Intuitive Understanding of Quantum Computation and Post-Quantum
Cryptography
- URL: http://arxiv.org/abs/2003.09019v3
- Date: Mon, 1 Aug 2022 02:12:11 GMT
- Title: Intuitive Understanding of Quantum Computation and Post-Quantum
Cryptography
- Authors: Quan Thoi Minh Nguyen
- Abstract summary: National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography.
Investment in quantum computing poses significant threats to our cryptographic algorithms.
This article shares with you my notes with the hope that you will have an intuitive understanding of the beautiful and mind-blowing quantum algorithms.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Post-quantum cryptography is inevitable. National Institute of Standards and
Technology (NIST) starts standardizing quantum-resistant public-key
cryptography (aka post-quantum cryptography). The reason is that investment in
quantum computing is blooming which poses significant threats to our currently
deployed cryptographic algorithms. As a security engineer, to prepare for the
apocalypse in advance, I've been watching the development of quantum computers
and post-quantum cryptography closely. Never mind, I simply made up an excuse
to study these fascinating scientific fields. However, they are extremely hard
to understand, at least to an amateur like me. This article shares with you my
notes with the hope that you will have an intuitive understanding of the
beautiful and mind-blowing quantum algorithms and post-quantum cryptography.
Update: Multivariate signature scheme Rainbow is broken by Ward Beullens.
Supersingular Isogeny Diffie-Hellman protocol (SIDH) is broken by Wouter
Castryck and Thomas Decru
Related papers
- On the practicality of quantum sieving algorithms for the shortest vector problem [42.70026220176376]
lattice-based cryptography is one of the main candidates of post-quantum cryptography.
cryptographic security against quantum attackers is based on lattice problems like the shortest vector problem (SVP)
Asymptotic quantum speedups for solving SVP are known and rely on Grover's search.
arXiv Detail & Related papers (2024-10-17T16:54:41Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Towards A Post-Quantum Cryptography in Blockchain I: Basic Review on Theoretical Cryptography and Quantum Information Theory [0.0]
The invention of quantum computers was so revolutionary that they bring transformative challenges in a variety of fields.
It becomes inevitable to consider to implement a post-quantum cryptography, which is also referred to as quantum-resistant cryptography.
arXiv Detail & Related papers (2024-07-19T05:59:21Z) - Quantum Information Processing with Molecular Nanomagnets: an introduction [49.89725935672549]
We provide an introduction to Quantum Information Processing, focusing on a promising setup for its implementation.
We introduce the basic tools to understand and design quantum algorithms, always referring to their actual realization on a molecular spin architecture.
We present some examples of quantum algorithms proposed and implemented on a molecular spin qudit hardware.
arXiv Detail & Related papers (2024-05-31T16:43:20Z) - Cryptography: Classical versus Post-Quantum [0.0]
We discuss the advantages of post-quantum cryptography over classical cryptography.
We conclude that the development of post-quantum cryptography is essential to guarantee the security of sensitive information in the post quantum era.
arXiv Detail & Related papers (2024-02-16T10:56:45Z) - A Survey on Post-Quantum Cryptography: State-of-the-Art and Challenges [4.239503938472806]
We analyze the different types of post-quantum cryptography, quantum cryptography and quantum-resistant cryptography.
We conclude that due to quantum cryptography's present limitations it is not a viable solution like it is often presented to be.
arXiv Detail & Related papers (2023-12-16T12:17:44Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Cryptography: Quantum Key Distribution, a Non-technical Approach [0.0]
Quantum mechanics provides means to create an inherently secure communication channel that is protected by the laws of physics.
This paper is a non-technical overview of quantum key distribution, a type of cryptography poised to exploit the laws of quantum mechanics directly.
arXiv Detail & Related papers (2022-11-09T15:30:23Z) - Quantum Advantage in Cryptography [4.847980206213335]
Quantum cryptography allows us to build communication schemes whose secrecy relies on the laws of physics.
This article provides an overview of the principles and state of the art of quantum cryptography.
arXiv Detail & Related papers (2022-06-08T18:00:03Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.