World-first program to stop hacking by supercomputers

July 19, 2018, Monash University

IT experts at Monash University have devised the world's leading post-quantum secure privacy-preserving algorithm – so powerful it can thwart attacks from supercomputers of the future.

The Lattice-Based One Time Ring Signature (L2RS) enhanced and privacy-preserving features enable large transactions and transfer of data without risk of being hacked by computers and privacy revoked by unauthorised users.

Monash IT experts consider L2RS as a significant leap forward in maintaining data security, user privacy and integrity for blockchain technology as the race to build powerful quantum computers gains momentum.

Senior Lecturer and Director of the Blockchain Research Lab at Monash, Dr. Joseph Liu, says will become essential as gets closer to being able to unravel the technology that underpins the security of blockchains—a milestone estimated to reach the world within the next 10 years.

"The L2RS deploys cryptographical techniques to protect the privacy of users. It allows any user to hide his identity among a group of users. The transaction amount will be hidden as well. No one knows how much money has been transferred in each transaction," Dr. Liu said.

"It is also post-quantum secure. That is, even in the existence of the future powerful quantum —which can easily break the current security algorithms such as RSA—HCash is still secure, and user remains preserved," he said.

Dr. Liu said blockchain has legitimate potential to change the world to create new foundations for economic and social systems, and a working quantum computer could, in theory, break today's cryptography.

"Therefore, HCash has a significant advantage over other cryptocurrency exchanges even after the practical rise of quantum computers," he said.

The L2RS algorithm was announced at the 23rd Australasian Conference on Information Security and Privacy.

Explore further: New white paper maps the very real risks that quantum attacks will pose for Bitcoin

Related Stories

Blind quantum computing for everyone

August 11, 2017

(—For the first time, physicists have demonstrated that clients who possess only classical computers—and no quantum devices—can outsource computing tasks to quantum servers that perform blind quantum computing. ...

Recommended for you

In colliding galaxies, a pipsqueak shines bright

February 20, 2019

In the nearby Whirlpool galaxy and its companion galaxy, M51b, two supermassive black holes heat up and devour surrounding material. These two monsters should be the most luminous X-ray sources in sight, but a new study using ...

When does one of the central ideas in economics work?

February 20, 2019

The concept of equilibrium is one of the most central ideas in economics. It is one of the core assumptions in the vast majority of economic models, including models used by policymakers on issues ranging from monetary policy ...

Research reveals why the zebra got its stripes

February 20, 2019

Why do zebras have stripes? A study published in PLOS ONE today takes us another step closer to answering this puzzling question and to understanding how stripes actually work.

Correlated nucleons may solve 35-year-old mystery

February 20, 2019

A careful re-analysis of data taken at the Department of Energy's Thomas Jefferson National Accelerator Facility has revealed a possible link between correlated protons and neutrons in the nucleus and a 35-year-old mystery. ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.