Quantum Mining Algorithms: Comparing Aggressive and Peaceful Mining Strategies

Written by escholar | Published 2025/01/13
Tech Story Tags: bitcoin-mining | quantum-bitcoin-mining | grover's-algorithm | proof-of-work-protocol | quantum-computing-and-bitcoin | bitcoin-mining-security | quantum-vs-classical-mining | quantum-mining-algorithms

TLDR This section outlines a quantum mining algorithm with two strategies—aggressive and peaceful—and analyzes the probability of success for the quantum miner in both cases.via the TL;DR App

Table of Links

Abstract and I. Introduction

A. Quantum Bitcoin Mining

B. Our Contribution

C. Comparison with Related Works

D. Conventions

II. Background

A. Bitcoin Basics

B. Bitcoin Security

C. Grover’s Search Algorithm

D. Quantum Attacks

III. Approach

A. Algorithm

B. Markov Chain

C. Assumptions and Approximations

IV. Results

A. Probability of Success

B. Performance Measures

C. Example Application

V. Discussion, Acknowledgments, and References

A. Algorithm

This algorithm contains two procedures, one for aggressive mining (agg = 1), and the other for peaceful mining (agg = 0). We consider both as peaceful mining is easier to analyze, and describes mining accurately in many scenarios, such as if the time to perform a measurement prohibits the quantum miner from effective aggressive mining. For both cases, we aim to determine the probability that the above procedure results in the quantum miner finding a marked header and that the resultant block gets accepted by the blockchain. We refer to this probability as the probability of success.

Authors:

(1) Robert R. Nerem, Institute for Quantum Science and Technology, University of Calgary, Alberta T2N 1N4, Canada ([email protected]);

(2) Daya R. Gaur, Department of Mathematics and Computer Science, University of Lethbridge, Alberta T1K 3M4, Canada.


This paper is available on arxiv under CC BY 4.0 DEED license.


Written by escholar | We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community
Published by HackerNoon on 2025/01/13