Discover the top research papers on Quantum Cryptography and stay ahead in the revolutionary field of secure communication. Our curated list highlights significant advancements and insightful studies that pave the way for the future of cryptographic techniques using quantum mechanics. From fundamental principles to cutting-edge applications, these papers are essential reading for anyone passionate about the potential of quantum cryptography.
Looking for research-backed answers?Try AI Search
William Kretschmer, Luowen Qian, Makrand Sinha + 1 more
Proceedings of the 55th Annual ACM Symposium on Theory of Computing
This work builds on the recent construction by Aaronson, Ingram, and Kretschmer of an oracle relative to which P = NP but BQP โ QCMA, based on hardness of the OR โ Forrelation problem, and introduces a new discretely-defined variant of the Forrelation distribution, for which it proves pseudorandomness against AC0 circuits.
Shravan Kumar Sehgal, Rashmi Gupta
2021 International Conference on Industrial Electronics Research and Applications (ICIERA)
The paper represents various algorithm that are used in quantum cryptography along with its comparison with the existing classical cryptography algorithms and includes the shortcomings of the present algorithms and the future aspect of quantum cryptography.
An overview of the principles and state-of-the-art of quantum cryptography, as well as an assessment of current challenges and prospects for overcoming them are provided.
Dakshita Khurana, Kabir Tomer
IACR Cryptol. ePrint Arch.
These are the first constructions of quantum cryptographic primitives (one-way puzzles, quantum bit commitments, state puzzles) from concrete, well-founded mathematical assumptions that do not imply the existence of classical cryptography.
This paper reviews this physical notion of security, focusing on quantum key distribution and secure communication, which relies entirely on the laws of quantum mechanics.
Encryption, in this context, ensures that only the intended sender and receiver can understand any message being sent over an Internet channel.
Manish Kumar
International Journal of Innovative Research in Physics
Matlab implementation of Shorโs algorithm, used for integer factorization which is polynomial time for quantum computer, is presented and Quantum Proof Algorithm like Lattice-based cryptography used concept of good and bad base is discussed.
E. Lella, Alberto Gatto, Andrea Pazienza + 4 more
2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE)
This work discusses QKD networks and post-quantum algorithms, considering their opportunities and limitations and showing that reconciliation between these two directions of cryptography is feasible and necessary for the quantum era.
Thomas Vidick, Stephanie Wehner
journal unavailable
The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing.
Tanmay Tripathi, Abhinav Awasthi, Shaurya Pratap Singh + 1 more
ArXiv
By contrasting quantum cryptography with its classical counterpart, it becomes evident how quantum mechanics revolutionizes the landscape of secure communication.
The definition of one-way state generators (OWSGs) is revisited and an incomparable variant of OWSGs is introduced, which is secretly-verifiable and statistically-invertible O WSGs, and it is shown that they are equivalent to EFI pairs.
Andrew Forbes, Mostafa Youssef, Sachleen Singh + 2 more
Applied Physics Letters
The present state-of-the-art in achieving this control with spatial modes of light, both as single photon and entangled states are outlined, the open challenges that remain are highlighted, and the roadmap that might see its full potential realized is considered.
Yi-Kai Liu, Dustin Moody
Physical review applied
Progress in post-quantum cryptography on the Internet includes interactive protocols for testing quantumness as well as for performing uncloneable cryptographic computations, and experimental demonstrations of device-independent random number generators, device-independent quantum key distribution, quantum memories, and analog quantum simulators.
Seung-Min Kim, Sunghee Lim, SoโHee Kim + 1 more
