Skip to main content

Showing 1–3 of 3 results for author: Kearney, J J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.16965  [pdf, ps, other

    quant-ph cs.CR cs.NI

    Downtime Required for Bitcoin Quantum-Safety

    Authors: Jamie J. Pont, Joseph J. Kearney, Jack Moyler, Carlos A. Perez-Delgado

    Abstract: Quantum devices capable of breaking the public-key cryptosystems that Bitcoin relies on to secure its transactions are expected with reasonable probability within a decade. Quantum attacks would put at risk the entire Bitcoin network, which has an estimated value of around 500 billion USD. To prevent this threat, a proactive approach is critical. The only known way to prevent any such attack is to… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

  2. arXiv:2105.01821  [pdf, other

    quant-ph cs.CR cs.CY cs.ET cs.SI

    Quantum Advantage on Proof of Work

    Authors: Dan A. Bard, Joseph J. Kearney, Carlos A. Perez-Delgado

    Abstract: Proof-of-Work (PoW) is a fundamental underlying technology behind most major blockchain cryptocurrencies. It has been previously pointed out that quantum devices provide a computational advantage in performing PoW in the context of Bitcoin. Here we make the case that this quantum advantage extends not only to all existing PoW mechanisms, but to any possible PoW as well. This has strong consequence… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: 9 pages

  3. arXiv:2105.01815  [pdf, ps, other

    quant-ph cs.CR cs.CY cs.ET

    Vulnerability of Blockchain Technologies to Quantum Attacks

    Authors: Joseph J. Kearney, Carlos A. Perez-Delgado

    Abstract: Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub-routines. Some of these protocols, but not all, are open to quantum attacks. Here we ana… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: 16 pages

    Journal ref: Array, 10:100065, 2021