Page 918«..1020..917918919920..930940..»

P-20 Blockchain Revolutionizes Privacy and Stability in Digital … – GlobeNewswire

VICTORIA , SEYCHELLES , Aug. 30, 2023 (GLOBE NEWSWIRE) -- P-20 Blockchain is transforming blockchain technology, fundamentally changing the approach to secure transactions, privacy-preserving smart contracts, and stable digital currencies. With its native currency, PVT-USD, at the core, P-20 Blockchain brings a profound shift marked by privacy, anonymity, and seamless decentralized applications.

P-20 Blockchain stands apart from peers by making privacy its utmost priority. Unlike transparent blockchains where transactions are open to public scrutiny, P-20 Blockchain employs advanced cryptographic protocols like Ring CT and Ring Signature. These protocols cloak transaction amounts and user identities, ensuring financial information remains confidential. Think of it as conducting transactions in a mask and using a secret code, safeguarding privacy from potential threats.

P-20 Blockchain leverages an innovative consensus mechanism combining Directed Acyclic Graphs (DAG) and asynchronous Byzantine Fault Tolerance (aBFT). This blend allows parallel processing, enhancing scalability to over 330,000 transactions per second while keeping transaction fees the cheapest on the market. Security and reliability are not compromised, providing users with a seamless experience.

One of the standout features of P-20 Blockchain is its commitment to price stability. PVT-USD, the native currency, maintains a steady value of one dollar. This stability is maintained through an automated supply adjustment mechanism, taking real-time market demand and conditions into account. PVT-USD is also used for untraceable transactions, keeping users' data protected. No more price volatility; P-20 Blockchain offers a reliable privacy stablecoin.

Including more, the compatibility of the EVM ecosystem empowers developers by allowing them to leverage familiar tools and programming languages, bringing innovation within the P-20 Blockchain community. Moreover, the ability to build privacy-preserving smart contracts within this ecosystem ensures confidentiality while still maintaining transaction efficiency. Advanced cryptographic techniques, including Zero-Knowledge Proofs (ZKP) and ring signatures (RingCT and RS), keep information private while maintaining transaction efficiency. ZKP allows verification without revealing sensitive details, while ring signatures provide a veil of security around transactions, allowing the sender and receiver to be masked at all times.

Consequently, the revolutionary transformation at P-20 Blockchain is positioned to usher in a new era of private, secure, and innovative digital transactions at unprecedented speeds. Through its unwavering dedication to privacy, advanced consensus mechanisms, price stability, and compatibility with the EVM ecosystem, P-20 Blockchain offers a secure and private space for transactions, a scalable infrastructure, and a stable value for its native privacy coin.

About the Company - P-20 Blockchain:

In the realm of the digital landscape, P-20 Blockchain stands as a beacon of innovation, offering users a transformative journey towards a more secure and private digital world. Additionally, P-20 Blockchain emerges as the gateway to a new era of secure and private digital transactions.

Website link:https://p20blockchain.com/

Telegram :https://t.me/P20Blockchain

Discord:https://discord.gg/C4WU96wQwQ

Twitter:https://twitter.com/P20Chain

Disclaimer: The information provided in this press release is not a solicitation for investment, or intended as investment advice, financial advice, or trading advice. It is strongly recommended that you practice due diligence (including consultation with a professional financial advisor) before investing in or trading securities and cryptocurrency.

Read the original here:

P-20 Blockchain Revolutionizes Privacy and Stability in Digital ... - GlobeNewswire

Read More..

Blockchain and IoT Convergence: Market Set to Revolutionize with … – GlobeNewswire

Dublin, Sept. 01, 2023 (GLOBE NEWSWIRE) -- The "Blockchain Iot Market Size & Share Analysis - Growth Trends & Forecasts (2023 - 2028)" report has been added to ResearchAndMarkets.com's offering.

The Blockchain IoT Market size is expected to grow from USD 0.57 billion in 2023 to USD 3.44 billion by 2028, at a CAGR of 43.31% during the forecast period (2023-2028).

The Internet of Things (IoT) is an advanced technology that connects all devices over the Internet, and blockchain is a kind of distributed financial technology. The main advantages of using blockchain for IoT include lower chances of collusion and manipulation and lower transaction settlement and costs.

Key Highlights

With the rapid development of communication technologies, IoT ( Internet of Things) is experiencing exponential growth in research and industry. It is getting out of its infancy to a maturity phase with the volume of data generated, transmitted, and processed.

The traditional IoT systems are powered by centralized topology, where data is transmitted from physical devices to the cloud, where the data is processed using analytics. Output is received back to the IoT device. Still, the increase in the frequency of network devices limits the scalability of the IoT platforms and risks them with vulnerabilities that would eventually compromise users' network security and privacy.

The blockchain powered by decentralized architecture and cryptographic encryptions leverages the IoT platform by ensuring privacy and security in a peer-to-peer network. However, it requires high computational power, resulting in higher bandwidth overhead and delay.

The Internet of Things ecosystem is quite diversified. Creating IoT devices that are compatible with blockchain technology involves many challenges. Scalability, which involves processing a huge volume of data generated by a wide network of sensors, is one of the primary challenges IoT faces.

The processing power and time necessary to encrypt all IoT devices in a blockchain-based ecosystem are not as anticipated. Another key challenge in blockchain systems that keep the ledger on edge nodes is storage. IoT smart devices at the edge are currently incapable of storing large amounts of data or processing large amounts of computational power.

Blockchain IoT Market Trends

Smart City End Users Segment is Expected to Hold Significant Market Share

Over the last few decades, the world has experienced unparalleled urban growth, majorly due to increased population, scarcity of resources, and climate changes. According to the United Nations, about 54% of people dwell in cities, which is expected to reach 66% by 2050. Government bodies focus on modern technologies like IoT, wireless communication, and blockchain to cope with urban growth, reduce costs, and optimize resources.

Providing a sustainable environment is one of the key characteristics of smart cities. Keeping track of the environmental indicators in light of the rapid industrial and urbanization trends is critical. The primary challenge in environmental monitoring is real-time data collection using reliable and precise monitoring tools. The major role of smart city platforms may benefit the market's expansion during the forecast period.

Data security is one of the vital constraints for devices and services deployed in a metropolitan city, which, leveraged with the blockchain's decentralized platform, ensures the public's trust and fosters the market's growth.

According to The Economist's smart city index rating, Copenhagen was one of the leading global digital cities in 2022, with a score of 80.3. Seoul, Beijing, Amsterdam, and Singapore completed the top five list of finest digital cities.

Also, government initiatives across the world are starting to appreciate the potential of blockchain as it provides the infrastructure necessary for transaction management while ensuring transparency and security, which stand to be critical elements in smart city implementation.

Globally, many smart city projects and efforts are being implemented, encouraging global investments due to urbanization. The OECD estimates that between 2010 and 2030, worldwide investments in smart city initiatives would total around USD 1.8 trillion for all metropolitan city infrastructure projects.

