Why can Rainbow Signature achieve long-term efficiency and long-term stability? This is because the shortest signature length of the rainbow signature is second only to the length of the signature elliptic curve signature currently used by Bitcoin. But elliptic curves are not immune to quantum computer cracking while rainbow signatures are.
Sorry I won't insert a picture There is a picture dedicated to various post-quantum cryptography algorithms signature lengths and public key lengths.
file:///C:/Users/feng1/AppData/Local/Temp/WeChat%20Files/1434792489d2507d35aa59bc1650a7c.jpg
nothing to do with cryptocurrency or bitcoin.
its purely "ok spy guys, its time we updated our top secret network to the next level of encryption, now discuss what system we should use within the next couple months"
possible impact is that they now see quantum as a threat to old security so trying to get ahead of that. which could mean that quantum is getting near to a point of being a risk. (how near is another story of how long is a piece of string)
Hello Frankie, carefully browse NSM8, the important information is that quantum technology is indeed reaching a critical point, it can crack the signature algorithm of elliptic curves in an instant one day in the future, imagine if the crack is yours How do you feel about a bitcoin wallet? Of course, as far as I know Bitcoin has undergone some technical upgrades but it is very likely that it will be in terms of hash functions. There will be some problems in the future.
nothing to do with cryptocurrency or bitcoin.
its purely "ok spy guys, its time we updated our top secret network to the next level of encryption, now discuss what system we should use within the next couple months"
possible impact is that they now see quantum as a threat to old security so trying to get ahead of that. which could mean that quantum is getting near to a point of being a risk. (how near is another story of how long is a piece of string)
In 2022, in the NSM No. 8 document, the White House of the United States put forward clear requirements to fight against quantum algorithms. Encrypted goods will surely enter the era of anti-quantum computer cracking algorithms from 2022.
The anti-quantum signature algorithm used in encryption should meet four conditions at the same time: the first is long-term security, the second is long-term stability, the third is long-term efficiency, and the fourth is the world's largest consensus.
But there are only three types of quantum-resistant signature algorithms in the next two decades.
The first type of lattice signature algorithm, because it is supported by relevant U.S. departments and attacked by Asuri, cannot be long-term safe and stable, and it is impossible to have the greatest consensus.
The second type of hash function signature is very secure in mathematical theory, but in practical applications, there will be problems with the original state management in the decentralized scenario, even if the PIOES mechanism is used.
The third type of multi-variable signature, its public key length is too large, and if the public key is too large, it cannot be used in encryption for a long time. So, is there any way to deal with the problem that the public key of the multivariate signature is too large?
If there are so many variables, it will be the only algorithm that can meet the above four requirements and be used in encrypted goods!
[moderator's note: consecutive posts merged]