{"title":"量子安全区块链安全基础设施研究","authors":"Arya Wicaksana","doi":"10.1016/j.cosrev.2025.100752","DOIUrl":null,"url":null,"abstract":"<div><div>Security infrastructure is vital in blockchain for its decentralized and distributed characteristics. Blockchain security infrastructure comprises several components: cryptographic algorithms, consensus protocols, key and identity management, network architecture, and smart contract deployment and execution. These components are vulnerable to the advancement of quantum computing and the realization of more powerful quantum computers. Classical security countermeasures used across the entire blockchain security infrastructure are exposed to quantum computing attacks. The exploitation is catastrophic to the sustainability of blockchain research and applications. This paper outlines the blockchain security infrastructure and quantum-safe solutions. The promising quantum-resistant cryptographic algorithms released by the National Institute of Standards and Technology (NIST) are evaluated for their relevance and use in blockchain security infrastructure. This paper also discusses the practical implementation and adoption of quantum-safe solutions for blockchain security infrastructure, including recent developments on the quantum-safe blockchain. The holy grail in adopting quantum-safe solutions for blockchain security infrastructure solutions is without sacrificing scalability and decentralization.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100752"},"PeriodicalIF":13.3000,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A survey on quantum-safe blockchain security infrastructure\",\"authors\":\"Arya Wicaksana\",\"doi\":\"10.1016/j.cosrev.2025.100752\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Security infrastructure is vital in blockchain for its decentralized and distributed characteristics. Blockchain security infrastructure comprises several components: cryptographic algorithms, consensus protocols, key and identity management, network architecture, and smart contract deployment and execution. These components are vulnerable to the advancement of quantum computing and the realization of more powerful quantum computers. Classical security countermeasures used across the entire blockchain security infrastructure are exposed to quantum computing attacks. The exploitation is catastrophic to the sustainability of blockchain research and applications. This paper outlines the blockchain security infrastructure and quantum-safe solutions. The promising quantum-resistant cryptographic algorithms released by the National Institute of Standards and Technology (NIST) are evaluated for their relevance and use in blockchain security infrastructure. This paper also discusses the practical implementation and adoption of quantum-safe solutions for blockchain security infrastructure, including recent developments on the quantum-safe blockchain. The holy grail in adopting quantum-safe solutions for blockchain security infrastructure solutions is without sacrificing scalability and decentralization.</div></div>\",\"PeriodicalId\":48633,\"journal\":{\"name\":\"Computer Science Review\",\"volume\":\"57 \",\"pages\":\"Article 100752\"},\"PeriodicalIF\":13.3000,\"publicationDate\":\"2025-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science Review\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1574013725000280\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000280","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A survey on quantum-safe blockchain security infrastructure
Security infrastructure is vital in blockchain for its decentralized and distributed characteristics. Blockchain security infrastructure comprises several components: cryptographic algorithms, consensus protocols, key and identity management, network architecture, and smart contract deployment and execution. These components are vulnerable to the advancement of quantum computing and the realization of more powerful quantum computers. Classical security countermeasures used across the entire blockchain security infrastructure are exposed to quantum computing attacks. The exploitation is catastrophic to the sustainability of blockchain research and applications. This paper outlines the blockchain security infrastructure and quantum-safe solutions. The promising quantum-resistant cryptographic algorithms released by the National Institute of Standards and Technology (NIST) are evaluated for their relevance and use in blockchain security infrastructure. This paper also discusses the practical implementation and adoption of quantum-safe solutions for blockchain security infrastructure, including recent developments on the quantum-safe blockchain. The holy grail in adopting quantum-safe solutions for blockchain security infrastructure solutions is without sacrificing scalability and decentralization.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.