Quantum Computing. Melanie Swan
Чтение книги онлайн.
Читать онлайн книгу Quantum Computing - Melanie Swan страница 4
6.4.2Satellite-based quantum key distribution: Global space race
6.5Quantum Security: Blockchain Risk of Quantum Attack
6.5.1Risk of quantum attack in authentication
6.5.2Risk of quantum attack in mining
6.6Quantum-Resistant Cryptography for Blockchains
Chapter 7Zero-Knowledge Proof Technology
7.1Zero-Knowledge Proofs: Basic Concept
7.2Zero-Knowledge Proofs and Public Key Infrastructure Cryptography
7.2.1Public key infrastructure
7.3Zero-Knowledge Proofs: Interactive Proofs
7.3.1Interactive proofs: Graph isomorphism example
7.4Zero-Knowledge Proofs in Blockchains
7.4.1Zero-knowledge proofs: Range proofs
7.4.2Unspent transaction outputs model
7.5State-of-the-Art: SNARKs, Bulletproofs, and STARKs
7.5.1SNARKs and multi-party computation
7.6State-of-the-Art: Zether for Account-Based Blockchains
7.6.1Bulletproofs: Confidential transactions for UTXO chains
7.6.2Zether: Confidential transactions for account chains
7.6.3Confidential smart contract transactions
7.6.4IPFS interactive proof-of-time and proof-of-space
Chapter 8Post-quantum Cryptography and Quantum Proofs
8.1.1Proof technology: The math behind STARKs
8.1.2Probabilistically checkable proofs
8.1.3PCPs of proximity and IOPs: Making PCPs more efficient
8.1.4IOPs: Multi-round probabilistically checkable proofs
8.1.5Holographic proofs and error-correcting codes
8.3Post-quantum Cryptography: Lattices and Hash Functions
8.3.1Lattice-based cryptography
8.3.3Lattice-based cryptography and zero-knowledge proofs
8.3.4Lattice-based cryptography and blockchains
8.3.5Hash function-based cryptography
8.4.1Non-interactive and interactive proofs
8.4.2Conclusion on quantum proofs
8.5Post-quantum Random Oracle Model
8.6Quantum Cryptography Futures
8.6.1Non-Euclidean lattice-based cryptosystems
Part 3 Machine Learning and Artificial Intelligence
Chapter 9Classical Machine Learning