Quantum Computing. Melanie Swan
Читать онлайн книгу.concerns and status
4.4.2Quantum state decoherence
4.4.3Entanglement property of qubits
4.4.4Quantum information processors
4.5Bell Inequalities and Quantum Computing
4.5.1Introduction to inequalities
4.6Practical Applications of Entanglement: NIST Randomness Beacon
Part 2 Blockchain and Zero-Knowledge Proofs
5.1Introduction: Functionality and Scalability Upgrades
5.2Computational Verification and Selectable Trust Models
5.3Layer 2 and the Lightning Network
5.3.1Introduction to the Lightning Network
5.3.2Basic routing on the Lightning Network
5.3.3Smart routing: Sphinx routing and rendez-vous routing
5.3.4A new layer in the Lightning Network: Channel factories
5.3.5Smart routing through atomic multi-path routing
5.4World Economic History on Replay
5.5Verifiable Markets, Marketplaces, Gaming, Stablecoins
5.6.1Next-generation classical consensus
5.6.2Next-generation PBFT: Algorand and DFINITY
5.6.3Quantum Byzantine Agreement
6.1.1Quantum-secure blockchains and quantum-based logic
6.1.2Proposal for quantum Bitcoin
6.1.3Quantum consensus: Grover’s algorithm, quantum annealing, light
6.3Quantum Networks: A Deeper Dive
6.3.1The internet’s new infrastructure: Entanglement routing
6.4Quantum Cryptography and Quantum Key Distribution
6.4.2Satellite-based quantum key distribution: Global space race
6.5Quantum Security: Blockchain Risk of Quantum Attack
6.5.1Risk of quantum attack in authentication
6.5.2Risk of quantum attack in mining
6.6Quantum-Resistant Cryptography for Blockchains
Chapter 7Zero-Knowledge Proof Technology
7.1Zero-Knowledge Proofs: Basic Concept
7.2Zero-Knowledge Proofs and Public Key Infrastructure Cryptography
7.2.1Public key infrastructure
7.3Zero-Knowledge Proofs: Interactive Proofs
7.3.1Interactive proofs: Graph isomorphism example
7.4Zero-Knowledge Proofs in Blockchains
7.4.1Zero-knowledge proofs: Range proofs
7.4.2Unspent transaction outputs model
7.5State-of-the-Art: SNARKs, Bulletproofs, and STARKs