Asia-Pacific is Expected to Be the Fastest-growing Market

The Asia-Pacific region is expected to grow at the highest rate over the forecast period, owing to the rising influx of technology companies in the area and the increasing investments in IoT technology, smart city deployments, government initiative, and the growth of the urban population.

Rapid urbanization and regional government initiatives foster the demand for smart cities. Smart cities are entitled to problems, such as high data center operation costs, poor IoT security, and equipment maintenance. However, technologies like blockchain IoT would provide the necessary infrastructure for transaction management, asset tracking, and smart contracts while ensuring security and transparency, thereby increasing operational efficiency.

Blockchain IoT Industry Overview

The blockchain IoT market is highly fragmented, with the presence of major players like IBM Corporation, Intel Corporation, Microsoft Corporation, Cisco Systems Inc., and Amazon Inc. Players in the market are adopting strategies such as partnerships, innovations, mergers, and acquisitions to enhance their product offerings and gain sustainable competitive advantage.

A selection of companies mentioned in this report includes

For more information about this report visit https://www.researchandmarkets.com/r/7d0mw

About ResearchAndMarkets.comResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.

See the original post:

Blockchain and IoT Convergence: Market Set to Revolutionize with ... - GlobeNewswire

Read More..

Plasma vs Sharding: What’s the Better Innovative Scalability … – Cryptopolitan

Description

Blockchain scalability remains a pivotal challenge, prompting the exploration of innovative blockchain scalability solutions like Plasma and sharding. As decentralized networks continue to evolve, the need to process transactions more efficiently and accommodate growing user demands has become increasingly pressing. Both Plasma and sharding offer distinctive approaches to address this fundamental challenge, aiming to optimize Read more

Blockchain scalability remains a pivotal challenge, prompting the exploration of innovative blockchain scalability solutions like Plasma and sharding.

As decentralized networks continue to evolve, the need to process transactions more efficiently and accommodate growing user demands has become increasingly pressing. Both Plasma and sharding offer distinctive approaches to address this fundamental challenge, aiming to optimize transaction throughput and overall network performance.

In this guide, we explore the intricacies of these two strategies, uncovering their unique features, benefits, and potential drawbacks. By examining the core principles, mechanisms, and real-world implications of each approach, we gain a comprehensive understanding of how these technologies shape the landscape of blockchain scalability. Join us as we unravel the complexities of these competing solutions and shed light on their contributions to the future of decentralized systems.

Plasma, commonly known as Ethereum Plasma because it was first proposed by Ethereum co-founder Vitalik Buterin, is a scaling solution aimed at enhancing the performance of the Ethereum network. Its core premise revolves around establishing a network of side chains that maintain minimal interaction with the Ethereum blockchain, commonly referred to as the main chain. The foundational structure of Plasma adopts a hierarchical arrangement resembling a blockchain tree, wherein multiple child chains are layered atop the primary chain.

The Plasma framework empowers the creation of an extensive array of side chains (also called child chains), essentially acting as condensed replicas of the Ethereum blockchain through the utilization of smart contracts and Merkle Trees.

These side chains are uniquely designed to execute customized smart contracts, accommodating diverse requirements of various entities. This adaptability enables the creation of distinct Plasma smart contracts tailored to specific use cases, thereby allowing companies to harness the potential of the Plasma framework to meet their individual needs.

By capitalizing on the security provided by the main chain, Plasma facilitates the deployment of numerous child chains. These chains operate independently, adhering to predetermined guidelines and pursuing specific objectives that may not necessarily align with those of the main chain. This design strategy aims to alleviate congestion concerns within the primary Ethereum blockchain.

To grasp the mechanics of Ethereum Plasma, its vital to explore the foundational components that underpin this network:

The concept of off-chain computation establishes a sense of trust within the Ethereum network participants. It facilitates the settlement of multiple transactions outside the primary Ethereum blockchain. This principle stems from the notion that not every transaction necessitates validation from all nodes on the main chain.

Consequently, this selective transaction validation eases the workload on the primary chain, alleviating congestion and enhancing efficiency. Developers meticulously structure Plasma blockchains, often employing a single operator to expedite transaction processing, resulting in swifter and cost-effective transactions.

Ethereum Plasma adopts the practice of periodically publishing state commitments on the Ethereum mainnet. This synchronization ensures mutual awareness of the child chains state and maintains compatibility between them.

This interplay is vital for Plasmas ability to leverage the security of the main chain. While transactions occur off-chain, final settlements transpire within the primary Ethereum execution layer. This interlocking relationship prevents inconsistencies and safeguards against the proliferation of invalid transactions.

Seamless interaction between both blockchains is a fundamental prerequisite when amalgamating the Ethereum main chain with Plasma.

This necessitates establishing a communication channel that facilitates asset transfer, thus realizing the scalability solution. Plasma executes this via a master contract on Ethereum, orchestrating the mechanics of entries and exits.

Dispute resolution stands as a pivotal facet of Ethereum Plasmas scalability design. A mechanism rooted in transaction integrity enforcement is employed to counter the possibility of malicious actions by participants.

This safeguard, known as Fraud Proof, is devised to identify participants engaging in suspicious behavior. Fraud proofs serve as claims contesting the validity of specific state transitions.

Users invoke them when detecting potential double-spends, where an asset is attempted to be spent twice before confirmation completion. Vigilance and prompt reporting are key to the effectiveness of this process. Users who promptly publish fraud proofs halt illicit transactions, leading to punitive action against culprits.

In essence, Plasma represents an off-main-chain solution strategically designed to significantly enhance the operational efficiency of the Ethereum network and analogous blockchains. This optimization is achieved by offloading a substantial portion of processing tasks from the main chain onto a network of smaller, specialized chains, each serving distinct functions.

Although Plasma transactions are executed off-chain, they are settled on the main Ethereum execution layer to ensure security guarantees. However, finalizing off-chain transactions requires periodic publication of state commitments by the operator, responsible for generating plasma chain blocks. These commitments, resembling Merkle roots derived from Merkle trees, are cryptographic ways of committing to values without revealing them. They prevent altering committed values and play a pivotal role in upholding security.

Merkle roots are cryptographic constructs that enable condensing large data amounts. These roots, also termed block roots, can represent entire block transactions, aiding in confirming small datas inclusion within a broader dataset. Users can validate data inclusion using Merkle proofs, especially to demonstrate transaction presence in a specific block.

Merkle roots serve a vital purpose by conveying off-chain state data to Ethereum. Analogously, they function as save points, where the operator signifies the Plasma chains state at a specific time and corroborates it with a Merkle root as evidence. This act of committing to the ongoing plasma chain state using a Merkle root is termed a state commitment.

Although originally conceptualized by Vitalik Buterin and Joseph Poon in August 2017 to address Ethereums scalability challenges, the Plasma concept exhibits adaptability for integration into other blockchain platforms. Joseph Poon, a proponent of the Lightning Network proposal for Bitcoin, is instrumental in highlighting the synergies between Plasma and Lightning Network as scalability solutions for their respective blockchains. It is important to note that while these solutions share common goals, they employ distinct methodologies and mechanisms.

