Position: Home page » Virtual » Quantum encryption technology and virtual currency

Quantum encryption technology and virtual currency

Publish: 2021-05-21 22:26:01
1. One of the key technologies of digital currency is elliptic curve encryption, which is the core technology of digital signature of cryptocurrency. It can ensure the ownership, non plication and transaction integrity of cryptocurrency. But with the advent of quantum computers, it will no longer be secure. The quantum attack of quantum computer can solve the underlying mathematical problems, and the digital signature based on elliptic curve encryption can be forged. This is fatal for cryptocurrency, because the records of distributed ledger can not be tampered with and reversed. If elliptic curve encryption can be broken, then the security foundation of cryptocurrency will no longer exist.
2. Most of the existing cryptocurrencies use elliptic curve cryptography, and elliptic curve cryptography may be cracked by quantum computer in 5-10 years. In order to resist quantum attack, Abe / ABI upgraded the existing encryption algorithm, and upgraded elliptic curve cryptography to lattice cryptography. Abe proposes lattice based linkable ring signature, and lattice based cryptography is one of the most effective methods against quantum computing attacks..
3. Legal tender is only RMB!!!
4.

bus line: Guangfo line → guang565 Road, the whole journey is about 42.0km

1. Walk about 210m from Foshan zumiao station to zumiao station

2. Take Guangfo line, pass 10 stops, reach Xilang station

3. Walk about 290m, reach Xilang station

4. Take guang565 Road, pass 33 stops, reach the broad living area station

5. Walk about 1.4km, Arrive at the science and technology cinema of Guangdong Science Center

5. With the emergence of
quantum computer, quantum attack of quantum computer can solve the underlying mathematical problems, and the security foundation of cryptocurrency no longer exists. It is necessary for cryptocurrency to start to promote the anti quantum attack scheme. Abe /
Abby
in order to combat quantum attacks, we upgrade the existing
encryption algorithm
, and upgrade the
elliptic curve
cryptography technology
to lattice cryptography technology.
6. Quantum cryptography is the combination of cryptography and quantum mechanics, which
utilizes the quantum properties of the system. In 1970, Wiener, an American scientist, first thought of applying quantum physics to cryptography. In 1984, Bennett and blasard proposed the first scheme of quantum cryptography, which is called BB84 scheme. In 1992, Bennett put forward a more simple and efficient scheme, namely B92 scheme. Quantum cryptography is not used to transmit ciphertext, but to establish and transmit codebook
quantum cryptography system is based on the following basic principles: quantum complementarity principle (or quantum uncertainty principle), quantum non cloning and non erasable principle, thus ensuring the indecipherability of quantum cryptography system
quantum complementary principle. The Heisenberg uncertainty relation
system shows that the mechanical quantities of two operators' incompatibility cannot be determined at the same time
therefore, for the measurement of two noncommutative mechanical quantities of a quantum system,
the uncertainty relation determines that their fluctuation cannot be zero at the same time.
in a quantum state, if the value of a mechanical quantity is completely determined,
(fluctuation is zero), then the value of its noncommutative mechanical quantity is completely
uncertain. In this way, the measurement of a quantum system will inevitably cause
interference to the system, and the measurement can only obtain the incomplete information of the
state of the system before measurement. Therefore, any
eavesdropping on the coherent channel of quantum system will lead to inevitable interference, which will be immediately discovered by the cooperative users of communication; The existence of complementarity enables us to
co encode information, so as to ensure the secure communication mode
quantum non cloning theorem. The linear property of quantum mechanics makes it impossible to an unknown quantum state accurately. The quantum irrecible
lon theorem guarantees that the classical physical method of cryptanalysis by accurately ing the key is completely invalid for the quantum cryptography system based on single photon technology
the incompletely erasable theorem of a single quantum. Quantum coherence does not allow the carrier of information, a quantum state, to be arbitrarily copied and erased like the 0,1 classical information stored on the carrier of classical information.
7.

