Quantum Advantage in Cryptography
- URL: http://arxiv.org/abs/2206.04078v2
- Date: Wed, 11 Jan 2023 19:06:54 GMT
- Title: Quantum Advantage in Cryptography
- Authors: Renato Renner and Ramona Wolf
- Abstract summary: Quantum cryptography allows us to build communication schemes whose secrecy relies on the laws of physics.
This article provides an overview of the principles and state of the art of quantum cryptography.
- Score: 4.847980206213335
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Ever since its inception, cryptography has been caught in a vicious circle:
Cryptographers keep inventing methods to hide information, and cryptanalysts
break them, prompting cryptographers to invent even more sophisticated
encryption schemes, and so on. But could it be that quantum information
technology breaks this circle? At first sight, it looks as if it just lifts the
competition between cryptographers and cryptanalysts to the next level. Indeed,
quantum computers will render most of today's public key cryptosystems
insecure. Nonetheless, there are good reasons to believe that cryptographers
will ultimately prevail over cryptanalysts. Quantum cryptography allows us to
build communication schemes whose secrecy relies only on the laws of physics
and some minimum assumptions about the cryptographic hardware - leaving
basically no room for an attack. While we are not yet there, this article
provides an overview of the principles and state of the art of quantum
cryptography, as well as an assessment of current challenges and prospects for
overcoming them.
Related papers
- The Evolution of Cryptography through Number Theory [55.2480439325792]
cryptography began around 100 years ago, its roots trace back to ancient civilizations like Mesopotamia and Egypt.
This paper explores the link between early information hiding techniques and modern cryptographic algorithms like RSA.
arXiv Detail & Related papers (2024-11-11T16:27:57Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Towards A Post-Quantum Cryptography in Blockchain I: Basic Review on Theoretical Cryptography and Quantum Information Theory [0.0]
The invention of quantum computers was so revolutionary that they bring transformative challenges in a variety of fields.
It becomes inevitable to consider to implement a post-quantum cryptography, which is also referred to as quantum-resistant cryptography.
arXiv Detail & Related papers (2024-07-19T05:59:21Z) - Cryptography: Classical versus Post-Quantum [0.0]
We discuss the advantages of post-quantum cryptography over classical cryptography.
We conclude that the development of post-quantum cryptography is essential to guarantee the security of sensitive information in the post quantum era.
arXiv Detail & Related papers (2024-02-16T10:56:45Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Cryptography: Quantum Key Distribution, a Non-technical Approach [0.0]
Quantum mechanics provides means to create an inherently secure communication channel that is protected by the laws of physics.
This paper is a non-technical overview of quantum key distribution, a type of cryptography poised to exploit the laws of quantum mechanics directly.
arXiv Detail & Related papers (2022-11-09T15:30:23Z) - Digest of Quantum Stream Cipher based on Holevo-Yuen Theory [0.0]
This paper introduces an overview and a back ground of our paper that is entitled Quantum stream cipher based on Holevo-Yuen theory.
Around 2000, a new quantum stream cipher was proposed as a technique to challenge the possibility of overcoming drawbacks of OTP in practical use.
arXiv Detail & Related papers (2022-06-04T08:17:34Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Intuitive Understanding of Quantum Computation and Post-Quantum
Cryptography [0.0]
National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography.
Investment in quantum computing poses significant threats to our cryptographic algorithms.
This article shares with you my notes with the hope that you will have an intuitive understanding of the beautiful and mind-blowing quantum algorithms.
arXiv Detail & Related papers (2020-03-18T03:29:37Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.