The Ethereum Plasma project remains an open-source initiative, with its code repository accessible on GitHub. For a deeper dive into the technical intricacies, the official Plasma whitepaper serves as a valuable resource. Despite being in the nascent stages of development, the concept of Plasma holds immense promise. Successful implementation has the potential to usher in a new era of efficiency for the Ethereum network, while also serving as a foundational template for other blockchain networks seeking scalability solutions.

Sharding is a technique that involves dividing blockchains or databases into smaller, partitioned sections called shards, each managing specific data segments. This alleviates the strain on a single chain processing all network transactions. Shards function as individual blockchains, capable of handling their transactions, while a main chain or beacon chain oversees shard interactions. This Layer 1 network upgrade enhances scalability by distributing the workload. Ethereum was among the first blockchains to adopt sharding as it started its transition to a scalable Proof of Stake network, with a Beacon Chain coordinating multiple shards.

A significant advantage of sharding is simplified node operation. As data is divided across shards, validator nodes no longer need to store the entire blockchain history, focusing only on data integrity confirmations. Sharded networks complement rollups, which improve scalability by validating off-chain transactions and consolidating them on the main chain. Sharding enhances rollup efficiency by allowing them to report states more swiftly.

However, sharding introduces security concerns. A malicious actor gaining control of a shard could potentially disrupt other parts of the network. Proper regulations and safeguards are necessary to prevent this issue, as taking over a shard is comparatively easier than hijacking an entire non-sharded network.

Sharding plays a pivotal role in achieving efficient data storage distribution, leading to enhanced cost-effectiveness in rollups and simplified node operations. This approach empowers layer 2 solutions to leverage Ethereums security while concurrently maintaining lower transaction fees.

The Ethereum blockchain currently hosts over three thousand decentralized applications (dApps), underscoring the pressing need for scalability solutions like sharding.

Sharding entails the division of the network into smaller units or partitions, each of which substantially boosts the networks Transactions Per Second (TPS).

However, while sharding may appear straightforward, it involves several crucial components and intricacies:

Nodes within a blockchain network handle the processing and management of all transaction volumes occurring within the network. These autonomous entities are tasked with preserving and storing decentralized network-generated data, including account balances and transaction histories. Nodes manage all activities, data, and transactions within the network, a design decision that has persisted since network inception.

However, this design hampers transaction processing speed, even though it maintains blockchain security by storing every transaction on each node. This sluggish transaction processing stands as a hindrance to a future where blockchains are expected to manage millions of transactions.

Sharding can be achieved through the horizontal partitioning of databases, wherein rows are divided into segments or shards based on their characteristics.

For instance, one shard could focus on storing transaction history and the current state of a specific category of addresses. Shards might also be categorized by the type of digital asset they contain, allowing for specialized transaction handling involving those assets.

The processing capacity of blockchain networks is constrained due to the necessity for all nodes to reach consensus on transaction legitimacy before processing. This requirement maintains the decentralized nature of networks like Ethereum and Bitcoin, wherein every node retains the entire blockchain history and processes each transaction.

This design fortifies network security against hostile takeovers or transaction alterations, even though it hampers scalability. Sharded blockchains introduce an alternative by allowing nodes to forgo downloading the full history or validating every transaction. This bolsters network performance, enhancing its ability to accommodate more users.

Shardings foremost benefit is the scalability boost it affords blockchains. Sharding permits the integration of additional nodes and larger data sets without significantly slowing down transaction speeds. This holds potential for expediting the adoption of blockchain technology across industries, particularly in finance, where quicker transactions can foster competition against centralized payment systems.

Sharding brings two supplementary advantages: heightened network participation and improved user accessibility. Anticipated enhancements in Ethereums sharding may reduce the hardware prerequisites for running a client, enabling participation from personal computers and mobile devices. This democratization of access can broaden network participation.

Its important to note that shardings application to blockchain networks is in the preliminary testing phase. It is mostly associated with the following risks:

One security concern pertains to shard collisions, where one shard takes over another or overrides its data. This risk could lead to data loss or the introduction of corrupted data by malicious shards. Ethereum 2 mitigates this risk by randomly assigning nodes to shards and reassigning them at intervals.

Considering each shard as an independent blockchain network with its users and data reveals a potential riskshard corruption. An attacker gaining control of a shard could introduce fraudulent transactions. Ethereum addresses this through random shard assignment and reassignment, thwarting attackers ability to predict and exploit vulnerabilities.

Plasma, pioneered by Vitalik Buterin and Joseph Poon, introduces side chains that interact with the main chain minimally. This architecture enables creation of numerous child chains with customized smart contracts, easing congestion on the primary chain while maintaining security.

In contrast, sharding focuses on partitioning the network into smaller, manageable segments known as shards. Each shard processes specific transactions, alleviating strain on a single chain and bolstering scalability.

While both Plasma and sharding share the goal of scalability, they possess distinctive mechanisms. Plasma emphasizes side chains, diversifying use cases, while sharding focuses on segmenting the main chain for increased efficiency. Their ongoing development is set to reshape blockchains potential, offering alternatives to tackle scalability challenges.

A sidechain functions as an independent blockchain that operates alongside a parent chain, interconnected through a network bridge for interaction. On the other hand, Plasma constitutes a structure of child chains strategically crafted to enhance the scalability of a parent chain operating in tandem.

Initially conceived as the MATIC Network and later rebranded as the Polygon Network, it commenced as a Plasma framework. Subsequently, this blockchain system has advanced into a comprehensive Layer 2 blockchain protocol.

Sharding increases a blockchain's capacity to process transactions by distributing the workload among shards. It allows for more users and transactions without sacrificing network performance.

Plasma's key advantage lies in its ability to offload transactions to side chains, reducing congestion on the main chain. It enables faster transaction processing and customization of chains for different use cases, while still benefiting from the main chain's security.

Yes, sharding and Plasma are complementary solutions that can be used in conjunction to achieve even greater scalability. Sharding optimizes the main chain, while Plasma offers the option to offload transactions to secondary chains.

Ethereum is actively working on implementing sharding as part of its Ethereum 2.0 upgrade. Matic Network, now Polygon, began as a Plasma framework and evolved into a Layer 2 solution.

No, there are various scalability solutions apart from sharding and Plasma, including state channels, sidechains, and rollups. Each approach addresses scalability challenges in different ways, catering to specific blockchain requirements.

Read the original here:

Plasma vs Sharding: What's the Better Innovative Scalability ... - Cryptopolitan

Read More..

Strategic Steps and Pivotal Considerations In Building A DLT … – Cryptopolitan

Description

In todays advancing business world, harnessing innovative technologies is pivotal for fostering growth, sustainability, and competitive advantage. Among these groundbreaking advancements, Distributed Ledger Technology (DLT) has emerged as a transformative force, offering unprecedented opportunities to establish dynamic and interconnected business ecosystems. This Cryptopolitan guide explores creating a DLT business ecosystem, illuminating the strategic steps and Read more

In todays advancing business world, harnessing innovative technologies is pivotal for fostering growth, sustainability, and competitive advantage. Among these groundbreaking advancements, Distributed Ledger Technology (DLT) has emerged as a transformative force, offering unprecedented opportunities to establish dynamic and interconnected business ecosystems. This Cryptopolitan guide explores creating a DLT business ecosystem, illuminating the strategic steps and pivotal considerations required for successful implementation.

