DONOBLOCK_EN
  • 🔵Litepaper
  • 🟢Whitepaper
  • 2. Introduction
  • 3.Background and Strategy
    • 3-1 World Giving Index
    • 3-2 plan to expand the base of donations
  • 4. DonaBlock Vision
  • 5. DonaBlock Giving Protocol
    • 5-1 DonaBlock.1 Brand mall Connect - DonaBlock Brand Mall
    • 5-2 DonaBlock.2 Bazaar Connect - DonaBlock Bazaar
    • 5-3 DonaBlock.3 - DonaBlock Store
    • 5-4 DonaBlock Ecosystem Participants & Contributors
  • 6. DonaBlock.1 Brand Mall Connect
    • 6-1 Dona Brand ShopBack
    • 6-2 Dona Brand ShopGive
    • 6-3 DonaBlock Browser Extension
    • 6-4 DonaBlock Mobile App
    • 6-5 Service Flow
    • 6-6 Donate Crypto
    • 6-7 Sustainable Development Goals -Impact Index Funds map to the United Nations’ Sustainable Develop
  • 7. DonaBlock.2 Bazaar Connect
    • 7-1 Dona Bazaar ShopBack
    • 7-2 Dona Bazaar ShopGive
    • 7-3 Active consumer participation- volunteer
    • 7-4. BLOCK.2- Architecture
  • 8. DonaBlock.3 Offline Store Connect
    • 8-1 PAYMENT CARD SECURITY Oauth 2.0 Protocol Flow
  • 9. DonaBlock Donation Ecosystem
    • 9-1. How to Donate Crypto to Support Charities
    • 9-2 DonaBlock Giving Fund - Index Fund
    • 9-3. DonaBlock Giving Fund -Impact Fund
    • 9-4 Cryptocurrency Donation Flow
    • 9-5 DonaBlock NFT Fundraising
  • 10. Crypto Fundraising Solution
    • 10-1 DonaBlock Crypto Wallet
    • 10-2 Services for volunteer- Create a Fundraiser
  • 11. DonaBlock Dashboard System
  • 12. DonaBlock Fame Evaluation System
    • 12-1. Volunteer Evaluation System
    • 12-2 Method and the variables that determine
  • 13. DonaBlock Service Flow
  • 14. DonaBlock Technology
    • 14-1 System Architecture
    • 14-2 Core Layer
    • 14-3 Commerce Layer
    • 14-4 Application Layer
    • 14-5 Structure of API and Other Infrastructures
    • 14-6 Quantum cryptography & SECURITY
  • 15. DonaBlock Data Architecture
    • 15-1 Core Data : On-Blockchain Data
    • 15-2 Reference Data :
    • 15-3 Data Ownership : Public / Private
    • 15-4 Configuration and Technical Specifications
  • 16. DonaBlock Token Economy
    • 16-1. Token Flow
    • 16-2. DonaBlock Token and DonaGive Token
    • 16-3 Block-Fame
    • 16-4 Volunteers Charity Campaign Reward
    • 16-5 Consumer Rewards
  • 17. Token Economy Strategy & Risk Management
  • 18. DonaBlock Roadmap
  • 19. Token Allocation
  • 20. Partner with The DonaBlock
  • 21. Audit
Powered by GitBook
On this page
  • Blockchain Quantum Security
  • QEaaS(Quantum Entropy as a Service)
  1. 14. DonaBlock Technology

14-6 Quantum cryptography & SECURITY

Previous14-5 Structure of API and Other InfrastructuresNext15. DonaBlock Data Architecture

Last updated 1 year ago

Blockchain Quantum Security

The greatest issue in blockchain networks is security. We present a new paradigm for quantum encryption, which is becoming an issue in the industry, to the community. We support the original mission by preventing the loss of value of your valuable donation assets due to unethical acts such as hacking.

Our blockchain quantum encryption solution focuses on current issues rather than future ones.

The ECDSA(Elliptic Curve Digital Signature Algorithm) encryption algorithm adopted by BNB uses quantum-entangled entropy data as a seed when generating random numbers. The enhanced encryption level achieved through quantumization ensures the safety of your valuable donation assets from loss or theft.

Our quantum encryption solution is the only technology that can be implemented using existing technology.

QEaaS(Quantum Entropy as a Service)

By using QEaaS, all results (Constructed Result) combined with quantum-entangled seed data can always be generated as a quantum-encrypted key, regardless of whether one side is pseudo or true.

The electronic wallet generated by your private key always guarantees security at the quantum encryption level. QEaaS (Quantum Entropy as a Service) is different from network technologies such as quantum-resistant cryptography (Post Quantum Cryptography) and Quantum Key Distributor (QKD), which cannot control below the L3 layer in the OSI layer, and are not yet applicable to the

blockchain ecosystem. Our QEaaS service solution can be naturally transplanted and applied to old encryption methods with simple API integration regardless of the layer.

Our quantum encryption solution complies with traditional network environments and encryption rules.

We provide quantum encryption solutions for companies and ecosystems that value the demand and supply of tokens and a more advanced security environment. We are preparing for the old blockchain network

and future security standards. We spare no effort in providing the only quantum encryption environment that can realistically be provided until the future point to take responsibility for the security issues in the blockchain ecosystem.