Lottery and Auction on Quantum Blockchain.

Entropy (Basel)

MakoLab SA, 91-062 Lodz, Poland.

Published: December 2020

This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids' binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7762094PMC
http://dx.doi.org/10.3390/e22121377DOI Listing

Publication Analysis

Top Keywords

quantum blockchain
12
auction quantum
8
protocol lottery
8
protocol auction
8
decentralization unconditional
8
unconditional security
8
lottery auction
4
quantum
4
blockchain paper
4
paper proposes
4

Similar Publications

Interest in supporting Federated Learning (FL) using blockchains has grown significantly in recent years. However, restricting access to the trained models only to actively participating nodes remains a challenge even today. To address this concern, we propose a methodology that incentivizes model parameter sharing in an FL setup under Local Differential Privacy (LDP).

View Article and Find Full Text PDF

Land use planning tools are essential for effective land management. However, existing research has not thoroughly explored the evolution and future potential of these tools. This study addresses this gap through comprehensive literature review and data collection, mapping the progression of land use planning tools from their inception to their future trajectories.

View Article and Find Full Text PDF

Introduction: The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised to enhance the effectiveness of cybersecurity strategies by offering advanced capabilities for intrusion detection, malware classification, and privacy preservation. However, this work addresses the significant lack of a comprehensive synthesis of AI's use in cybersecurity and privacy across the vast literature, aiming to identify existing gaps and guide further progress.

View Article and Find Full Text PDF

This survey delves into cross-layer energy-efficient solutions and cutting-edge security measures for Internet of Things (IoT) networks. The conventional security techniques are considered inadequate, leading to the suggestion of AI-powered intrusion detection systems and novel strategies such as blockchain integration. This research aims to promote the development of smart cities by enhancing sustainability, security, and efficiency in the industrial and agricultural sectors through the use of IoT, blockchain, AI, and new communication technologies like 5G.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!