Top Research Papers on Quantum Cryptography
Discover the top research papers on Quantum Cryptography and stay ahead in the revolutionary field of secure communication. Our curated list highlights significant advancements and insightful studies that pave the way for the future of cryptographic techniques using quantum mechanics. From fundamental principles to cutting-edge applications, these papers are essential reading for anyone passionate about the potential of quantum cryptography.
Looking for research-backed answers?Try AI Search
Advances in quantum cryptography
1629 Citations 2020S. Pirandola, U. L. Andersen, L. Banchi + 15 more
Advances in Optics and Photonics
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Security in quantum cryptography
311 Citations 2022Christopher Portmann, Renato Renner
Reviews of Modern Physics
This paper reviews this physical notion of security, focusing on quantum key distribution and secure communication, which relies entirely on the laws of quantum mechanics.
Transitioning organizations to post-quantum cryptography
186 Citations 2022David Joseph, Rafael Misoczki, Marc Manzano + 7 more
Nature
An organizational perspective of the post-quantum cryptography transition is presented and standards and recommendations for transitioning organizations to quantum-secure cryptographic protocols are outlined, including a discussion of transition timelines and the leading strategies to protect systems against quantum attacks.
Experimental authentication of quantum key distribution with post-quantum cryptography
120 Citations 2021Liujun Wang, Kaiyi Zhang, Jiayong Wang + 9 more
npj Quantum Information
Here, the feasibility, efficiency, and stability of the PQC algorithm in QKD authentication is experimentally verified, and the advantages when new users join theQKD network are demonstrated.
Quantum cryptography with highly entangled photons from semiconductor quantum dots
137 Citations 2021Christian Schimpf, Marcus Reindl, Daniel Huber + 6 more
Science Advances
This work demonstrates the viability of quantum dots as light sources for entanglement-based quantum key distribution and quantum networks, and increases the excitation rate and embedding the dots in state-of-the-art photonic structures, key generation rates in the gigabits per second range are in principle at reach.
Quantum cryptography: Public key distribution and coin tossing
5308 Citations 2020C. H. Bennett, Brassard, Gilles
arXiv (Cornell University)
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such a quantum channel can be used in conjunction with ordinary insecure classical channels to distribute random key information between two users with the assurance that it remains unknown to anyone else,...
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
535 Citations 2020Tiago M. Fernández‐Caramés, Paula Fraga‐Lamas
IEEE Access
Current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs are studied, as well as their main challenges.
Entanglement-based secure quantum cryptography over 1,120 kilometres
675 Citations 2020Juan Yin, Yu-Huai Li, Sheng‐Kai Liao + 21 more
Nature
Entanglement-based quantum key distribution is demonstrated between two ground stations separated by 1,120 kilometres at a finite secret-key rate of 0.12 bits per second, without the need for trusted relays, which increases the secure distance on the ground tenfold and increases the practical security of QKD to an unprecedented level.
High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography
123 Citations 2021Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
journal unavailable
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT) using a small Artix-7 FPGA and proposes several optimization strategies for efficiency improvement targeting different performance requirements for various applications.
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process
194 Citations 2022Gorjan Alagic, Daniel Apon, David A. Cooper + 11 more
journal unavailable
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public-key encryption, and key-establishment algorithms to augment Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS), as well as NIST Special Publication (SP) 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, and SP 800-56B Revision 2, Recommendation f...
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process
342 Citations 2022Gorjan Alagic, Daniel Apon, David A. Cooper + 11 more
journal unavailable
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public-key encryption, and key-establishment algorithms to augment Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS), as well as NIST Special Publication (SP) 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, and SP 800-56B Revision 2, Recommendation f...
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
121 Citations 2020Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
IACR Transactions on Cryptographic Hardware and Embedded Systems
RISQ-V is presented, an enhanced RISC-V architecture that integrates a set of powerful tightly coupled accelerators to speed up lattice-based PQC and extended the Risc-V ISA with 29 new instructions to efficiently perform operations for lattices-based cryptography.
Status report on the second round of the NIST post-quantum cryptography standardization process
283 Citations 2020Dustin Moody, Gorjan Alagic, Daniel Apon + 10 more
journal unavailable
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure.ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology.ITL's responsibilities include the development of management, administrative, technical, and physical
VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture
110 Citations 2020Guozhu Xin, Jun Han, Tianyu Yin + 4 more
IEEE Transactions on Circuits and Systems I Regular Papers
Experimental results show that VPQC can speed up several typical key encapsulation mechanisms (NewHope, Kyber and LAC) by an order of magnitude compared with previous state-of-the-art hardware implementations.
