Entanglement?There is a real fear that quantum computing will upset the cryptographic basis of current blockchains; a quantum blockchain would remove that. In a paper from Del Rajan and Matt Visser from the School of Mathematics and Statistics, Victoria University of Wellington in New Zealand they examine a solution.

Matt Visser
Matt Visser

Our method involves encoding the blockchain into a temporal GHZ (Greenberger–Horne–Zeilinger) state of photons that do not simultaneously coexist. It is shown that the entanglement in time, as opposed to an entanglement in space, provides the crucial quantum advantage. All the subcomponents of this system have already been shown to be experimentally realized. Perhaps more shockingly, our encoding procedure can be interpreted as non-classically influencing the past; hence this decentralized quantum blockchain can be viewed as a quantum networked time machine.

The problem for conventional cryptography

Cryptography is the basis for current blockchains. Without cryptography, blockchains lose many of their most attractive attributes – including assurance that nohing has changed.

Public key cryptography underpins most online communications and most current blockchain technology. This exploits a pair of keys to encrypt information:

  • a public key which is shareable
  • a private key known only to the key’s owner.

Anyone can encrypt a message using the intended receiver’s public key. Only the receiver can decrypt the message using her private key and the more difficult it is to determine a private key from its public key, the more secure the system.

Today the best public key cryptography systems mean a traditional computer must calculate the factors which comprise the keys. Thus far the complexity exceeds their ability to do this in much less than some billions of years.

The quantum blockchain problem

If, however, processing power were to increase by some massive factor, then it might become possible for an entity possessing such computing power to generate a private key from the corresponding public key. If actors could generate private keys from corresponding public keys, then even the strongest forms of traditional public key cryptography become vulnerable, including blockchains.

Enter quantum computing. Quantum computing relies on quantum physics. On a theoretical basis quantum computing may offer more calculating power than any traditional form of computing.

Quantum computing takes advantage of quantum bits (qubits). Enterprise Times will not delve further into the technicalities) but the implication is that, with quantum computing, it becomes possible to break public key cryptography. (Google and IBM , and others, are working on quantum computing.)

What do Rajan and Visser add?

In their own words: “For an analysis of the quantum benefit, we look primarily at the blockchain’s ability to be rendered tamper proof. With just a spatial GHZ state, the measurement correlations of these states are stronger than what a classical system could ever produce. In this spatial entanglement case, if an attacker tries to tamper with any photon, the full blockchain would be invalidated immediately; this already provides a benefit over the classical case where only the future blocks of the tampered block are invalidated. The temporal GHZ blockchain adds a far greater benefit in that the attacker cannot even attempt to access the previous photons since they no longer exist. They can at best try to tamper with the last remaining photon, which would invalidate the full state.

Hence in this application of quantum information, we see that the entanglement in time provides a far greater security benefit than an entanglement in space. The temporal GHZ state involves an entanglement between photons that do not share simultaneous coexistence, yet they share non-classical measurement correlations. This temporal non-locality, between two entangled photons that existed at different times, was interpreted in as follows: “…measuring the last photon affects the physical description of the first photon in the past, before it has even been measured. Thus, the “spooky action” is steering the system’s past”.

Stated more shockingly, in our quantum blockchain, we can interpret our encoding procedure as linking the current records in a block, not to a record of the past, but linking it to the actual record in the past, which does not exist anymore.

Enterprise Times: what does this mean

If it is a fact that blockchain concepts, never mind implementations, are stunningly complex to comprehend, then adding a quantum dimension makes the head spin – unless you are a quantum mathematician. This makes deriving practical conclusions difficult. That said there are some obvious points to make:

  • current blockchains are public key cryptography dependent
  • blockchains will become vulnerable IF any form of quantum computing arrives (imagine if that is the NSA or its Russian or Chinese equivalents – and it only has to be one, once)
  • Rajan and Visser are not offering a working solution, more some valuable insights
  • quantum cryptography will become a necessity (something that IBM and Google are researching)
  • most enterprise executives will have to depend on areas of mathematics which the ordinary mortal cannot approach, never mind understand.

There is a tricky chicken and egg situation here. It would be preferable if models for unbreakable quantum cryptography arrive before quantum computers. The demand for a quantum blockchain to use entanglement in time has many attractions.

 

 

 

Previous articleThe digital age needs a new set of healthcare leaders
Next articleScientists to get own blockchain service via Peerwith
Charles Brett
Charles Brett is a business/technology analyst consultant. His specialist areas include enterprise software, blockchain and enterprise mobility tech (including metering). Specific industry sectors of interest and experience include finance (especially systems supporting wholesale finance), telecommunications and energy. Charles has spoken at multiple industry conferences, has written for numerous publications (including the London Times and the Financial Times). He was the General Chair of the bi-annual High Performance Systems Workshop, 2005. In addition he is an author and novelist. His Technology books include: Making the Most of Mobility Vol I (eBook, 2012); Explaining iTunes, iPhones and iPads for Windows Users (eBook, 2011); 5 Axes of Business Application Integration (2004). His published novels, in the Corruption Series, include: The HolyPhone Confessional Crisis, Corruption’s Price: A Spanish Deceit and Virginity Despoiled. The fourth in The Corruption Series - Resurrection - has is now available. Charles has a B.A. and M.A in Modern History from the University of Oxford. He has lived or worked in Italy, Abu Dhabi, South Africa, California and New York, Spain, Israel, Estonia and Cyprus.

LEAVE A REPLY

Please enter your comment!
Please enter your name here