TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Bitcoin’s race to outrun the quantum computer

73 点作者 benmunster1将近 6 年前

12 条评论

krastanov将近 6 年前
Just to be clear, this has barely anything to do with any crypto-currency organization. It is a really regrettable framing for an event that should be of great interest to anyone dealing with cryptography, not just the fairly restricted group of crypto-currentcy enthusiasts.<p>If <i></i>scalable<i></i> quantum computers can be built (which seems probable, as we are progressing fast in the number of qubits we can keep together), then certain restricted types of public key encryption will be broken by quantum hardware (all currently used public key encryption actually). We know other public key encryption algorithms exist that can run on classical computers and still not be broken by quantum computers. In many ways they are less tested and less practical, so for a while NIST has been sponsoring the development of such quantum-resistant running-on-classical-computers public-key algorithms. The usual name for this is post-quantum encryption.
评论 #20731581 未加载
评论 #20731401 未加载
评论 #20731479 未加载
评论 #20732329 未加载
评论 #20731538 未加载
lixtra将近 6 年前
&gt; Take the Bitcoin blockchain: an unencrypted public key is sent along with every bitcoin transaction, and left unencrypted during the time it takes for the network to confirm the block, around ten minutes.<p>My understanding is that it remains unencrypted forever. That’s why it is a public key. As long as the coins are not moved to another account that public key stays a valuable target.<p>Edit: As DennisP pointed out my understanding was wrong and indeed only the hash of the target is published until you make an transaction from an account.
评论 #20731779 未加载
评论 #20731426 未加载
ddtaylor将近 6 年前
It&#x27;s worth mentioning that Bitcoin addresses aren&#x27;t exposed on the blockchain as public keys, but hashes of the public keys. If you want to steal the coins you&#x27;ll need to turn ripemd160(sha256(sha256(publicKey))) into a private key. Good luck.
评论 #20731450 未加载
评论 #20732477 未加载
评论 #20731668 未加载
newbrict将近 6 年前
Problem includes far more than bitcoin.. Your bank for example
评论 #20731541 未加载
jeromebaek将近 6 年前
<i>&gt; Ah, but with the right quantum computer, able to process information at speeds exponentially faster than today’s supercomputers? Suddenly, what seems uncrackable becomes child’s play, able to be broken in under 10 minutes.</i><p>Cringe. Quantum computers are not &quot;able to process information at speeds exponentially faster than today&#x27;s supercomputers&quot;. They&#x27;re able to solve a very specific subset of problems which are hard for classical computers. A very specific subset, called BQP, mostly having to do with finding prime factors. NP hard problems are probably uncrackable with quantum computers.
dnprock将近 6 年前
I get that quantum computer can run faster with more states. But can someone with quantum computing experience explain how quantum computer can address exponential computation? Does it reduce exponential computation into polynomial?<p>My answer to the above question is no. Assuming a quantum computer has 10 states. Its running time for exponential algorithms is still exponential. A simple example: 2^10 is about 10^3. Still exponential.
bhouston将近 6 年前
Will breaking classic computer public key encryption reveal any secrets that were encoded prior to them being obsolete?<p>Should we be recording encrypted streams and saving them for a few years until we can break them? Is there any value in that?
评论 #20732299 未加载
评论 #20733589 未加载
johnwheeler将近 6 年前
What a deceptive article.<p>They take a crypto conference happening at a prestigious institution and sprinkle in some bitcoin punditry to make them seem related.
anm89将近 6 年前
&quot;The amount of time the universe itself has left—around 0.65 billion billion years.&quot;<p>Is this true?? I&#x27;ve never heard this claimed before.
评论 #20731634 未加载
评论 #20732744 未加载
EGreg将近 6 年前
