Blockchain based Secure Crypto-currency system with Quantum Key Distribution Protocol

被引:0
作者
Azhar, Muhammad Taimour [1 ]
Khan, Muhammad Burhan [1 ]
Khan, Asim Ur Rehman [1 ]
机构
[1] FAST Natl Uniers Comp & Emerging Sci, Dept Elect Engn, Karachi, Pakistan
来源
2019 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT 2019) | 2019年
关键词
Block chain; crypto-currency; Quantum Key Distribution; Peer-peer networking; Bitcoin;
D O I
10.1109/icict47744.2019.9001979
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A block chain is referred to as a growing list of records which are linked using cryptography. It is simple and open ledger that records all the transactions in block structures. These block structures are bound with each other by using Quantum Cryptographic protocols. The block chain is democratic system in which concerned parties get access by using a key to perform transaction. The well-known type of Quantum Cryptography protocol is Quantum Key Distribution (QKD). With the help of QKD our Crypto-currency system is secured when passage in between transmitting end and receiving end shouldn't be intrude by third party. Secrecy of the system depends upon different factors like efficient and optimized key rate, secure carrier of modulating signal. In this work the transparency and immunity of block chain based crypto-currency system is analyzed with simulation of six state QKD Protocol. The generation of key rate is observed to ensure the path for production of better crypto-currency system. A Mathematical model is used to obtain the desire constraints so that linear relationship can be achieved. At application level this study contributes to the implementation of crypto-currency system through six state QKD protocol.
引用
收藏
页码:31 / 35
页数:5
相关论文
共 10 条
[1]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[2]  
Coles P. J., 2016, NUMERICAL APPROACH U, P1
[3]  
Gisin H. Z. G. Nicolas, 2002, REV MODERN PHYS, V74
[4]  
Grinberg Reuben, 2012, Hastings Science Technology Law Journal, V4, P159, DOI DOI 10.1007/978-3-642-32946-3_29
[5]   A Survey on Quantum Cryptography [J].
Li Jian ;
Li Na ;
Zhang Yu ;
Wen Shuang ;
Du Wei ;
Chen Wei ;
Ma Wenping .
CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) :223-228
[6]   A Literature Review on Bitcoin: Transformation of Crypto Currency into a Global Phenomenon [J].
Manimuthu A. ;
Raja Sreedharan V. ;
Rejikumar G. ;
Marwaha D. .
IEEE Engineering Management Review, 2019, 47 (01) :28-35
[7]  
Miraz MH, 2018, 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), P35, DOI 10.1109/iCCECOME.2018.8658726
[8]   Quantum Key Distribution and Its Applications [J].
Sasaki, Masahide .
IEEE SECURITY & PRIVACY, 2018, 16 (05) :42-48
[9]  
Shannon C.E., 1948, COMMUN THEORY, P656
[10]   Authentication With Block-Chain Algorithm and Text Encryption Protocol in Calculation of Social Network [J].
Yu, Ruiguo ;
Wang, Jianrong ;
Xu, Tianyi ;
Gao, Jie ;
An, Yongli ;
Zhang, Gong ;
Yu, Mei .
IEEE ACCESS, 2017, 5 :24933-24940