MATHEMATICAL MODELING AND ADAPTATION STRATEGIES IN THE CONFRONTATION BETWEEN CRYPTOCURRENCIES AND QUANTUM COMPUTERS

Authors

  • Lakhno Valeriy National University of Life and Environmental Sciences of Ukraine image/svg+xml
  • Kasatkin Dmytro National University of Life and Environmental Sciences of Ukraine image/svg+xml

Keywords:

quantum computing, cryptocurrencies, cryptographic resilience, mathematical modeling, resource allocation, quantum threats, protection strategies

Abstract

This article is dedicated to studying the resilience of cryptocurrency systems (CCS) under new threats associated with the development of quantum computing. A differential game model is introduced, allowing for the formalization of the interaction between CCS and quantum computers (QC), as well as the analysis of their mutual influence. The research methodology is based on the application of differential game theory to model the dynamics of resource allocation between the parties and to evaluate their strategies under conditions of uncertainty and competition. Various scenarios of confrontation between CCS and quantum computing were considered during the modeling process, which made it possible to identify key patterns and factors that significantly affect the effectiveness of cryptographic protection, as well as the computational capabilities of attackers utilizing QCs. Special attention is given to the analysis of different methods for protecting digital assets under potential quantum threats. The results of the study may serve as a foundation for developing new cryptographic security standards and adaptive protection strategies that will remain effective amid the rapid growth of quantum computing capabilities

References

1. Osipovich, A. (2024). A looming threat to Bitcoin: The risk of a quantum hack. The Wall Street Journal. https://www.wsj.com/tech/cybersecurity/a-looming-threat-to-bitcoin-the-risk-of-a-quantum-hack-24637e29

2. Horbenko, I. D., Kuznietsov, O. O., Potii, O. V., Horbenko, Yu. I., Hanzia, R. S., & Ponomar, V. A. (2016). Postkvantova kryptohrafiia ta mekhanizmy yii realizatsii [Post-quantum cryptography and its implementation mechanisms]. Radiotekhnika [Radio Engineering], (186), 32–52.

3. Potii, O. V., & Isirova, K. V. (2017). Analiz vymoh ta modelei bezpeky dlia postkvantovoi kryptohrafii [Analysis of requirements and security models for post-quantum cryptography]. Matematychne ta kompiuterne modeliuvannia. Seriia: Tekhnichni nauki [Mathematical and Computer Modeling. Series: Technical Sciences], (16), 192–197.

4. Holmes, S., & Chen, L. (2021). Assessment of quantum threat to bitcoin and derived cryptocurrencies (Report 2021/190). Cryptology ePrint Archive. https://eprint.iacr.org/2021/190

5. Ostrianska, Y. V., Yesina, M. V., & Gorbenko, I. D. (2022). Analiz pohliadiv Yevropeiskoho soiuzu na kvantovo- postkvantovi obmezhennia [Analysis of the European Union's views on quantum and post-quantum constraints]. Radiotekhnika [Radio Engineering], (210), 87–98.

6. Denker, K., & Javaid, A. Y. (2019). Quantum computing as a threat to modern cryptography techniques. In Proceedings of the International Conference on Pharmaceutical Sciences (FCS) (pp. 3–8). The Steering Committee of World Congress in Computer Science, Computer Engineering and Applied Computing.

7. Khodaiemehr, H., Bagheri, K., & Feng, C. (2023). Navigating the quantum computing threat landscape for blockchains: A comprehensive survey. Authorea.

8. Raheman, F. (2024). Futureproofing blockchain & cryptocurrencies based on evolving vulnerabilities & Q-Day threat with quantum-safe ledger technology (QLT). Journal of Computer and Communications, 12(7), 59–77. https://doi.org/10.4236/jcc.2024.127005

9. Weinberg, A. I., & Faccia, A. (2024). Quantum algorithms: New frontier in financial crime prevention. arXiv. https://arxiv.org/abs/2403.18322

10. Gupta, K. D., Nag, A. K., Rahman, M. L., Mahmud, M. P., & Sadman, N. (2021). Using computational complexity to protect cryptocurrency against quantum threats: A review. IT Professional, 23(5), 50–55. https://doi.org/10.1109/MITP.2021.3106233

11. Naik, A., Yeniaras, E., Hellstern, G., Prasad, G., & Vishwakarma, S. K. L. P. (2023). From portfolio optimization to quantum blockchain and security: A systematic review of quantum computing in finance. arXiv. https://arxiv.org/abs/2307.01155

12. Szatmáry, S. (2022). Quantum computers—security threats and solutions. In D. Kreps, S. M. T. Wong, K. Komukai, T. V. Gopal, & K. C. Lau (Eds.), Human choice and computers (pp. 431–441). Springer.

13. Pontryagin, L. S. (1965). On some differential games. Journal of Society for Industrial and Applied Mathematics, Series A: Control, 3(1), 49–52.

14. Pontryagin, L. S. (2018). Mathematical theory of optimal processes. Routledge. https://doi.org/10.1201/

Published

2025-01-25

Issue

Section

All articles from the issue