DLT, commonly associated with blockchain, transcends traditional business paradigms by enabling secure, transparent, and decentralized data sharing and collaboration. As organizations increasingly recognize the limitations of isolated operations, the concept of a business ecosystem gains prominence. Unlike linear value chains, a business ecosystem encompasses a network of interdependent entities that collectively deliver enhanced value to end customers while fostering mutual growth.

Throughout this article, we will navigate the multifaceted landscape of DLT-driven business ecosystems. From elucidating the core concepts underpinning DLT to outlining pragmatic approaches for ecosystem development, we will provide insights that empower entrepreneurs, business leaders, and innovators to harness the full potential of DLT for forging resilient, symbiotic, and innovation-driven business ecosystems. By understanding the strategic synergy between DLT and ecosystem dynamics, organizations can chart a course toward sustainable success in an increasingly interconnected global economy.

Distributed Ledger Technology (DLT) refers to the technological framework and protocols enabling concurrent access, validation, and updating of records within a networked database.

DLT forms the foundation of blockchain systems, enabling users to observe all modifications along with their originators. This minimizes the necessity for data auditing, upholds data reliability, and restricts access solely to authorized parties.

Distributed Ledger Technologies (DLTs) provide a secure and precise means of storing information through cryptography. Data access is facilitated by cryptographic keys and signatures. Once stored, this information can transform into an unalterable database; the networks regulations, embedded within the database programming, oversee the ledger.

The immutability of distributed ledgers depends on their programming; they remain unchangeable if designed to be so. Blockchains, due to their decentralized public nature, inherently possess immutability.

The decentralized, encrypted nature of distributed ledgers contributes to their resilience against cybercrime. To succeed, attackers must breach all copies distributed across the network simultaneously. Moreover, the peer-to-peer sharing and updating of records streamline the process, enhancing speed, efficiency, and cost-effectiveness.

Every device in the distributed ledger network retains a ledger copy, known as a node. The network can comprise numerous nodes. Any ledger alterations, such as data transfer between blocks, are logged across all nodes. As each node possesses a ledger copy, it publishes its version featuring the latest transactions.

When consensus is reached within the network regarding the latest ledgers validity, transactions are encrypted, finalized, and serve as a foundation for subsequent transactions. This is how blockchains evolveeach block contains encrypted data pertaining to the preceding block, ensuring their tamper-resistant nature.

Various industries utilize Distributed Ledger Technology for diverse purposes, often as platforms for scalability and utilization. Hyperledger Fabric is a prominent example, offering modularity and scalability for businesses to create solutions spanning numerous sectors. Industries embracing DLT solutions encompass aviation, education, healthcare, insurance, manufacturing, transportation, and utilities.

DLTs hold significant potential for improving supply chains. These chains suffer from inefficiencies, inaccuracies, and vulnerabilities. Fujitsu, a global IT company, has harnessed distributed ledger technology to enhance supply chain transparency and combat fraud by securing and tracking data.

A business ecosystem comprises various entities such as suppliers, distributors, customers, partners, and even competitors who interact with each other to create value within a specific industry or market. These interactions can range from sharing resources and information to collaborating on projects and innovations.

By leveraging a DLT-based ecosystem, businesses can streamline these interactions, mitigate trust issues, and establish a foundation for sustainable growth.

Identify Participants and Roles: Define the various participants in your ecosystem and their respective roles. This could include suppliers, distributors, service providers, customers, and more. Determine how DLT can enhance their interactions and bring value to each participant.

Select the Right DLT Platform: Choose a DLT platform that aligns with the specific needs of your ecosystem. Ethereum, Hyperledger Fabric, and Corda are among the popular options. Consider factors such as scalability, security, and consensus mechanisms.

Design Smart Contracts: Smart contracts are self-executing contracts with terms and conditions directly written into code. These contracts automate and enforce agreements between participants, ensuring transparency and reducing the need for intermediaries. Design smart contracts that facilitate processes such as payment settlements, supply chain tracking, and data sharing.

Establish Consensus Mechanisms: Consensus mechanisms are protocols that ensure all participants agree on the state of the shared ledger. Different mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), offer varying levels of security and efficiency. Choose a consensus mechanism that suits the needs of your ecosystem.

Ensure Data Privacy and Security: Implement encryption and access controls to safeguard sensitive data shared within the ecosystem. DLT offers cryptographic techniques that enhance data privacy while allowing authorized parties to access relevant information.

Enable Interoperability: In a diverse ecosystem, participants might use different systems and technologies. Ensure that your DLT solution supports interoperability, allowing seamless data exchange between different platforms and systems.

Encourage Participation and Collaboration: Incentivize participants to engage actively within the ecosystem. Use tokens or rewards to encourage collaboration, innovation, and value creation.

Provide a User-Friendly Interface: Not all ecosystem participants will be tech-savvy. Develop an intuitive user interface that simplifies interactions with the DLT ecosystem. This enhances adoption and minimizes friction.

Continuous Monitoring and Improvement: Regularly assess the performance of your DLT-based ecosystem. Collect feedback from participants and identify areas for improvement. DLT ecosystems, like any other system, require ongoing optimization.

Distributed Ledger Technology (DLT) holds a vast array of practical applications that reshape how we interact, transact, and validate information in a decentralized and secure manner. It transcends conventional boundaries by underpinning a myriad of applications that redefine trust, security, and efficiency in various sectors. As technology continues to evolve, exploring these innovative applications underscores the transformative power of DLT in reshaping our digital and physical interactions.

Here are several compelling examples of specific use cases that highlight the transformative potential of DLT:

DLT stands as a foundational tool for recording transactions in a secure and transparent manner. While conventionally associated with financial records, DLT extends beyond fiscal contexts, capable of chronicling diverse transaction types.

By establishing a decentralized ledger, DLT ensures that every inflow and outflow is traceable and verifiable, eliminating the need for a central authoritys validation.

One of DLTs groundbreaking utilities lies in crafting impregnable digital identities. Through its tamper-proof nature, DLT establishes a reliable mechanism to verify individuals identities, safeguarding against identity theft and unauthorized access.

This innovation promises a more secure and trustworthy foundation for identity management in our digital age.

Leveraging DLT to develop secure and transparent voting systems heralds a new era of trust in democratic processes. By creating an unalterable record of votes, DLT eradicates the risks of voter fraud and manipulation, preserving the integrity of elections.

This ledger-driven approach fosters a collective opinion repository, enhancing credibility and equity in decision-making.

DLT introduces the concept of smart contracts, revolutionizing how agreements are executed. These contracts automatically fulfill predetermined terms based on real-time conditions.

For instance, an insurance claim could promptly trigger fund release once verified, minimizing errors and discouraging illicit activities by malicious entities.

