The Future of Cryptography Under Quantum Computers
نویسندگان
چکیده
Cryptography is an ancient art that has passed through many paradigms, from simple letter substitutions to polyalphabetic substitutions to rotor machines to digital encryption to public-key cryptosystems. With the possible advent of quantum computers and the strange behaviors they exhibit, a new paradigm shift in cryptography may be on the horizon. Quantum computers could hold the potential to render most modern encryption useless against a quantum-enabled adversary. The aim of this thesis is to characterize this convergence of cryptography and quantum computation. We provide definitions for cryptographic primitives that frame them in general terms with respect to complexity. We explore the various possible relationships between BQP, the primary quantum complexity class, and more familiar classes, and we analyze the possible implications for cryptography.
منابع مشابه
A New Multivariate-based Ring Signature Scheme
Most of the existing ring signature schemes are based on traditional cryptography, such as RSA and discrete logarithm. Unfortunately these schemes would be broken if quantum computers emerge. The MQ-problem based PublicKey Cryptosystem (MPKC) is an important alternative to traditional PKCs for its potential to resist future attacks of quantum computers. In this paper, we proposed a new ring sig...
متن کاملA Selection of Recent Lattice-based Signature and Encryption Schemes
It is known that the development of quantum computers will break the cryptographic schemes that are in use today. Since Shor’s algorithm is able to solve the factoring and discrete logarithm problems, all cryptographic systems based on these two problems will get broken in the presence of large-scale quantum computers. Lattice-based schemes, however, are considered secure against attacks with t...
متن کاملSingle photons for quantum information systems
This paper introduces the current state of the development of single photon sources that will play a central role in future quantum information systems. By optically pumping a system consisting of a semiconductor single quantum dot confined in a monolithic microcavity, it is possible to produce a single photon pulse stream at the Fourier transform limit with high efficiency and with a high repe...
متن کاملSingle and Entangled Photon Sources
The possibility of totally secure communication through the application of quantum mechanical properties was introduced in 1984 by Bennett and Brassard in their paper, “Quantum Cryptography: Public Key Distribution and Coin Tossing”. As Bennett and Brassard outlined, quantum communication makes it impossible for an eavesdropper to intercept a message without detection by the desired parties. Th...
متن کاملan Efficient Blind Signature Scheme based on Error Correcting Codes
Cryptography based on the theory of error correcting codes and lattices has received a wide attention in the last years. Shor’s algorithm showed that in a world where quantum computers are assumed to exist, number theoretic cryptosystems are insecure. Therefore, it is important to design suitable, provably secure post-quantum signature schemes. Code-based public key cryptography has the charact...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002