This is a general problem with public keys, not just Bitcoin!!<p>One of the problems with current PKI is weakness in the face of quantum computers, leading to a new crop of algorithms being submitted to NIST, etc.<p>I wanted to ask whether the following simple scheme, based just on cryptographic hashes, can be used CONFIDENTLY, SECURELY and RELIABLY in many situations where Assymetric Key cryptography is used today, and in many others too, such as providing provably random polling etc. It is very similar to a One Time Pad but uses a cryptographic hash function to generate the OTP codes.<p>Here is the scheme: Everyone generates a random private key K[p] and store it just like any assymetric private key (encrypted with some non-stored derived key).<p>They use any cryptographic hash function that hasn’t had a serious preimage attack (perhaps even MD5?), hash it n (eg 10,000,000) times to get h[p][n], and publicly commit to that number. This is like a public key.<p>The hashes are long enough that it’s infeasible to reverse them. Key strengthening can be achieved by jumping a few onion layers between transactions.<p>If you start running out then you post a new public key, signed with one of your remaining onion layer codes. Any verifiers store the original public key per participant, and then can replace them with the new public key if it was properly signed by the old one, etc.<p>Use case: generating provably random numbers by mutually distrusting parties<p>Participants they gradually reveal their hashes, one onion layer per transaction. Each provably random seed is a function of the alphabetically smallest&#x2F;largest three of those hashes at the next onion layer. If not all of them reveal the hashes in time, they gossip, verify and agree on which ones are the smallest&#x2F;largest three before some cutoff point like “most reported that most reported”. That leaves tons of bits of entropy coming from everyone!<p>Use case: Authenticator Apps<p>The hash h[p][n+1] would be a hash of some substring of h[p][n] with enough bits that finding all chosen preimages (by an eavesdropper of the previous code) would be infeasible in advance. Perhaps 10 alphanumeric characters is enough. Also when displaying the code to enter, the authenticator app can tell the user a number from 1-100 indicating to the verifier how many onion layers to peel, making it harder to precompute the preimages. Or the user would have to enter the entire hash via the network-connected computer scanning a QR code, NFC or something. From a security standpoint, this method seems superior to the HOTP and TOTP schemes used in authenticator apps today, since there is no need to trust the verifier with any secret keys (<a href="https:&#x2F;&#x2F;www.ietf.org&#x2F;rfc&#x2F;rfc4226.txt" rel="nofollow">https:&#x2F;&#x2F;www.ietf.org&#x2F;rfc&#x2F;rfc4226.txt</a>) Also there is no need to sychronize clocks, since the client simply lets the server know how many times to run the hash, and increments that number every time.<p>Use case: Signing Payloads<p>Participants reveal a payload and commit to an HMAC signature by using cryptographic key at the next onion level, which at that point would be known only to them. All these signatures are collected into a blockchain block &#x2F; merkle tree timestamp &#x2F; similar thing, and it is sent to the participant before they reveal the onion key they used to sign it.<p>Use case: Off the Record Messaging<p>The Blockchain or Merkle tree is private between a few parties only, so once the next onion level is revealed, no participant can prove the payload was generated by a given participant, since all the onion hashes were known, any of them could generate a new valid tree with any payload history. They can only prove it to each other, or given enough “witnesses” attest to that tree, people might trust then on the basis of consensus of (presumably) mutually distrusting parties, but that’s not the same thing as cryptographic proof. But that is true of any OTR conversation.<p>Use case: Restoring Access<p>This can be used instead of Shamir Secret Key sharing. The server would have to store keys for every participant, and M of N participants would just sign that they approve authorization of some new session, some new key, or whatever. These signatures could be easily checked by anyone who has the public keys of the M participants who signed it.<p>Use case: Decrypting payloads<p>Not sure how one would do this one, to be honest. With PKI, someone could encrypt a payload that can only be decrypted by a private key holder. I see how to do signatures and HMAC, but not the other way.
jchanimal将近 6 年前
Finally a good use-case for bitcoin: a bounty for the first quantum computer to crack it.
评论 #20731791 未加载
评论 #20731624 未加载
rtempaccount1将近 6 年前
Whilst Quantum computing is an interesting topic, gotta say I think bitcoin&#x27;s challenges are far more mundane and pressing that that.<p>No.1 challenge is how to stop centralized exchanges from extensive market manipulation.<p>Decentralized crypto currencies are never going to achieve their goals, whilst players like Bitfinex and Tether are in a position to &quot;print&quot; unlimited amounts of money and use them to purchase coins like BTC.