journal unavailable
1. ์๋ก ํ์ฌ ์ฌ์ฉ๋๊ณ ์๋ ์ํธ์ฒด๊ณ๋ก๋ RSA๊ณต๊ฐํค ๋ฐฉ์์ด ๋ํ์ ์ด๋ค. R. Rivest, A. Shamir, L. Adleman์ด ๊ฐ๋ฐํ RSA๊ณต๊ฐํค ์ํธ์ฒด๊ณ[1]๋ ์ก์ ์๊ฐ ๊ณต๊ฐํค๋ฅผ ์ด์ฉํด ๋ฉ์ ์ง๋ฅผ ์ํธํ ํ๊ณ ์์ ์๋ ์์ ๋ง์ด ์๊ณ ์๋ ๋น๋ฐํค๋ฅผ ์ด์ฉํด ํ๋ฌธํ๋ฅผ ํ๋ค. ์ด ๊ณต๊ฐํค ๋ฐฉ์์ ์ํธ๋ฅผ ํ๊ธฐ ์ ํด์๋ ์์ธ์๋ถํด๋ฅผ ํด์ผ ํ๋๋ฐ ์๋ฌด๋ฆฌ ์ฑ๋ฅ ์ข์ ์ปดํจ ํฐ๋ผ๋ ํฐ ์์ ์์ธ์๋ถํด๋ ํ๊ธฐ ์ด๋ ค์ ์์ ํ ์ํธ์ฒด ๊ณ๋ค. ๊ทธ๋ฌ๋ 1990๋ ๋ ์ค๋ฐ, ๋ฒจ์ฐ๊ตฌ์์ ์์ฉ์ํ์ Peter Shor๊ฐ ์์ธ์๋ถํด๋ฅผ ์ฝ๊ฒ ํ ์ ์๋ ์์์๊ณ ๋ฆฌ์ฆ์ ๊ฐ ๋ฐํ๋ค[2], [3]. ์ด๋ ์์์ปดํจํฐ๊ฐ ๊ฐ๋ฐ์ด ๋๋ฉด ์ง๊ธ์ ๊ณต ๊ฐํค ๋ฐฉ์์ ์ํธ์ฒด๊ณ๊ฐ ๋์ฒญ ์ํ์ ์ง๋ฉดํ๋ค๋ ๊ฒ์ด๋ค. ์ด ๋ฌธ์ ์ ๋ํ ๋์์ผ๋ก 1983๋ ์ฒ์ Stephen Wiesner๊ฐ ์ ์ํ ์์์ํธ[4], [5]๊ฐ ์๋ค. ์์์ํธ๋ ๋น์ ์์ ์ญ ํ์ ์ด์ฉํ ์ํธ ์ฒด๊ณ์ด๋ค. ์ด์ ํจ๊ป Wiesner๋ ์์กฐ ๋ถ ๊ฐ๋ฅํ ํํ์ธ ์์ ํํ[6]๋ฅผ ๊ตฌ์ํ๋ค. ์์ ์ฝํ์ด๋ผ๋ ์์ ์ญํ์ ํน์ฑ์ ์ด์ฉํ ์์ ํํ๋ ์ต๊ทผ ์์กฐํํ๋ก ๋ฌธ์ ๊ฐ ๋๊ณ ์๋ ๋ถ๋ถ์ ๋ํด ์ต์ ์ ๋์์ฑ ์ผ๋ก ์ฌ๊ฒจ์ง ๊ณ ์๋ค. ๋ณธ ๋ ผ๋ฌธ์์๋ ์์์ํธ...
W. Barker, Murugiah Souppaya
journal unavailable
The NIST National Cybersecurity Center of Excellence (NCCoE) is initiating the development of practices to ease the migration from the current set of public-key cryptographic algorithms to replacement algorithms that are resistant to quantum computer-based attacks.
Taiga Hiroka, T. Morimae
journal unavailable
This paper characterize quantum cryptographic primitives with meta-complexity for the first time, and shows that one-way puzzles (OWPuzzs) exist if and only if GapK is weakly-quantum-average-hard, and shows that inefficient-verifier proofs of quantumness (IV-PoQ) exist.
Md Shariar Sozol, Md Mostafizur Rahman, Md Minhazul Islam + 1 more
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
The research comprehensively analyses discrete-variable protocols (DVQKD) and continuous-variable ones (CVQKD), closely investigating their potential roles as re-inventors of secure communications owing to increasing cyber threats.
Brahim Ouchao
The 3rd International Day on Computer Science and Applied Mathematics
A simulation of quantum information is presented, taking advantage of quantum entanglement to ensure the spontaneous transfer of a state from one qubit to another similar qubit.
S. Pirandola, U. Andersen, L. Banchi + 15 more
arXiv: Quantum Physics
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Zvika Brakerski, R. Canetti, Luowen Qian
journal unavailable
It is shown that EFI pairs are necessary for a large class of quantum-cryptographic applications, and played a similar role to that played by OWFs in the classical setting: they are simple to describe, essential, and also serve as a linchpin for demonstrating equivalence between primitives.
Promtucs Garnagee Jackson, Anmol Thakur, Kirandeep Kaur
SSRN Electronic Journal
PQShield and Si-Five advance post-quantum cryptography in RISC-V
Miralem Mehic, Libor Michalek, E. Dervisevic + 12 more
IEEE Communications Surveys & Tutorials
The security challenges and approaches in 5G networks concerning network protocols, interfaces and management organizations are surveyed and the performance and technologies of post-quantum cryptography are discussed.
S. Lakshmi, S. Krishnamoorthy, Mudassir Khan + 2 more
Limitations and Future Applications of Quantum Cryptography
This paper discusses quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding, which is used to establish communication by generating cryptographic keys.
Bharadwaja V. Srividya, S. Sasi
Cryptography - Recent Advances and Future Developments
This article focuses on generation of a secret shared key, later converted into Quantum bits (Qbits) and transmitted to the receiver securely.
References: Scarani = Valerio Scarani et al. Rev. Mod. Phys. 81 (2009) 1301-1350. Lengthy review with much valuable material. QCQI = Quantum Computation and Quantum Information by Nielsen and Chuang (Cambridge, 2000), Sec. 12.6 through 12.6.3. The material becomes more and more difficult as Sec. 12.6 advances Stinson = D. R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995). Contains considerable material on classical cryptography H. K. Lo and N. Lutkenhaus, โQuantum cryptography: from theory to practice,โ (2007). arXiv:quant-ph/0702202. A short and very readable introduction. H. K....
Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper.
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
Randy Kuang, Dafu Lou, Alex He + 1 more
2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS)
A variant of AES for a quantum safe lightweight cryptography by incorporating AES ShiftRows and MixColumns with QPP or called AES-QPP is explored, which not only improves the security against differential and linear attacks but also largely reduces the number of rounds to 5 rounds.
Maria Papathanasaki, P. Fountas, L. Maglaras + 2 more
2021 IEEE International Conference on Cyber Security and Resilience (CSR)
This new research area has been fruitful in recognizing mathematical operations that quantum algorithms lack in speed and build cryptographic systems around them.
S. Billewar, G. Londhe, Sunil Ghane
Limitations and Future Applications of Quantum Cryptography
The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously.
Nowadays, information is exchanged among the computer network. These data and information are involved in the business, military, academic education, research and etc. which are shared around the world in both private and public networks. Since, many categories of data are required restriction on the authorization of access, modify, delete, and insert, security in communication is increasingly important to network communication. Currently, computer security applies mathematic theory to computer security for encrypting and decrypting on both sender and receiver. To use a security attack with a ...
S. Jaฤimovski, J. ล etrajฤiฤ, J. Lamovec
ะะฃะ ะะะ ะะ ะะะะะะะะะะกะข ะ ะะ ะะะะะะะะกะขะะะฃ
This paper seeks to address the principles of the quantum distribution of a key for information encryption and the fundamental problems arising from the execution.
A. Bykovsky, I. Kompanets
Quantum Electronics
This work discusses cryptographic data protection network schemes combining the approaches of quantum cryptography with advanced computer information processing methods and designs that are promising for increasing the dimension of the key space in the โone-time padโ method.
: In the rapidly evolving field of cyber security, integrating classical and quantum cryptographic techniques to protect sensitive information is becoming increasingly important. This project leverages the capabilities of Microsoft Azure to create a robust security framework that includes two servers: a host server and a user server. The host server uses quantum cryptography to generate encryption keys, while the user server implements the Fernet algorithm for data encryption.
Harshita Jasoliya, Kaushal A. Shah
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)
The knowledge related to the Quantum Cryptography, Quantum Key Distribution; and their elements, implementation, and the latest research are explored, including exploration of the loopholes and the security of Internet of Things (IoT) infrastructure and current used classical cryptographic algorithms are described.
Pratik Roy, Saptarshi Sahoo, Amit Kumar Mandal + 1 more
Journal of Quantum Computing
An updated overview of quantum key distribution is given and can serve as a guide to get familiar with the current trends of quantum cryptography.
Karuna Babber, J. P. Singh
Journal of Discrete Mathematical Sciences and Cryptography
An in-depth security analysis of quantum key distribution (QKD) promises long-term security to digital data but also simplified data encryption method through QKD.
Q. Zeng, Haoyang Wang, Huihong Yuan + 5 more
Physical Review Applied
A simple protocol to upgrade an entanglement source with access control through phase randomization at the optical pump is proposed and it is shown this control can act as a practical countermeasure against memory attack on device-independent quantum key distribution at a negligible cost.
Hoi-Kwong Lo, Yi Zhao
2009 International Conference and Seminar on Micro/Nanotechnologies and Electron Devices
The work presents results of experiments conducted on the developed setup based on single photon polarization coding, and describes developed fiber based quantum cryptography working with the telecom wavelength 1555 nm.
A new approach to provide a secure connection between internetbrowsers and website allowing people to transmit private data online, by integrating quantum cryptography in TLS protocol is introduced.
An idea of Stephen Wiesner is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics and it appears that this scheme could actually be implemented in favorable environments.
There is no abstract for this review article.
N. Gisin, Grรฉgoire Ribordy, Wolfgang Tittel + 1 more
journal unavailable
The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Mustafa Toyran
2007 IEEE 15th Signal Processing and Communications Applications
The definition of classical and quantum cryptography is given and the difference between the two is emphasized and the famous quantum key distribution example is presented.
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
The theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link are described.
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas and quantum key distribution is considered as the third and final insight to transform cryptography in the 20th century.
This is a chapter on quantum cryptography for the book"A Multidisciplinary Introduction to Information Security"to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
Nobuyuki Imoto
Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464)
A theory on quantum key distribution (QKD) with coherent states and a theory on two-state QKD with noisy light sources are developed.
H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin + 1 more
Applied Physics B
After a short introduction to classic cryptography we explain thoroughly how quantum cryptography works. We present then an elegant experimental realization based on a self-balanced interferometer with Faraday mirrors. This phase-coding setup needs no alignment of the interferometer nor polarization control, and therefore considerably facilitates the experiment. Moreover it features excellent fringe visibility. Next, we estimate the practical limits of quantum cryptography. The importance of the detector noise is illustrated and means of reducing it are presented. With present-day technologies...