The potential of DLT to record property transactions holds great promise. By forging an immutable record of property ownership and transfers, DLT combats fraudulent practices while enhancing transparency.

Although certain challenges exist in transcribing physical asset ownership to the digital realm, DLT can serve as an irrefutable source of truth for ownership records.Benefits of a DLT-Powered Business Ecosystem.

As businesses embrace the need for interconnectedness and collaboration, creating a robust ecosystem has become a strategic imperative.

Leveraging Distributed Ledger Technology offers a powerful means to achieve this goal. By carefully designing the ecosystem, selecting the right DLT platform, and fostering collaboration among participants, businesses can pave the way for a thriving ecosystem that drives growth, innovation, and sustainable success in an increasingly competitive world.

Smart contracts are self-executing agreements coded into the DLT. They automate processes and trigger actions based on predefined conditions. In a business ecosystem, smart contracts streamline interactions, ensuring that agreed-upon terms are automatically executed, reducing the need for intermediaries.

Yes, DLT-powered ecosystems can be adapted for businesses of all sizes. Small businesses benefit from reduced barriers to entry, while larger enterprises can leverage DLT to optimize complex operations and collaborations.

DLT-powered ecosystems are designed to be adaptable to technological advancements. As long as the underlying DLT framework remains relevant, these ecosystems can evolve to incorporate emerging trends and maintain their relevance.

Yes, DLT-powered ecosystems can coexist and even complement traditional models. Businesses can strategically integrate DLT to enhance specific aspects of their operations while retaining elements that continue to serve them well.

DLT provides a foundation for trust, efficiency, and innovation by enabling participants to share data and execute transactions without relying on a central authority. This fosters a dynamic environment where entities collaborate, exchange value, and collectively deliver enhanced products or services.

Go here to read the rest:

Strategic Steps and Pivotal Considerations In Building A DLT ... - Cryptopolitan

Read More..

Nearly $1 billion lost to crypto exploits, hacks, and scams in 2023 … – Cryptopolitan

Description

In a year that has seen the cryptocurrency market continue to mature, a darker narrative has also unfolded. Nearly $1 billion has been lost to various forms of cybercrime in the crypto space in 2023, according to a report by CertiK, a blockchain security firm August alone sees $45.8 million in losses Data from CertiK, Read more

In a year that has seen the cryptocurrency market continue to mature, a darker narrative has also unfolded. Nearly $1 billion has been lost to various forms of cybercrime in the crypto space in 2023, according to a report by CertiK, a blockchain security firm

Data from CertiK, a blockchain security company, revealed that the month of August alone accounted for approximately $45.8 million in losses due to crypto-related exploits, hacks, and scams.

The breakdown shows that exit scams were responsible for around $26 million of the losses. Flash loans, a relatively new form of uncollateralized lending in the DeFi space, contributed to about $6.4 million in losses. Exploits, which include vulnerabilities in smart contracts and other blockchain technologies, made up the remaining $13.5 million.

Exit scams have been a significant contributor to the losses, often involving projects that collect funds from investors and then disappear. Flash loans, on the other hand, are a newer phenomenon. These are essentially unsecured loans that must be returned within the same transaction block. While they offer legitimate use cases, they have also been exploited for quick profits, contributing to the losses seen in August.

CertiK has identified several major incidents that resulted in significant financial losses. Specifically, the Zunami Protocol attack led to $2.2 million in losses, the Exactly Protocol exploit resulted in $7.3 million in losses, and the PEPE withdrawal incident resulted in losses of $13.2 million.

As per CertiK, the total loss due to hacks, scams, and exploits in 2023 has surpassed $997 million. This amount includes around $261 million lost to flash loan attacks, over $137 million lost to exit scams, and more than $596 million lost to exploits.

Although the losses in August are still considerable, they are significantly lower than those incurred in the previous month. In July 2023, crypto investors lost about $303 million worth of digital assets in cryptocurrency exploits and hacker attacks.

The losses in August are part of a larger trend that has seen almost $1 billion siphoned off in various crypto-related cybercrimes throughout 2023. This comes at a time when the global cryptocurrency market cap has exceeded $2 trillion, according to data from CoinMarketCap.

The increasing losses indicate that as the market grows, so does the incentive for illicit activities. Regulatory bodies like the U.S. Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC) have been ramping up efforts to crack down on crypto-related crimes. Still, the numbers suggest that more needs to be done to secure this burgeoning financial ecosystem.

See the original post:

Nearly $1 billion lost to crypto exploits, hacks, and scams in 2023 ... - Cryptopolitan

Read More..

From Photons to Photosynthesis: Quantum Computer Reveals Atomic Dynamics of Light-Sensitive Molecules – SciTechDaily

Experimental results from a quantum computer (left) that match well with theory (right) are the first quantum-based method to show a quantum effect in the way light-absorbing molecules interact with incoming photons. Credit: Jacob Whitlow, Duke University

A quantum computer slowed simulated molecular quantum effects by a billion times, allowing researchers to directly measure them for the first time.

Researchers at Duke University have implemented a quantum-based method to observe a quantum effect in the way light-absorbing molecules interact with incoming photons. Known as a conical intersection, the effect puts limitations on the paths molecules can take to change between different configurations.

The observation method makes use of a quantum simulator, developed from research in quantum computing, and addresses a long-standing, fundamental question in chemistry critical to processes such as photosynthesis, vision, and photocatalysis. It is also an example of how advances in quantum computing are being used to investigate fundamental science.

The results were published on August 28 in the journal Nature Chemistry.

As soon as quantum chemists ran into these conical intersection phenomena, the mathematical theory said that there were certain molecular arrangements that could not be reached from one to the other, said Kenneth Brown, the Michael J. Fitzpatrick Distinguished Professor of Engineering at Duke. That constraint, called a geometric phase, isnt impossible to measure, but nobody has been able to do it. Using a quantum simulator gave us a way to see it in its natural quantum existence.

Conical intersections can be visualized as a mountain peak touching the tip of its reflection coming from above and govern the motion of electrons between energy states. The bottom half of the conical intersection represents the energy states and physical locations of an unexcited molecule in its ground state. The top half represents the same molecule but with its electrons excited, having absorbed energy from an incoming light particle.

The molecule cant stay in the top state its electrons are out of position relative to their host atoms. To return to the more favorable lower energy state, the molecules atoms begin rearranging themselves to meet the electrons. The point where the two mountains meet the conical intersection represents an inflection point. The atoms can either fail to get to the other side by readjusting to their original state, dumping excess energy in the molecules around them in the process, or they can successfully make the switch.

Because the atoms and electrons are moving so fast, however, they exhibit quantum effects. Rather than being in any one shape at any one place on the mountain at any given time, the molecule is actually in many shapes at once. One could think of all these possible locations as being represented by a blanket wrapped around a portion of the mountainous landscape.

However, due to a mathematical quirk in the system that emerges from the underlying mathematics, called a geometric phase, certain molecular transformations cant happen. The blanket cant wrap entirely around the mountain.

