Discover the top research papers on Quantum Cryptography and stay ahead in the revolutionary field of secure communication. Our curated list highlights significant advancements and insightful studies that pave the way for the future of cryptographic techniques using quantum mechanics. From fundamental principles to cutting-edge applications, these papers are essential reading for anyone passionate about the potential of quantum cryptography.
Looking for research-backed answers?Try AI Search
A. J. Gabriel, B. K. Alese, O. Adebayo + 1 more
8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
This paper proposes a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of communication is maintained both in Classical Computing era as well as Post-Quantum Computing era.
Pallavi Niraj Vithalkar, Parmanand Prabhat, Vikas Haribhau Satonkar + 3 more
Communications on Applied Nonlinear Analysis
Post-quantum cryptography methods are made to stand up to the strength of quantum algorithms and protect the privacy, integrity, and validity of private data even when quantum attackers are present.
Feng Hu, L. Lamata, M. Sanz + 4 more
ArXiv
This work shows how to codify super-exponential cryptographic problems into quantum annealers and paves the way for reaching quantum supremacy with an adequately designed chip.
Wang A-chuan, Cao Jun
China Safety Science Journal
Current experimental progress on this aspect is introduced, existing problems are analyzed and some constructive suggestions are proposed, the developing trend for the theory of quantum password is prospected and the course of quantum key production and distribution in the quantum communication is discussed.
Seung-Min Kim, Sunghee Lim, So‐Hee Kim + 1 more
journal unavailable
1. 서론 현재 사용되고 있는 암호체계로는 RSA공개키 방식이 대표적이다. R. Rivest, A. Shamir, L. Adleman이 개발한 RSA공개키 암호체계[1]는 송신자가 공개키를 이용해 메시 지를 암호화 하고 수신자는 자신만이 알고 있는 비밀키를 이용해 평문화를 한다. 이 공개키 방식의 암호를 풀기 위 해서는 소인수분해를 해야 하는데 아무리 성능 좋은 컴퓨 터라도 큰 수의 소인수분해는 풀기 어려워 안전한 암호체 계다. 그러나 1990년대 중반, 벨연구소의 응용수학자 Peter Shor가 소인수분해를 쉽게 할 수 있는 양자알고리즘을 개 발했다[2], [3]. 이는 양자컴퓨터가 개발이 되면 지금의 공 개키 방식의 암호체계가 도청 위협에 직면했다는 것이다. 이 문제에 대한 대안으로 1983년 처음 Stephen Wiesner가 제안한 양자암호[4], [5]가 있다. 양자암호란 빛의 양자 역 학을 이용한 암호 체계이다. 이와 함께 Wiesner는 위조 불 가능한 화폐인 양자 화폐[6]를 구상했다. 양자 얽힘이라는 양자 역학적 특성을 이용한 양자 화폐는 최근 위조화폐로 문제가 되고 있는 부분에 대해 최적의 대응책으로 여겨지 고 있다. 본 논문에서는 양자암호...
There is no abstract for this review article.
Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper.
A new approach to provide a secure connection between internetbrowsers and website allowing people to transmit private data online, by integrating quantum cryptography in TLS protocol is introduced.
An idea of Stephen Wiesner is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics and it appears that this scheme could actually be implemented in favorable environments.
N. Gisin, Grégoire Ribordy, Wolfgang Tittel + 1 more
journal unavailable
The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Mustafa Toyran
2007 IEEE 15th Signal Processing and Communications Applications
The definition of classical and quantum cryptography is given and the difference between the two is emphasized and the famous quantum key distribution example is presented.
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
S. Lakshmi, S. Krishnamoorthy, Mudassir Khan + 2 more
Limitations and Future Applications of Quantum Cryptography
This paper discusses quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding, which is used to establish communication by generating cryptographic keys.
The theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link are described.
S. Jaćimovski, J. Šetrajčić, J. Lamovec
ЖУРНАЛ ЗА БЕЗБЈЕДНОСТ И КРИМИНАЛИСТИКУ
This paper seeks to address the principles of the quantum distribution of a key for information encryption and the fundamental problems arising from the execution.
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas and quantum key distribution is considered as the third and final insight to transform cryptography in the 20th century.
This is a chapter on quantum cryptography for the book"A Multidisciplinary Introduction to Information Security"to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
Nobuyuki Imoto
Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464)
A theory on quantum key distribution (QKD) with coherent states and a theory on two-state QKD with noisy light sources are developed.
S. Billewar, G. Londhe, Sunil Ghane
Limitations and Future Applications of Quantum Cryptography
The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously.
Nishant Mehta
journal unavailable
The need of Quantum Cryptography is highlighted and the basic concept behind it is elaborated, which makes use of the quantum mechanical effects to make or break the cipher.
P. Radanliev, D. D. Roure, Omar Santos + 1 more
journal unavailable
,
S. Bhandari
International Journal of Cooperative Information Systems
In this paper about quantum cryptography i.e working, limitation and advantages discussed, quantum cryptography is one of the latest and advanced cryptography technique different from all other cryptography technique and more secure.
A. Bykovsky, I. Kompanets
Quantum Electronics
This work discusses cryptographic data protection network schemes combining the approaches of quantum cryptography with advanced computer information processing methods and designs that are promising for increasing the dimension of the key space in the ‘one-time pad’ method.
J. Gruska
Journal of the Indian Institute of Science
The first goal of the paper is to point out and to demonstrate large importance security issues have for modern science, technology and society and to discuss briefly the main areas, problems and challenges of classical cryptography.
