Between quantum physics and ‘blockchain’: a quantum generator of random traps proof numbers | Technology | EUROtoday
There are processes through which to ensure likelihood is important to make sure the legitimacy of the outcomes, such because the lottery, the choice of members of the electoral tables or the beneficiaries of a promotion of social housing. This randomness can be essential to defend community security, particularly since Peter Shor, a mathematician of the Massachusetts Institute of Technology, demonstrated 30 years in the past {that a} quantum laptop can clear up a factorization drawback (decomposition of an algebraic expression within the type of a product) effectively. This factorization will depend on the cryptography that sustains from the most typical financial institution transaction to conversations on messaging platforms. An investigation that publishes Nature This Wednesday gives a horse answer between quantum physics and blockchainthe cryptocurrency system and different processes: a random lure -proof numbers generator.
Dozens of net pages and functions provide packages for the technology of random numbers. They serve to unravel home playing or throw proposals for keys. “However”, as defined by researchers, headed by physicist Gautam Kavuri, from the University of Colorado, “the current random numbers generators that are based on the hardware [equipamiento] existing require a level of confidence that the system has not been pirated or manipulated at some point during the process and, therefore, there is no clear way to certify if a particular generator is really random. ”
Kavuri and the rest of the scientists, among which is the Spanish Carlos Abellán, propose a system that starts from the nature of quantum mechanics to “offer random numbers characterized by both uniformity and unpredictability”.
The system, called Colorado University Randomness Beacon (Curby), consists of the measurement of two photons 110 meters away at the same time. Each step of the measurement process is recorded in a data sequence called “Chain hash”, A model inspired by the blockchain that makes any attempt to manipulate the process detectable and that, any attempt to alter this pass also by the practically impossible manipulation of all the links of the chain.
During the system tests, 7,434 certified random numbers of 7,454 attempts for 40 days were generated, which shows a success rate of 99.7%. The meager percentage of error is mostly attributed to “programming failures throughout information assortment.”
The generators of existing random numbers are “auditable” (process exam), but cannot guarantee that their results are unpredictable since the origin can be manipulated or manipulated. “An attacker who discovers the preliminary tickets can completely predict their outputs,” they warn.
However, in the curby “the results can be traced and completely certified as unpredictable. hash intertwined to trace and cryptographically verify the extraction process, ”according to the researchers.
“Being in a position to confirm and audit the random numbers to detect potential manipulations and exhibit unpredictability is important to determine the general public’s confidence in these functions,” details the Curby team, which indicates among possible cases of use the public resources raffles, lotteries, random selections, choice of parameters in public cryptographic schemes and electronic electoral processes.
The quantum nature of the system guarantees the unpredictability of the results. The traceability of the entire process is based on a model similar to blockchaina system proposed in classical computing as one of the safest. “Instead that one half controls the complete means of random technology, we distribute the protocol between a number of impartial elements that should work collectively to provide it. Each motion that every celebration takes have to be registered in order that it isn’t manipulable and that may be verified or audited independently,” clarify the researchers on the protocol that they’ve baptized as “twine hash.
“Each data block includes a hashor a fingerprint, of the previous block. This means, in the first place, that any subsequent block in the chain must have been created before the previous ones. Second, any subsequent change in a given data block would result in an inconsistency unless each subsequent block is also modified, ”argue the authors.
“In other words,” the researchers clarify, “so that a malicious actor goes unnoticed, needs to surreptitiously rewriting the record not only of his own chain of hashbut also of the chain of hash of all others that are connected. As the number of independent parts in the network grows, such action becomes increasingly difficult. ”
Coincides in an article associated with the publication of Nature Quantum Information Professor Peter Brown, oblivious to the study and who insists on this aspect: “For a third to control the final output of the random numbers generator [CURBy] Without being detected, the records of the measurements of intertwining and all the chains hash They would have to be committed to several geographical locations. ”
The incorporation of quantum computing to the safety of digital society is key. Their skills are extraordinary to create, but in addition to violate, as Shor warned in 1994. In this sense, Jay Gambetta, accountable for the quantum developments of IBM and oblivious to the examine revealed on Tuesday, has alerted within the presentation of Starling on the necessity for the event and safety profession to be parallel: “The present encryption will likely be damaged with quantum computing, so we have to make the transition as an business secure quantum algorithms.
https://elpais.com/tecnologia/2025-06-12/entre-la-fisica-cuantica-y-el-blockchain-un-generador-cuantico-de-numeros-aleatorios-a-prueba-de-trampas.html