If a molecule has two different paths to take to get to the same final shape, and those paths happen to surround a conical intersection, then the molecule wouldnt be able to take that shape, said Jacob Whitlow, a doctoral student working in Browns laboratory. Its an effect thats hard to gain intuition for, because geometric phase is weird even from a quantum mechanical standpoint.

Measuring this quantum effect has always been challenging because it is both short-lived, on the order of femtoseconds, and small, on the scale of atoms. And any disruption to the system will prevent its measurement. While many smaller pieces of the larger conical intersection phenomenon have been studied and measured, the geometric phase has always eluded researchers.

If conical intersections exist which they do then the geometric phase has to exist, said Brown, who also holds appointments in Duke physics and chemistry. But what does it mean to say something exists that you cant measure?

In the paper, Whitlow and coworkers used a five-ion quantum computer built by the group of Jungsang Kim, the Schiciano Family Distinguished Professor of Electrical and Computer Engineering at Duke. The quantum computer uses lasers to manipulate charged atoms in a vacuum, providing a high level of control. Whitlow and Zhubing Jia, a PhD student in Browns laboratory, also expanded the capability of the system by developing ways to physically nudge the floating ions within their electromagnetic traps.

Based on how the ions are moved and the quantum state that theyre placed in, they can fundamentally exhibit the exact same quantum mechanisms as the motion of atoms around a conical intersection. And because the quantum dynamics of the trapped ions are about a billion times slower than those of a molecule, the researchers were able to make direct measurements of the geometric phase in action.

The results look something like a two-dimensional crescent moon. As depicted in the conical intersection graph, certain configurations on one side of the cone fail to reach the other side of the cone even though there is no energy barrier. The experiment, Brown says, is an elegant example of how even todays rudimentary quantum computers can model and reveal the inner quantum workings of complex quantum systems.

The beauty of trapped ions is that they get rid of the complicated environment and make the system clean enough to make these measurements, said Brown.

An independent experiment at the University of Sydney, Australia has also observed the effects of the geometric phase using an ion trap quantum simulator. The approach differs in many technical details, but the overall observations are consistent. The Sydney work will be published in the same issue of Nature Chemistry.

Reference: Simulating Conical Intersections with Trapped Ions by Jacob Whitlow, Zhubing Jia, Ye Wang, Chao Fang, Jungsang Kim and Kenneth R. Brown, 28 August 2023, Nature Chemistry.DOI: 10.1038/s41557-023-01303-0

This work was supported by Intelligence Advanced Research Projects Activity (W911NF-16-1-0082), the National Science Foundation (Phy-1818914, OMA-2120757), the Department of Energy Office of Advanced Scientific Computing Research QSCOUT program (DE-0019449), and the Army Research Office (W911NF-18-1-0218).

Continue reading here:
From Photons to Photosynthesis: Quantum Computer Reveals Atomic Dynamics of Light-Sensitive Molecules - SciTechDaily

Read More..

Simulated Chemical Reaction ‘Magically’ Slowed by 100 Billion Times by Using Quantum Technologies – The Debrief

Researchers tapping into the unique capabilities of quantum physics report they have successfully slowed down a simulated chemical reaction by as much as 100 billion times, according to new research.

The process was previously considered impossible, even with the worlds fastest computers. But thanks to one of the most powerful quantum computers currently available, the researchers were finally able to simulate an event considered too fast to observe.

Human eyes operate at a juncture of physics and chemistry known as a conical intersection to perceive light. The same process is involved in photosynthesis and even solar power generation. Since the 1950s, scientists in chemistry and physics have theorized how this process actually works, but because it effectively takes place at light speed, no experiments could confirm those hypotheses.

In nature, the whole process is over within femtoseconds, explained Ph.D. student Olaya Agudelo from the University of Sydney School of Chemistry, where the breakthrough simulations took place. Thats a billionth of a millionth or one quadrillionth of a second.

Now, Agudelo and the rest of the Sydney research team say they have tapped into the unique abilities of a functioning quantum computer, allowing them to effectively slow down time in their simulated chemical reaction experiments enough to get the first-ever look at a conical intersection as it happens.

In their published work, which appears in the journal Nature Chemistry, the researchers behind this time-bending feat took advantage of the fact that their university has an actual working quantum computer in the Quantum Control Laboratory of Professor Michael Biercuk.

It is tremendous that at the University of Sydney, we have access to the countrys best programmable quantum computer to conduct these experiments, said the team leader and studys co-author, Associate Professor Ivan Kassal from the School of Chemistry and the University of Sydney Nano Institute.

According to the press release, the team used the trapped-ion quantum computer in a whole new way. This approach, they explain, allowed them to design and map this very complicated problem onto a relatively small quantum device and then slow the process down by a factor of 100 billion.

As a result, the simulated chemical reaction of the conical interaction of a single atom was slowed to a time scale that allowed for measurements and observations previously unattainable with traditional computers.

Using our quantum computer, we built a system that allowed us to slow down the chemical dynamics from femtoseconds to milliseconds, Agudelo explained. This allowed us to make meaningful observations and measurements.

This has never been done before, she added.

The studys joint lead author, Dr. Christophe Valahu from the School of Physics, echoed this sentiment, noting that Until now, we have been unable to directly observe the dynamics of geometric phase; it happens too fast to probe experimentally. Using quantum technologies, we have addressed this problem.

Significantly, Dr. Valahu also pointed out that their simulated chemical reaction is not a guess.

Our experiment wasnt a digital approximation of the process this was a direct analogue observation of the quantum dynamics unfolding at a speed we could observe, he said.

The Universitys release pointed out that the research was a joint effort by chemistry and physics professionals, something the researchers involved saw as a welcome change.

This is a fantastic collaboration between chemistry theorists and experimental quantum physicists, said study co-author Dr. Ting Rei Tan. We are using a new approach in physics to tackle a long-standing problem in chemistry.

The researchers behind the time-altering simulated chemical reaction also say that their work could offer a valuable new tool to engineers working in a wide range of disciplines where conical interactions occur.

It is by understanding these basic processes inside and between molecules that we can open up a new world of possibilities in materials science, drug design, or solar energy harvesting, said Agudelo. It could also help improve other processes that rely on molecules interacting with light, such as how smog is created or how the ozone layer is damaged.

Christopher Plain is a Science Fiction and Fantasy novelist and Head Science Writer at The Debrief. Follow and connect with him on X, learn about his books at plainfiction.com, or email him directly at christopher@thedebrief.org.

See more here:
Simulated Chemical Reaction 'Magically' Slowed by 100 Billion Times by Using Quantum Technologies - The Debrief

Read More..

Quantum Device Used To Slow Down Chemical Reaction by 100 Billion Times – SciTechDaily

Scientists at the University of Sydney used a quantum computer to slow and directly observe a key chemical reaction process, unveiling details previously unseen due to rapid timescales. This breakthrough offers new insights for materials science, drug design, and other fields.

What happens in femtoseconds in nature can now be observed in milliseconds in the lab.

Scientists at the University of Sydney have achieved a groundbreaking feat, directly observing a critical chemical reaction process by utilizing a quantum computer to slow it down by a factor of 100 billion times.