According to reports, a few days ago, some experts said that the traditional encryption technology uses a key: the sender uses one key to encode the information, and the receiver uses another key to decode the information. However, such a key may be leaked, which will inevitably lead to eavesdropping. Quantum encryption communication has higher security

quantum communication may also be used in virtual currency anti-counterfeiting and quantum fingerprint identification. In the future, quantum networks will connect distributed quantum sensors for global earthquake monitoring. Within 5-10 years, it is expected to develop reliable photon sources and related technologies, realize long-distance quantum information transmission, and promote the theoretical research of data sharing protocol between quantum processors

hope quantum communication can develop rapidly and be applied to life

8.

Fourth, quantum computing is to encode and manipulate data through superposition principle and quantum entanglement. In the past few decades, quantum computing only exists in theory, but in recent years, meaningful results have begun to appear. We have developed and verified a variety of quantum algorithms, and developed the prototype of quantum computer experiment. In the next five to 15 years, we are likely to make a quantum computer with practical significance

the emergence of quantum computer will bring great progress to climate simulation, drug research, materials science and other scientific research fields. However, quantum cryptography is the most anticipated. A quantum computer will be able to crack all the current encryption methods, and quantum encryption will be truly impeccable< br />

9.

In these areas: QIS in sensing and metrology, quantum cryptography communication, quantum simulation, quantum computing

quantum sensing and measurement: many uses

There are many uses of QIS in the field of sensing and measurement

using entanglement, different quantum systems can be connected to each other, and the measurement of one system will affect the results of another system, even if these systems are physically separated. The two quantum systems are in slightly different environments and can provide information about the environment through mutual interference. Theoretically, the sensing performance of this kind of atomic interferometer is several orders of magnitude higher than that of traditional technology. In addition to inertial navigation, atomic interferometer can also be converted into gravimeter, and used for earth system monitoring and mineral precise positioning. Quantum timing devices, such as the quantum logic clock developed by NIST, are one of the most accurate timing devices in the world. Photon source and single photon detection technology can improve the calibration accuracy of photodetectors and can be used to detect trace elements

quantum encryption communication: higher security

traditional encryption technology uses key: the sender uses one key to encode the information, and the receiver uses another key to decode the information, but such key may be leaked, which will inevitably be eavesdropped. However, information can be encrypted by quantum key distribution (QKD). In QKD, the information about the key is sent by randomly polarized photons, which limits the photons to vibrate in only one plane. If the eavesdropper measures the information, the quantum state will collapse! Only the person with the exact quantum key can decrypt the information

quantum communication can also be used in virtual currency security and quantum fingerprint identification. In the future, quantum networks will connect distributed quantum sensors for global earthquake monitoring. Within 5-10 years, it is expected to develop reliable photon sources and related technologies, realize long-distance quantum information transmission, and promote the theoretical research of data sharing protocol between quantum processors

quantum simulation: modeling materials are most likely

quantum simulators use easily manipulated quantum systems to study the properties of other quantum systems that are difficult to study directly. Modeling chemical reactions and materials is one of the most possible applications of quantum simulation. Researchers can study millions of dollars of candidate materials in computers, instead of spending years and hundreds of millions of dollars to proce and characterize only a small amount of materials. Whether the goal is stronger polymer materials for aircraft, more effective automotive catalytic converters, better solar cell materials and medical procts, or more breathable fibers, the acceleration of development will bring great value

the prototype of quantum simulator based on different technologies has been verified in the laboratory environment

quantum computing: the future research of magic power

quantum computing is to realize the coding and manipulation of data through the superposition principle and the characteristics of quantum entanglement and other subatomic particles. In the past few decades, quantum computing only exists in theory, but in recent years, meaningful results have begun to appear. We have developed and verified a variety of quantum algorithms, and developed the prototype of quantum computer experiment. In the next five to 15 years, we are likely to make a quantum computer with practical significance

the emergence of quantum computer will bring great progress to climate simulation, drug research, materials science and other scientific research fields. However, quantum cryptography is the most anticipated. A quantum computer will be able to crack all the current encryption methods, and quantum encryption will be truly impeccable< br/>

10. Scientists: the latest quantum encryption technology can't be cracked at all
scientists from Northwestern University in the United States claim that they have mastered the technology of encrypting information into codes by using the characteristics of light, and you can't crack it unless you violate the laws of nature.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750