Melanie Swan

Quantum Computing


Скачать книгу

concerns and status

       4.4.2Quantum state decoherence

       4.4.3Entanglement property of qubits

       4.4.4Quantum information processors

       4.5Bell Inequalities and Quantum Computing

       4.5.1Introduction to inequalities

       4.5.2Bell inequalities

       4.6Practical Applications of Entanglement: NIST Randomness Beacon

       4.6.1Certifiably random bits

       References

       Part 2 Blockchain and Zero-Knowledge Proofs

       Chapter 5Classical Blockchain

       5.1Introduction: Functionality and Scalability Upgrades

       5.2Computational Verification and Selectable Trust Models

       5.3Layer 2 and the Lightning Network

       5.3.1Introduction to the Lightning Network

       5.3.2Basic routing on the Lightning Network

       5.3.3Smart routing: Sphinx routing and rendez-vous routing

       5.3.4A new layer in the Lightning Network: Channel factories

       5.3.5Smart routing through atomic multi-path routing

       5.4World Economic History on Replay

       5.5Verifiable Markets, Marketplaces, Gaming, Stablecoins

       5.5.1Verifiable markets

       5.5.2Digital marketplaces

       5.5.3Stablecoins

       5.6Consensus

       5.6.1Next-generation classical consensus

       5.6.2Next-generation PBFT: Algorand and DFINITY

       5.6.3Quantum Byzantine Agreement

       References

       Chapter 6Quantum Blockchain

       6.1Quantum Blockchain

       6.1.1Quantum-secure blockchains and quantum-based logic

       6.1.2Proposal for quantum Bitcoin

       6.1.3Quantum consensus: Grover’s algorithm, quantum annealing, light

       6.1.4Quantum money

       6.2Quantum Internet

       6.2.1Quantum network theory

       6.3Quantum Networks: A Deeper Dive

       6.3.1The internet’s new infrastructure: Entanglement routing

       6.3.2Quantum memory

       6.4Quantum Cryptography and Quantum Key Distribution

       6.4.1Quantum key distribution

       6.4.2Satellite-based quantum key distribution: Global space race

       6.4.3Key lifecycle management

       6.5Quantum Security: Blockchain Risk of Quantum Attack

       6.5.1Risk of quantum attack in authentication

       6.5.2Risk of quantum attack in mining

       6.6Quantum-Resistant Cryptography for Blockchains

       References

       Chapter 7Zero-Knowledge Proof Technology

       7.1Zero-Knowledge Proofs: Basic Concept

       7.2Zero-Knowledge Proofs and Public Key Infrastructure Cryptography

       7.2.1Public key infrastructure

       7.2.2Blockchain addresses

       7.3Zero-Knowledge Proofs: Interactive Proofs

       7.3.1Interactive proofs: Graph isomorphism example

       7.4Zero-Knowledge Proofs in Blockchains

       7.4.1Zero-knowledge proofs: Range proofs

       7.4.2Unspent transaction outputs model

       7.5State-of-the-Art: SNARKs, Bulletproofs, and STARKs