchain, post-quantum blockchain, and quantum blockchain in Industry 4.0, this book also provides the future research directions of quantum blockchain in terms of quantum resilience, data management, privacy issues, sustainability, scalability, and quantum blockchain interoperability. Above all, it explains the mathematical ideas that underpin the methods of post-quantum cryptography security. <p>Readers will find in this book a comprehensiveness of the subject including: <ul><li>The key principles of quantum computation that solve the factoring issue. </li> <li>A discussion of a variety of potential post-quantum public-key encryption and digital signature techniques.</li> <li>Explanations of quantum blockchain in cybersecurity, healthcare, and Industry 4.0.</li></ul> <p><b>Audience </b> <p>The book is for security analysts, data scientists, vulnerability analysts, professionals, academicians, researchers, industrialists, and students working in the fields of (quantum) blockchain, cybersecurity, cryptography, and artificial intelligence with regard to smart cities and Internet of Things.

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €