Quantum Computing. Melanie Swan

Чтение книги онлайн.

Читать онлайн книгу Quantum Computing - Melanie Swan страница 4

Quantum Computing - Melanie Swan Between Science and Economics

Скачать книгу

and Quantum Key Distribution

       6.4.1Quantum key distribution

       6.4.2Satellite-based quantum key distribution: Global space race

       6.4.3Key lifecycle management

       6.5Quantum Security: Blockchain Risk of Quantum Attack

       6.5.1Risk of quantum attack in authentication

       6.5.2Risk of quantum attack in mining

       6.6Quantum-Resistant Cryptography for Blockchains

       References

       Chapter 7Zero-Knowledge Proof Technology

       7.1Zero-Knowledge Proofs: Basic Concept

       7.2Zero-Knowledge Proofs and Public Key Infrastructure Cryptography

       7.2.1Public key infrastructure

       7.2.2Blockchain addresses

       7.3Zero-Knowledge Proofs: Interactive Proofs

       7.3.1Interactive proofs: Graph isomorphism example

       7.4Zero-Knowledge Proofs in Blockchains

       7.4.1Zero-knowledge proofs: Range proofs

       7.4.2Unspent transaction outputs model

       7.5State-of-the-Art: SNARKs, Bulletproofs, and STARKs

       7.5.1SNARKs and multi-party computation

       7.5.2Bulletproofs and STARKs

       7.6State-of-the-Art: Zether for Account-Based Blockchains

       7.6.1Bulletproofs: Confidential transactions for UTXO chains

       7.6.2Zether: Confidential transactions for account chains

       7.6.3Confidential smart contract transactions

       7.6.4IPFS interactive proof-of-time and proof-of-space

       References

       Chapter 8Post-quantum Cryptography and Quantum Proofs

       8.1STARKs

       8.1.1Proof technology: The math behind STARKs

       8.1.2Probabilistically checkable proofs

       8.1.3PCPs of proximity and IOPs: Making PCPs more efficient

       8.1.4IOPs: Multi-round probabilistically checkable proofs

       8.1.5Holographic proofs and error-correcting codes

       8.2Holographic Codes

       8.2.1Holographic algorithms

       8.3Post-quantum Cryptography: Lattices and Hash Functions

       8.3.1Lattice-based cryptography

       8.3.2What is a lattice?

       8.3.3Lattice-based cryptography and zero-knowledge proofs

       8.3.4Lattice-based cryptography and blockchains

       8.3.5Hash function-based cryptography

       8.4Quantum Proofs

       8.4.1Non-interactive and interactive proofs

       8.4.2Conclusion on quantum proofs

       8.5Post-quantum Random Oracle Model

       8.6Quantum Cryptography Futures

       8.6.1Non-Euclidean lattice-based cryptosystems

       References

       Part 3 Machine Learning and Artificial Intelligence

       Chapter 9Classical Machine Learning

       9.1Machine Learning and Deep Learning Neural Networks

      

Скачать книгу