Cryptography and Network Security
605 Citations 2022Marcelo Sampaio de Alencar
River Publishers eBooks
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP prot...
Introduction to Modern Cryptography
394 Citations 2020Jonathan Katz, Yehuda Lindell
journal unavailable
This book discusses Private-Key (Symmetric) Cryptography, Number Theory and Cryptographic Hardness Assumptions, and the Random-Oracle Model in Detail.
Combining cryptography with biometrics effectively
175 Citations 2021Feng Hao, Ross Anderson, John Daugman
journal unavailable
The first practical and secure way to integrate the iris biometric into cryptographic applications is proposed, and an error-free key can be reproduced reliably from genuine iris codes with a 99.5% success rate.
SoK: Computer-Aided Cryptography
103 Citations 2021Manuel Barbosa, Gilles Barthe, Karthik Bhargavan + 4 more
journal unavailable
A cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii) functional correctness and efficiency, and (iii) implementation- level security (with a focus on digital side-channel resistance).
Lightweight cryptography in IoT networks: A survey
210 Citations 2021Muhammad Rana, Quazi Mamun, Rafiqul Islam
Future Generation Computer Systems
With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity and access control of networks. However, due to the many constraints of IoT devices, traditional cryptographic protocols are no longer suited to all IoT environments, such as the smart city. As a result, researchers have been proposing various lightweight cryptographic algorithms and protocols to secure data on IoT netwo...
Visual cryptography in single-pixel imaging
145 Citations 2020Shuming Jiao, Jun Feng, Yang Gao + 2 more
Optics Express
Two novel visual cryptography schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time, where the secret image is shared by multiple illumination pattern sequences and it can be recovered when the visual key patterns are projected onto identical items.
Classic McEliece: conservative code-based cryptography: Round 4 Submission
146 Citations 2022M. Albrecht, Daniel J. Bernstein, Tung Chou + 16 more
SPIRE - Sciences Po Institutional REpository
Round 4 submission to the NIST call for postquantum cryptographic primitives
Quantum Algorithms for Quantum Chemistry and Quantum Materials Science
698 Citations 2020Bela Bauer, Sergey Bravyi, Mario Motta + 1 more
Chemical Reviews
In this review, a detailed snapshot of current progress in quantum algorithms for ground-state, dynamics, and thermal-state simulation is taken and their strengths and weaknesses for future developments are analyzed.
Quantum repeaters: From quantum networks to the quantum internet
409 Citations 2023Koji Azuma, Sophia E. Economou, David Elkouss + 4 more
Reviews of Modern Physics
This work reviews the conceptual frameworks and architectures for quantum repeaters, as well as the experimental progress towards their realization, and discusses the various near-term proposals to overcome the limits to the communication rates set by point-to-point quantum communication.
Quantum computation and quantum information
165 Citations 2020Nikolay Raychev, Isaac L. Chuang
journal unavailable
An attempt was made to compile information about quantum computers in a consistent logical scheme, in which at a basic level, without deep immersion in mathematics and the structure of the quantum world, it was explained what a quantum computer is, what principles it works on.
Quantum information processing and quantum optics with circuit quantum electrodynamics
399 Citations 2020Alexandre Blais, S. M. Girvin, William D. Oliver
Nature Physics
The introduction of concepts from cavity quantum electrodynamics to superconducting circuits yielded circuit QED, a platform eminently suitable to quantum information processing and for the exploration of novels in quantum optics.
Meta-optics empowered vector visual cryptography for high security and rapid decryption
185 Citations 2023Fei Zhang, Yinghui Guo, Mingbo Pu + 7 more
Nature Communications
The authors show a multi-d.o.f. metasurface-based vector optical manipulation protocol enabling secure decryption in real time, which features the merits of a compact footprint, high security, and rapid decryption, which may open an avenue for optical information security and anti-counterfeiting.
Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques
125 Citations 2021Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I. Hussein + 1 more
IEEE Access
A hybrid data compression algorithm increases the input data to be encrypted by RSA (Rivest–Shamir–Adleman) cryptography method to enhance the security level and it can be used in executing lossy and lossless compacting Steganography methods and shows a high-level performance and system methodology compared to other systems that use the same methodology.
Quantum Optimization and Quantum Learning: A Survey
143 Citations 2020Yangyang Li, Mengzhuo Tian, Guangyuan Liu + 2 more
IEEE Access
This paper lists major breakthroughs in the development of quantum domain, then summarizes the existing quantum algorithms from two aspects: quantum optimization and quantum learning, and proves that quantum intelligent algorithms have strong competitiveness compared with traditional intelligent algorithms and possess great potential by simulating quantum computing.
