Скачать книгу

concerns and status

       4.4.2Quantum state decoherence

       4.4.3Entanglement property of qubits

       4.4.4Quantum information processors

       4.5Bell Inequalities and Quantum Computing

       4.5.1Introduction to inequalities

       4.5.2Bell inequalities

       4.6Practical Applications of Entanglement: NIST Randomness Beacon

       4.6.1Certifiably random bits

       References

       Part 2 Blockchain and Zero-Knowledge Proofs

       Chapter 5Classical Blockchain

       5.1Introduction: Functionality and Scalability Upgrades

       5.2Computational Verification and Selectable Trust Models

       5.3Layer 2 and the Lightning Network

       5.3.1Introduction to the Lightning Network

       5.3.2Basic routing on the Lightning Network

       5.3.3Smart routing: Sphinx routing and rendez-vous routing

       5.3.4A new layer in the Lightning Network: Channel factories

       5.3.5Smart routing through atomic multi-path routing

       5.4World Economic History on Replay

       5.5Verifiable Markets, Marketplaces, Gaming, Stablecoins

       5.5.1Verifiable markets

       5.5.2Digital marketplaces

       5.5.3Stablecoins

       5.6Consensus

       5.6.1Next-generation classical consensus

       5.6.2Next-generation PBFT: Algorand and DFINITY

       5.6.3Quantum Byzantine Agreement

       References

       Chapter 6Quantum Blockchain

       6.1Quantum Blockchain

       6.1.1Quantum-secure blockchains and quantum-based logic

       6.1.2Proposal for quantum Bitcoin

       6.1.3Quantum consensus: Grover’s algorithm, quantum annealing, light

       6.1.4Quantum money

       6.2Quantum Internet

       6.2.1Quantum network theory

       6.3Quantum Networks: A Deeper Dive

       6.3.1The internet’s new infrastructure: Entanglement routing

       6.3.2Quantum memory

       6.4Quantum Cryptography and Quantum Key Distribution

       6.4.1Quantum key distribution

       6.4.2Satellite-based quantum key distribution: Global space race

       6.4.3Key lifecycle management

       6.5Quantum Security: Blockchain Risk of Quantum Attack

       6.5.1Risk of quantum attack in authentication

       6.5.2Risk of quantum attack in mining

       6.6Quantum-Resistant Cryptography for Blockchains

       References

       Chapter 7Zero-Knowledge Proof Technology

       7.1Zero-Knowledge Proofs: Basic Concept

       7.2Zero-Knowledge Proofs and Public Key Infrastructure Cryptography

       7.2.1Public key infrastructure

       7.2.2Blockchain addresses

       7.3Zero-Knowledge Proofs: Interactive Proofs

       7.3.1Interactive proofs: Graph isomorphism example

       7.4Zero-Knowledge Proofs in Blockchains

       7.4.1Zero-knowledge proofs: Range proofs

       7.4.2Unspent transaction outputs model

       7.5State-of-the-Art: SNARKs, Bulletproofs, and STARKs

      

Скачать книгу