Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search

12/30/2020
by   Alexandru Cojocaru, et al.
0

Bitcoin and its underlying blockchain protocol have recently received significant attention in the context of building distributed systems as well as from the perspective of the foundations of the consensus problem. At the same time, the rapid development of quantum technologies brings the possibility of quantum computing devices from a theoretical conception to an emerging technology. Motivated by this, in this work, we revisit the formal security of the core of the Bitcoin protocol, called Bitcoin backbone, in the presence of quantum adversaries – i.e. adversaries equipped with quantum computers. We show that the security of the bitcoin holds as long as the quantum computational hashing power of the adversary in the Quantum Random Oracle model is appropriately bounded. We analyze the quantum query complexity of a Chain-of-Proofs-of-Work search problem, problem that is at the core of the blockchain protocol, which in turn is related to the complexity of a multi-solution Bernoulli search problem. The query complexity of the latter is performed using a modification of the Zhandry's recording technique (Crypto '19) and can be of independent interest. Our analysis indicates that the security of the Bitcoin backbone protocol is guaranteed provided that the number of adversarial quantum queries is bounded, such that each quantum query is worth O(p^-1/2) classical ones, where p is the probability of success of a single classical query to the protocol's underlying hash function. Perhaps surprisingly, the wait time for safe settlement in the case of quantum adversaries matches (up to a constant) the safe settlement time in the setting of classical adversaries and thus does not result in any further overhead.

READ FULL TEXT
research
11/12/2017

Bitcoin and quantum computing

Bitcoin is a digital currency and payment system based on classical cryp...
research
08/21/2023

Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher

The Even-Mansour (EM) cipher is one of the famous constructions for a bl...
research
07/07/2020

Lower Bounds for XOR of Forrelations

The Forrelation problem, introduced by Aaronson [A10] and Aaronson and A...
research
01/10/2019

Redactable Blockchain in the Permissionless Setting

Bitcoin is an immutable permissionless blockchain system that has been e...
research
10/02/2021

Conditions for Advantageous Quantum Bitcoin Mining

Our aim is to determine conditions for quantum computing technology to g...
research
10/22/2020

On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work

We revisit the so-called compressed oracle technique, introduced by Zhan...
research
05/05/2021

Quantum Advantage on Proof of Work

Proof-of-Work (PoW) is a fundamental underlying technology behind most m...

Please sign up or login with your details

Forgot password? Click here to reset