Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Reports
    • Trends
  • Supplier Listings
  • Advertise
  • SUBSCRIBE
    • MAGAZINE
    • NEWSLETTER

World-First Program To Stop Hacking By Supercomputers

By Monash University | July 19, 2018

IT experts at Monash University have devised the world’s leading post-quantum secure privacy-preserving algorithm – so powerful it can thwart attacks from supercomputers of the future.

The Lattice-Based One Time Ring Signature (L2RS) enhanced security and privacy-preserving features enable large transactions and transfer of data without risk of being hacked by quantum computers and privacy revoked by unauthorised users.

Monash IT experts consider L2RS as a significant leap forward in maintaining data security, user privacy and integrity for blockchain technology as the race to build powerful quantum computers gains momentum.

Senior Lecturer and Director of the Blockchain Research Lab at Monash, Dr. Joseph Liu, says data security will become essential as quantum computing gets closer to being able to unravel the technology that underpins the security of blockchains—a milestone estimated to reach the world within the next 10 years.

“The L2RS deploys cryptographical techniques to protect the privacy of users. It allows any user to hide his identity among a group of users. The transaction amount will be hidden as well. No one knows how much money has been transferred in each transaction,” Dr. Liu said.

“It is also post-quantum secure. That is, even in the existence of the future powerful quantum computer—which can easily break the current security algorithms such as RSA—HCash is still secure, and user privacy remains preserved,” he said.

Dr. Liu said blockchain has legitimate potential to change the world to create new foundations for economic and social systems, and a working quantum computer could, in theory, break today’s cryptography.

“Therefore, HCash has a significant advantage over other cryptocurrency exchanges even after the practical rise of quantum computers,” he said.

The L2RS algorithm was announced at the 23rd Australasian Conference on Information Security and Privacy.

You might also like


Filed Under: Industry regulations + certifications

 

LEARNING CENTER

Design World Learning Center
“dw
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for Design Engineering Professionals.
Motor University

Design World Digital Edition

cover

Browse the most current issue of Design World and back issues in an easy to use high quality format. Clip, share and download with the leading design engineering magazine today.

EDABoard the Forum for Electronics

Top global problem solving EE forum covering Microcontrollers, DSP, Networking, Analog and Digital Design, RF, Power Electronics, PCB Routing and much more

EDABoard: Forum for electronics

Sponsored Content

  • Robot Integration with Rotary Index Tables and Auxiliary Axes
  • How to Choose the Right Rotary Index Table for Your Application
  • Designing a Robust Rotary Index Table: Engineering Best Practices for Long-Term Performance
  • Custom Integration Options for your New and Existing Rotary Table Applications
  • Tech Tips: Crossed Roller Bearing Update
  • Five Uses for the Parvalux Modular Range
View More >>
Engineering Exchange

The Engineering Exchange is a global educational networking community for engineers.

Connect, share, and learn today »

Design World
  • About us
  • Contact
  • Manage your Design World Subscription
  • Subscribe
  • Design World Digital Network
  • Control Engineering
  • Consulting-Specifying Engineer
  • Plant Engineering
  • Engineering White Papers
  • Leap Awards

Copyright © 2026 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search Design World

  • Home
  • Technologies
    • ELECTRONICS • ELECTRICAL
    • Fastening • joining
    • FLUID POWER
    • LINEAR MOTION
    • MOTION CONTROL
    • SENSORS
    • TEST & MEASUREMENT
    • Factory automation
    • Warehouse automation
    • DIGITAL TRANSFORMATION
  • Learn
    • Tech Toolboxes
    • Learning center
    • eBooks • Tech Tips
    • Podcasts
    • Videos
    • Webinars • general engineering
    • Webinars • Automated warehousing
    • Voices
  • LEAP Awards
  • 2025 Leadership
    • 2024 Winners
    • 2023 Winners
    • 2022 Winners
    • 2021 Winners
  • Design Guides
  • Resources
    • 3D Cad Models
      • PARTsolutions
      • TraceParts
    • Digital Issues
      • Design World
      • EE World
    • Educational Assets
    • Engineering diversity
    • Reports
    • Trends
  • Supplier Listings
  • Advertise
  • SUBSCRIBE
    • MAGAZINE
    • NEWSLETTER
We use cookies to personalize content and ads, to provide social media features, and to analyze our traffic. We share information about your use of our site with our social media, advertising, and analytics partners who may combine it with other information you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use this website.