Quantum Computing: A Threat to Blockchain Technology and Potential Solutions
DOI:
https://doi.org/10.63949/Keywords:
- Classical computing,
- Quantum computing,
- Blockchain technology,
- Cryptographic algorithms
Abstract
This article explores the potential implications of quantum computing in the field of blockchain technology. The inherent security and immutability of blockchain technology may be compromised by the future ability of quantum computers to undermine the cryptographic methods upon which its security is built. This article examines the potential impact of quantum computing on blockchain technology, specifically focusing on the vulnerabilities that may arise from the utilization of Grover’s algorithm, which might potentially undermine the validity and integrity of the blockchain. Furthermore, the essay delves into the ongoing research and development endeavors in the fields of blockchain and quantum computing. It also examines prospective remedies to address the risks associated with quantum computing, such as the use of cryptographic algorithms that are resistant to quantum attacks. The conclusion underscores the significance of remaining abreast of the most recent advancements in this domain and adopting proactive strategies to mitigate the potential impact of quantum computing on blockchain technology.
Downloads
References
[1] S. Nakamoto, B. Bit, et al., “Bitcoin: A peer-to-peer electronic cash system,” 2008, 2007.
[2] B. Marr, “How blockchain technology could change the world,” Forbes, May, vol. 27, 2016.
[3] C. Puviraj, B. Nikhil, S. Vishal, K. Tamizhanban, R. Dhanalakshmi, and S. Lakshmipriya, “Study of decentralized database network using concepts of blockchain,” in 2021 International Conference on Simulation, Automation & Smart Manufacturing (SASM), pp. 1–5, IEEE, 2021.
[4] M. M. Amanullah, S. Arjun, and K. Leelasankar, “Fuzzy inference system based non fungible token forum application,” in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 881–884, IEEE, 2022.
[5] H. Singh and K. Leelasankar, “Ethereum-based p2p lending system (dao app): Qualitative review of a possible replacement for lending practices,” in International Conference on Computing, Communication, Electrical and Biomedical Systems, pp. 369–375, Springer, 2022.
[6] M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?,” IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, 2018.
[7] R. Bansal, M. Khanna, and N. K. Rajput, “A qualitative evaluation of multiple quantum computing frameworks,” in 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT), vol. 1, pp. 1296–1302, IEEE, 2024.
[8] X. Peng, Z. Liao, N. Xu, G. Qin, X. Zhou, D. Suter, and J. Du, “Quantum adiabatic algorithm for factorization and its experimental implementation,” Physical review letters, vol. 101, no. 22, p. 220405, 2008.
[9] P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM review, vol. 41, no. 2, pp. 303–332, 1999.
[10] S. Krendelev and P. Sazonova, “Parametric hash function resistant to attack by quantum computer,” in 2018 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 387–390, IEEE, 2018.
[11] A. Prakash, R. Krishnaveni, and R. Dhanalakshmi, “Continuous user authentication using multimodal biometric traits with optimal feature level fusion,” International Journal of Biomedical Engineering and Technology, vol. 34, no. 1, pp. 1–19, 2020.
[12] R. S. Ram, S. S. Murthi, R. S. Narayanan, R. Venkatesh, R. Dhanalakshmi, and S. Bairavel, “Application to filter unwanted messages from osn user walls,” in 2021 International Conference on Simulation, Automation & Smart Manufacturing (SASM), pp. 1–5, IEEE, 2021.
[13] National Institute of Standards and Technology, “Workshop on cybersecurity in a post-quantum world.” https://www.nist.gov/news-events/events/2015/04/ workshop-cybersecurity-post-quantum-world, Apr. 2015. Accessed: Nov. 2, 2019.
[14] P. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer proc 35th ann symp found comp sci (ieee computer society, los alamitos, ca),” 1994.
[15] D. Aggarwal, G. K. Brennen, T. Lee, M. Santha, and M. Tomamichel, “Quantum attacks on bitcoin, and how to protect against them,” arXiv preprint arXiv:1710.10377, 2017.
[16] ETSI Technical Committee CYBER, “Quantum-safe cryptography (qsc); limits to quantum computing applied to symmetric key sizes,” Tech. Rep. ETSI GR QSC 006 V1.1.1, European Telecommunications Standards Institute (ETSI), 2016. Accessed: Nov. 2, 2025.
[17] L. K. Grover, “A fast quantum mechanical algorithm for database search,” in Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp. 212–219, 1996.
[18] I. Abdikhakimov, “The interplay of quantum computing, blockchain systems, and privacy laws: Challenges and opportunities,” Elita. uz-Elektron Ilmiy Jurnal, vol. 2, no. 1, pp. 1–12, 2024.
[19] E. Dervisevic, A. Tankovic, E. Fazel, R. Kompella, P. Fazio, M. Voznak, and M. Mehic, “Quantum key distribution networks-key management: A survey,” ACM Computing Surveys, vol. 57, no. 10, pp. 1–36, 2025.
[20] Y. Baseri, A. Hafid, Y. Shahsavari, D. Makrakis, and H. Khodaiemehr, “Blockchain security risk assessment in quantum era, migration strategies and proactive defense,” IEEE Communications Surveys & Tutorials, 2025.

