A novel quantum blockchain scheme base on quantum entanglement and DPoS

  • PDF / 355,005 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 37 Downloads / 160 Views

DOWNLOAD

REPORT


A novel quantum blockchain scheme base on quantum entanglement and DPoS Yu-Long Gao1 · Xiu-Bo Chen1,2 Yi-Xian Yang1,2

· Gang Xu3 · Kai-Guo Yuan1 · Wen Liu4,5 ·

Received: 2 December 2019 / Accepted: 26 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract In this paper, a novel quantum blockchain scheme is proposed to optimize the security of blockchain. Firstly, we propose the definition of quantum blockchain and provide its construction in detail. Additionally, its advantages are also summarized in this work. Secondly, based on the quantum no-cloning theorem, we define a new type of cryptocurrency which we call it quantum coin. Meanwhile, we adopt quantum entanglement and DPoS to design a novel quantum blockchain scheme. At last, we analyze the security of this proposed scheme in terms of the secret keys and quantum coin. It is shown that some attacks, such as man-in-the-middle attack, double spending attack and state-estimation attack, can be resisted. More specifically, under quantum computing attacks, the scheme is also secure. To sum up, through the principles of quantum cryptography and DPoS, this novel quantum blockchain obviously provides better security and higher efficiency. Keywords Blockchain · Quantum cryptography · Bell state · Quantum entanglement · DPoS

B

Xiu-Bo Chen [email protected]

1

Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China

2

Guizhou Provincial Key Laboratory of Public Big Data, GuiZhou University, Guiyang 550025, Guizhou, China

3

School of Information Science and Technology, North China University of Technology, Beijing 100144, China

4

State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing, China

5

School of Computer Science and Cybersecurity, Communication University of China, Beijing 100024, China 0123456789().: V,-vol

123

420

Page 2 of 15

Y.-L. Gao et al.

1 Introduction In 2008, blockchain [1] was firstly described. In general, it is a new de-trusted, transparent and distributed ledger technology. In this new chain structure, every generated block has to include a cryptographic hash value of its previous block. Then, according to a certain consensus mechanism algorithms, such as proof of stake (PoS), delegated proof of stake (DPoS) and proof of work (PoW), the new generated block is agreed by all nodes in this distributed network. By this way, a continuously growing chain of blocks is generated. Subsequently, in 2014, by implementing smart contract, Ethereum blockchain [2, 3] was designed which is more practical than before. In general, smart contract provides a built-in fully fledged Turing-complete programming language for Ethereum blockchain, so that we can easily upload and execute contracts on the blockchain. By the way, it maximumly expands the potential application for blockchain technology. More importantly, cryptography algorithm plays a specifically import