Shravan Kumar Sehgal, Rashmi Gupta
2021 International Conference on Industrial Electronics Research and Applications (ICIERA)
The paper represents various algorithm that are used in quantum cryptography along with its comparison with the existing classical cryptography algorithms and includes the shortcomings of the present algorithms and the future aspect of quantum cryptography.
In quantum key distribution (QKD), Alice selects a sequence of characters from a finite alphabet and transmits the corresponding signals, each described by a quantum state, to Bob. Between Alice and Bob, Eve---with her own receiver and transmitter---can eavesdrop. Eve is assumed to know beforehand all the possible states from among which Alice chooses. The central question is: Can Eve gain significant information about the key without influencing what Bob receives in ways that Alice and Bob can detect? This formulation implies that many options are available to Eve. It is the purpose here to d...
This doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 to 2002.
A survey of quantum and post quantum cryptography is provided, reviewing the principle of a quatum computer as well as Shor’s algorithm and quantum key distribution and some cryptosystems, that are believed to resist classical and quantum computers.
The possible contributions of quantum mechanics to the fields of cryptography as well as to machine computation in general are examined, which can already boast of initial successes, especially in cryptography and quantum computing.
This work defines strong attacks of this type, and shows security against them, suggesting that quantum cryptography is secure, and suggests a new type of quantum key distribution scheme where quantum memories are used instead of quantum channels.
David E. Ott, Chris Peikert, et al.
ArXiv
On January 31-February 1, 2019, the Computing Community Consortium (CCC) held a workshop in Washington, D.C. to discuss research challenges associated with PQC migration and imagining a new science of "cryptographic agility".
A. Pandey, Aashish Banati, Balaji Rajendran + 2 more
2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)
This paper explores the motivation behind PQC and provides an overview of the experimental research conducted in the field, and discusses considerations for selecting and implementing post-quantum cryptographic algorithms, including security levels, algorithmic characteristics, performance tradeoffs, and integration challenges.
G. Murali, R. Prasad
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
Comparison analysis performance in local and cloud environment is provided to identify the best environment using classical or quantum cryptography on various cryptographic algorithms.
Barot Savan Hareshbhai, S. Valiveti, Dilip Kothari + 1 more
2023 First International Conference on Microwave, Antenna and Communication (MAC)
This work primarily focuses on generating random numbers using the Quantum Key Distribution (QKD) as a parallel benefit and shows that the SSP protocol gives better randomization when compared to the BB84 protocol.
R. Ramos, R. F. Souza
Journal of Optical Communications
This work proposes the use of suitable properties of chaotic systems, such as great sensitivity to initial conditions, unpredictability, controllability and synchronisation of chaotic system to overcome some problems of quantum cryptography.
T. Moses
journal unavailable
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries and Entrust Limited in Canada and other company and product names are registered trademarks of their respective owners.
J. Buchmann, Johannes Braun, Denise Demirel + 1 more
Quantum Science and Technology
This paper argues that a combination of quantum cryptography and classical cryptography can provide long-term confidentiality and it is argued that quantum random number generation and quantum key distribution can provide such protection.
Chuck Easttom
journal unavailable
Lattice based cryptosystems are a viable candidate for post-quantum computing because they will be able to render current number theoretic asymmetric cryptography algorithms obsolete.
Leila Pashaie, M. Bahrami, J. Karimpour + 1 more
journal unavailable
This paper will show that cluster of machine which use distributed quantum machine, how it works base on the idea and how it can have a secure machine.
Praveer Dubey, O. Yadav
International Journal of Current Engineering and Technology
The development of quantum cryptography was motivated by the short-comings of classical cryptographic methods, which can be classified as either public-key or secret-key Methods.
S. Pirandola, U. Andersen, L. Banchi + 15 more
arXiv: Quantum Physics
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
This paper reviews this physical notion of security, focusing on quantum key distribution and secure communication, which relies entirely on the laws of quantum mechanics.
William Kretschmer, Luowen Qian, Makrand Sinha + 1 more
Proceedings of the 55th Annual ACM Symposium on Theory of Computing
This work builds on the recent construction by Aaronson, Ingram, and Kretschmer of an oracle relative to which P = NP but BQP ≠ QCMA, based on hardness of the OR ∘ Forrelation problem, and introduces a new discretely-defined variant of the Forrelation distribution, for which it proves pseudorandomness against AC0 circuits.
It is proved that quantum cryptography at least equals classical cryptography in an important area, namely authentication, and it is shown that quantum keys make it possible for two parties to communicate with one-time pads without having to meet in advance.
Overall, quantum cryptography has a place in the history of secret keeping as a novel and potentially useful paradigm shift in the approach to broadband data encryption.
G. Erdélyi, Tobias Riege, J. Rothe
Electron. Colloquium Comput. Complex.
The quantum-mechanical background needed to present some fundamental protocols from quantum cryptography is provided, and quantum key distribution via the BB84 protocol and its security proof are reviewed.
S. Barnett, N. Liitkenhaus, S. Phoenix + 4 more
journal unavailable
In this paper, two parties can communicate by the transmission and detection of a stream of low intensity light pulses and this change is subsequently detectable.
The article discusses the main classical algorithms of quantum cryptography, explaining the principle of operation of the mechanism for ensuring information security in the transmission of messages with the analysis of the polarization of photons.
The principles of Quantum Cryptography, a science dedicated to hiding, or keeping secret, the content of a message from third parties, are studied.
S. Barnett, J. Phoenix
Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences
The security of quantum key distribution relies on the principles of quantum theory and its successful implementation requires the development of quantum optical techniques.