Joint lead researcher and PhD student, Vanessa Olaya Agudelo, said: It is by understanding these basic processes inside and between molecules that we can open up a new world of possibilities in materials science, drug design, or solar energy harvesting.

It could also help improve other processes that rely on molecules interacting with light, such as how smog is created or how the ozone layer is damaged.

Credit: Sebastian Zentilomo

Specifically, the research team witnessed the interference pattern of a single atom caused by a common geometric structure in chemistry called a conical intersection.

Conical intersections are known throughout chemistry and are vital to rapid photochemical processes such as light harvesting in human vision or photosynthesis.

Chemists have tried to directly observe such geometric processes in chemical dynamics since the 1950s, but it is not feasible to observe them directly given the extremely rapid timescales involved.

Lead authors Vanessa Olaya Agudelo and Dr. Christophe Valahu in front of the quantum computer in the Sydney Nanoscience Hub used in the experiment. Credit: Stefanie Zingsheim/University of Sydney

To get around this problem, quantum researchers in the School of Physics and the School of Chemistry created an experiment using a trapped-ion quantum computer in a completely new way. This allowed them to design and map this very complicated problem onto a relatively small quantum device and then slow the process down by a factor of 100 billion.

Their research findings were published on August 28 in the journal Nature Chemistry.

In nature, the whole process is over within femtoseconds, said Ms. Olaya Agudelo from the School of Chemistry. Thats a billionth of a millionth or one quadrillionth of a second.

Using our quantum computer, we built a system that allowed us to slow down the chemical dynamics from femtoseconds to milliseconds. This allowed us to make meaningful observations and measurements.

This has never been done before.

A wavepacket evolving around a conical intersection, measured experimentally using a trapped-ion quantum computer at the University of Sydney.To observe how a wavepacket behaves around a simulated conical intersection, researchers used a single trapped ion a single charged atom of ytterbium confined in a vacuum by electric fields.It was then controlled and measured by applying a complex and precise sequence of laser pulses.The mathematical model that describes conical intersections was then engineered into the trapped-ion system.The ion was then allowed to evolve around the engineered conical intersection.Researchers then constructed a movie of the ions evolution around the conical intersection (see GIF). Each frame of the GIF shows an image outlining the probability of finding the ion at a specific set of coordinates.Credit: University of Sydney

Joint lead author Dr. Christophe Valahu from the School of Physics said: Until now, we have been unable to directly observe the dynamics of geometric phase; it happens too fast to probe experimentally.

Using quantum technologies, we have addressed this problem.

Dr. Valahu said it is akin to simulating the air patterns around a plane wing in a wind tunnel.

Our experiment wasnt a digital approximation of the process this was a direct analog observation of the quantum dynamics unfolding at a speed we could observe, he said.

In photochemical reactions such as photosynthesis, by which plants get their energy from the Sun, molecules transfer energy at lightning speed, forming areas of exchange known as conical intersections.

This study slowed down the dynamics in the quantum computer and revealed the tell-tale hallmarks predicted but never before seen associated with conical intersections in photochemistry.

Co-author and research team leader, Associate Professor Ivan Kassal from the School of Chemistry and the University of Sydney Nano Institute, said: This exciting result will help us better understand ultrafast dynamics how molecules change at the fastest timescales.

It is tremendous that at the University of Sydney, we have access to the countrys best programmable quantum computer to conduct these experiments.

The quantum computer used to conduct the experiment is in the Quantum Control Laboratory of Professor Michael Biercuk, the founder of quantum startup, Q-CTRL. The experimental effort was led by Dr. Ting Rei Tan.

Dr. Tan, a co-author of the study, said: This is a fantastic collaboration between chemistry theorists and experimental quantum physicists. We are using a new approach in physics to tackle a long-standing problem in chemistry.

Reference: Direct observation of geometric-phase interference in dynamics around a conical intersection by C. H. Valahu, V. C. Olaya-Agudelo, R. J. MacDonell, T. Navickas, A. D. Rao, M. J. Millican, J. B. Prez-Snchez, J. Yuen-Zhou, M. J. Biercuk, C. Hempel, T. R. Tan and I. Kassal, 28 August 2023, Nature Chemistry.DOI: 10.1038/s41557-023-01300-3

The research was supported by grants from the US Office of Naval Research; the US Army Research Office Laboratory for Physical Sciences; the US Intelligence Advanced Research Projects Activity; Lockheed Martin; the Australian Defence Science and Technology Group, Sydney Quantum; a University of Sydney-University of California San Diego Partnership Collaboration Award; H. and A. Harley; and by computational resources from the Australian Governments National Computational Infrastructure.

Read the original here:
Quantum Device Used To Slow Down Chemical Reaction by 100 Billion Times - SciTechDaily

Read More..

Quantum computing and ethics – Scientific Computing World

New technology and ethics are inseparably linked in today's rapidly evolving technological landscape. Quantum computing is no exception: as we stand on the precipice of a new era of computing, the ethical considerations that arise are complex and far-reaching. As a company that recognises the importance of these ethical consideration and is committed to responsible innovation, we believe that these concerns must be understood and addressed.

Ethical quantum concerns typically fall into several major categories:

1. Resource Allocation and Inequality: Quantum computing is a resource-intensive technology, both in terms of the physical resources required to build quantum computers and the human resources needed to program and operate them. Such resources are available only to a few nations. Given this, and given the rise in quantum nationalism - the development of country-specific quantum programs - will the benefits of quantum computing primarily accrue to the wealthy, developed nations that can afford to invest in it? This could further deepen global socio-economic divides. Within the legal frameworks of the countries QuEra operates in, we seek to provide equitable access to potential users, whether via the cloud or by owning a quantum computer.

2. Misuse of power: a sufficiently powerful quantum computer could one day break many current encryption schemes leading to unparalleled breaches of privacy and security. Thats why many experts warn against bad actors that implement Store Now Decrypt Later, capturing encrypted information today while hoping to decrypt it in a few years. This is especially relevant for information with a long shelf life such as medical records or certain financial transactions

3. Accountability and Transparency: The complexity of quantum algorithms could lead to a lack of transparency and accountability. If a quantum algorithm, for instance, makes a mistake or causes harm, it may be difficult to understand why or how it happened. Ensuring such explainability is a key requirement of many algorithms such as those deciding the outcome of a loan application. At QuEra, we seek to understand the reasons certain algorithms work and share this knowledge with our customers.

4. Job Displacement: The increased processing power and efficiency of quantum computers could automate many jobs currently performed by humans, leading to potential job displacement. We do our best to support education and re-training programs both to address the potential of job displacement as well as to train the next generation of scientists and technicians that will help build, program and maintain these advanced machines.

Some of these categories, such as job displacement, are not specific to quantum computing and present themselves when discussing other technologies such as AI or robotics. Others breaking the encryption system - are specific to quantum, whereas AI presents its own unique challenges such as bias and discrimination, the ability to generate artificial consciousness.

