Uploaded on Oct 21, 2022
PPT on Quantum Blockchains
Quantum Blockchains
Quantum
Blockchains
Introduction
Quantum Blockchain Technologies has
commenced an aggressive R&D and
investments programmed in the dynamic
world of Blockchain Technology, which
includes cryptocurrencies mining and other
advanced blockchain applications.
Source: quantumblockchaintechnologies.co.uk
Cryptography
Quantum’s R&D will focus on Cryptography;
bringing together the most advanced
implementation techniques and functions,
along with quantum computing technologies
and AI deep learning, to develop a new and
disruptive approach to blockchain technology.
Source: quantumblockchaintechnologies.co.uk
Technology
Focus on innovative technologies and
applications within the Blockchain,
Cryptocurrency, Quantum Technology and
Artificial Intelligence.
Source: quantumblockchaintechnologies.co.uk
Blockchain
technologies
At the core of blockchain technologies, the
most important aspects are consensus
algorithms and digital signatures. Consensus
algorithms can be used to generate blocks,
while digital signatures can secure
transaction information.
Source: www.nature.com
Quantum
computation
Digital signatures are an essential application
of public-key cryptography. In this case, the
security of blockchain technology based on
the digital signatures is under the threat of
quantum computation.
Source: www.nature.com
How it works?
algorithms can be involved in blockchain
technologies, which further improve system
securities. A blockchain generated by the use
of entanglement in time cannot trace back
the transaction information, and thus the
improvement in the overall security of the
blockchain is poor.
Source: www.nature.com
Data structure
of the
bThe linoformcatkion cin thhe balocik nheader contains
the address of the current block, the address
of the previous block and the timestamp.
Source: www.nature.com
Quantum blockchain
algorithm
In the blockchain, the signer generates the
transaction and then uses a private key to
sign, and the receiver authenticates the
transaction by using the signer’s public key to
ensure transaction security in the aspect of
cryptography.
Source: www.nature.com
THANK YOU
Comments