20 Matching Annotations
  1. Sep 2022
  2. Aug 2022
    1. Given the strong coupling between data andcryptosystems in blockchains, the potential vulner-ability of these cryptosystems to quantum attacks,the likely introduction of capable quantum com-puters in the mid-term future—not to mention theusual high monetary value of the assets secured byblockchains—it is important to more deeply under-stand their current level of vulnerability.

      Author states its motivation: - strong coupling between data and cryptosystems in BCh - the cryptosystems potential vulnerability to quantum computers - the likely introduction of quantum computers in the mid-term future - also the high monetary value of the assets secured plus momentum of BCh.

    2. Doing this, we can confidentlyconclude that by the year 2035 it is more likelythan not that quantum technology will have ad-vanced sufficiently to be able to break RSA2048efficiently. This conclusion is shared by well es-tablished researchers (see, e.g.[2, 3])

      Here, author uses other researcher's conclusions and states that by the year 2035 it is a fact that quantum technology will have advance sufficiently to be able to break RSA2048 efficiently.

    3. If the key, or the de-vice on which it is stored is compromised, or if avulnerability can be exploited, then the data assetcan be irrevocably stolen

      Another scenario, if the key or the storage-key device is compromised, or if vulnerability exploitation occurs, then data asset can be stolen.

    4. Revoking the key in a timelymanne

      It suggests that the key-pair is revoked within a lapse of time. So, if the key-pair is compromised, it will still be a valid key only for a certain time.

    5. echanisms∗Corresponding authorEmail addresses: jjk30@kent.ac.uk (Joseph J.Kearney ), c.perez@kent.ac.uk (Carlos A. Perez-Delgado)exist to allow the legitimate owner to recover thisaccount.

      suggests the existence of mechanisms to recover ownership

    6. associated security relies on thedifficulty of factoring, when using RSA, or of thediscrete logarithm problem with EC

      This phrase suggest that RSA and EC security relies on: factoring difficulty with RSA discrete logarithm problem difficulty with EC

    7. Notably, asymmetric encryp-tion schemes such as RSA or Elliptic Curve (EC)cryptography are used to generate private/publickey pairs that protect data assets stored onblockchains

      So, a couple of those cryptographic techniques is RSA and EC, which are used to encrypt data assets (blockchains)