Striving to address these concerns, several organisations have started constructing ethical frameworks for quantum computing. The World Economic Forum has developed a set of Quantum Computing Governance Principles that aim to guide the responsible development and use of quantum computing including inclusiveness and equity, security and safety, environmental sustainability, and transparency and accountability. The National Academies of Sciences, Engineering, and Medicine has published a report on The Ethics of Quantum Computing that identifies a number of ethical issues including the potential malicious use of quantum computing, the potential to disrupt existing industries, the negative environmental potential, and the need to ensure that quantum computing is developed and used in a way that is fair and equitable. Last, Deloitte has developed a Trustworthy & Ethical Tech Framework that can be used to guide the development and use of quantum computing.

Beyond ethical frameworks, one could imagine some solutions. Job displacement, for instance, is often associated with the introduction of transformative technologies. Factory workers that manually assembled cars might find themselves displaced by robots, but these robots need to be built and serviced by people. If quantum computers make certain jobs obsolete, they open other opportunities.

Other solutions might require multinational collaboration. For example, the World Health Organization serves an important function that ultimately helps both developed as well as developing nations. Promoting standards, monitoring global trends, and coordinating emergency responses have helped address inequality in healthcare, benefiting all. Similarly, a World Quantum Organization might provide shared quantum resources to benefit all, not just those that could develop an autonomous quantum ecosystem.

Concurrent with developing solutions and ethical frameworks, there is a need to educate and inform the public, policymakers, and stakeholders about the potential implications of quantum computing to foster informed discussions about its ethical, social, and economic impacts.

Quantum computing's potential to revolutionise industries is matched by the complexity of the ethical considerations it raises. At QuEra, we recognise these challenges and are committed to responsible innovation that prioritises inclusiveness, security, and sustainability. Collaborative efforts, such as the proposed 'World Quantum Organization,' resonate with our belief in shared quantum resources and global partnerships, and we invite interested parties to engage with us. As we navigate this exciting frontier, we must do so with both eyes open to the potential downsides, ready to tackle them head-on, and always guided by ethical principles.

Yuval Boger is the Chief Marketing Officer at QuEra Computing.

Go here to see the original:
Quantum computing and ethics - Scientific Computing World

Read More..

Post-Quantum Cryptography Should Be Part Of Your Security Strategy – Forbes

McClure, Manager, Quantum Engineering, IBM Research on October 18, 2019 at IBM's research facility in Yorktown Heights, N.Y. (Photo by Misha Friedman/Getty Images)Getty Images

The news that IBMIBM has used a quantum computer to solve a problem that that stumps the leading classical methods is another step on the road to what has become known as quantum advantage, where a quantum system solves a problem that cannot be solved by any amount of classical computation. For those of us in and around fintech, the one problem that we really want to solve is breaking public key cryptography so that we can forge digital signatures, get access to bank systems and, of course, steal a lot of BitcoinBTC.

This is important stuff. In the British governments new technology strategy, quantum computing is one of the priority technologies and it is easy to understand why. That point about solving problems beyond the reach of existing computers means that there is something of an arms race underway, with quantum supremacy as the goal.

It will take a while to get to the aforementioned quantum supremacy, where quantum computers can outgun the classical incumbents. But the IBM solution is already at 127 qubits (quantum bits). If quantum computers are put up against a classical supercomputer capable of up to a quintillion (10^18) floating-point operations per second, quantum supremacy could be reached with as few as 208 qubits. Quantum supremacy isnt science fiction.

Now, as is well known, one of the interesting problems that a quantum computer can solve is breaking the asymmetric cryptography at the heart of cryptocurrency in order to transfer money out of lost or abandoned wallets. If you look at Bitcoin, for example the accountants Deloitte reckon that about four million Bitcoins will be vulnerable to such an attack. That means there are billions of dollars up for grabs in a quantum computing digital dumpster dive.

If we apply quantum computers to the problem of breaking the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so, researchers calculate it would require 317 106 physical qubits to break the encryption within one hour using the surface code, a code cycle time of 1 s, a reaction time of 10 s, and a physical gate error of 103 10 3. To instead break the encryption within one day, it would require 13 106 physical qubits. So never mind quantum supremacy with a few hundred quibits, quantum computers would need millions of physical qubits to be a threat to Bitcoin.

OK, thats not going to happen tomorrow. Nevertheless, quantum computing will come. So is the sky falling in for the banks and the credit card companies and mobile operators and the military and everyone else who uses public key cryptography then? Well, no. They are not idiots with their heads in the sand and they are already planning to adopt a new generation of Quantum Resistant Cryptographic (QRC) algorithms to defend their data against the inevitable onslaught from quantum computers in unfriendly hands.

They have been looking towards the National Institute of Standards and Technology (NIST), which last year selected a set of algorithms designed to withstand such an onslaught after a six-year effort to devise encryption methods that could resist an attack from a future quantum computer that is more powerful than the comparatively limited machines available today. NIST has now released these algorithms as standards ready for use out in the wild.

(If you are interested in the details, the algorithms are:

CRYSTALS-Kyber, designed for general encryption purposes such as creating secure websites, is covered in FIPS 203;

CRYSTALS-Dilithium, designed to protect the digital signatures we use when signing documents remotely, is covered in FIPS 204;

SPHINCS+, also designed for digital signatures, is covered in FIPS 205;

FALCON, also designed for digital signatures, is slated to receive its own draft FIPS in 2024.)

These algorithms are important because, as noted, while there are no cryptography-breaking quantum computers around right now, they will come. As the quantum technology advances, there will be an inevitable competition between the quantum computers that can break cryptographic algorithms and the cryptography community's efforts to develop quantum-resistant algorithms. This means there will be a period where entities (eg, Visa and the DoD, not just Bitcoin) will be transitioning to new cryptographic methods.

That period is now, by the way, which is why the US Cybersecurity and Infrastructure Security Agency (CISA) has just issued a note calling on critical infrastructure and other organizations to begin work now to create road maps for how theyll migrate to QRC.

(The cryptocurrency world should follow suit so that if and when quantum computers become a threat, then cryptocurrencies can be updated to use QRC. This would be a significant undertaking, but it's theoretically possible.)

Technology strategists in banks, fintechs and crypto know why these standard algorithms are being pushed out now, when any actual quantum computer is still some years away. The fact is that you can be at risk from quantum computers that do not yet exist because of what is known as the harvest now, decrypt later attack. Its the idea that your enemy could copy your data, which is encrypted, and they can hold onto it right now. They cant read it. But maybe when a quantum computer comes out in 10 years, then they can get access to your data.

If the information youre protecting is valuable enough, then youre already in trouble because of that threat and you need to start working on your road map soon.

Aninternationally-recognised thought leader in digital identity and digital money named one of the global top 15 favourite sources of business information byWiredmagazine; ranked one of the top ten most influential voices in banking byFinancial Brand; created one of the top 25must read financial ITblogs and identified byPR Dailyas one of thetop ten Twitter accounts followed by innovators, alongside Bill Gates and Richard Branson.

View original post here:
Post-Quantum Cryptography Should Be Part Of Your Security Strategy - Forbes

Read More..