Practical quantum advantage in quantum simulation
610 Citations 2022Andrew J. Daley, Immanuel Bloch, Christian Kokail + 4 more
Nature
It is argued that a first practical quantum advantage already exists in the case of specialized applications of analogue devices, and that fully digital devices open a full range of applications but require further development of fault-tolerant hardware.
Quantum Autoencoders to Denoise Quantum Data
113 Citations 2020Dmytro Bondarenko, Polina Feldmann
Physical Review Letters
A novel quantum autoencoder is developed that successfully denoises Greenberger-Horne-Zeilinger, W, Dicke, and cluster states subject to spin-flip errors and random unitary noise.
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
155 Citations 2022Shamsher Ullah, Jiangbin Zheng, Nizamud Din + 3 more
Computer Science Review
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve Cryptography (ECC). EC is often used to improve the security of open communication networks and to let specific persons with confirmed identities into the Modern Digital Era (MDE). Users of MDE make use of many technologies, such as social media, the cloud, and the IoT industry, among others. No matter what tool the users are using, the whole environment has to be able to keep their security and privacy preserved. The study of cryptography is required because unsecure networks make data transmission and the transfe...
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
110 Citations 2024Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review
The experimental findings confirm that the proposed approach to enhance image encryption by combining the power of a chaotic map, elliptic curve cryptography, and genetic algorithm is highly effective and efficient in safeguarding sensitive image data from unauthorized access and potential attacks.
Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities
349 Citations 2021Vishal A. Thakor, Mohammad A. Razzaque, Muhammad R. A. Khandaker
IEEE Access
Compared the existing algorithms in terms of implementation cost, hardware and software performances and attack resistance properties, the demand and a direction for new research in the area of lightweight cryptography to optimize balance amongst cost, performance and security are discussed.
Quantum Information and Algorithms for Correlated Quantum Matter
119 Citations 2020Kade Head-Marsden, Johannes Flick, Christopher J. Ciccarino + 1 more
Chemical Reviews
New algorithms and computational approaches to predict and understand the behavior of correlated quantum matter are reviewed, presenting the state-of-the-art in the field toward algorithms with nonexponential complexity for correlated quantum Matter with applications in grand-challenge problems.
Efficient quantum circuits for quantum computational chemistry
103 Citations 2020Yordan S. Yordanov, David R. M. Arvidsson-Shukur, C. H. W. Barnes
Physical review. A/Physical review, A
This work introduces the concept of a "qubit excitation", which compared to a fermionic excitation, does not account for fermionics anti-commutation relations, and constructs circuits, optimized in terms of CNOT gates, that perform single and double qubit excitations.
Quantum Communication Using Semiconductor Quantum Dots
183 Citations 2022Daniel A. Vajner, Lucas Rickert, Timm Gao + 2 more
Advanced Quantum Technologies
Abstract Worldwide, enormous efforts are directed toward the development of the so‐called quantum internet. Turning this long‐sought‐after dream into reality is a great challenge that will require breakthroughs in quantum communication and computing. To establish a global, quantum‐secured communication infrastructure, photonic quantum technologies will doubtlessly play a major role, by providing and interfacing essential quantum resources, for example, flying‐ and stationary qubits or quantum memories. Over the last decade, significant progress has been made in the engineering of on‐demand qua...
Quantum dots for photonic quantum information technology
132 Citations 2023Tobias Heindel, Je‐Hyung Kim, Niels Gregersen + 2 more
Advances in Optics and Photonics
The great potential of quantum dots (QDs) in photonic quantum information technology is discussed in depth and modern methods and technical solutions for the epitaxial growth and for the deterministic nanoprocessing of quantum devices based on QDs are presented.
Emerging quantum computing algorithms for quantum chemistry
153 Citations 2021Mário Motta, Julia E. Rice
Wiley Interdisciplinary Reviews Computational Molecular Science
This review provides a self‐contained introduction to emerging algorithms for the simulation of Hamiltonian dynamics and eigenstates, with emphasis on their applications to the electronic structure in molecular systems.
Prospects for quantum enhancement with diabatic quantum annealing
120 Citations 2021Elizabeth Crosson, Daniel A. Lidar
Nature Reviews Physics
It is argued for continued exploration in the QA framework on the basis that improved coherence times and control capabilities will enable the near-term exploration of several heuristic quantum optimization algorithms.
Quantum technologies are currently the object of high expectations from governments and private companies, as they hold the promise to shape safer and faster ways to extract, exchange, and treat information. However, despite its major potential impact for industry and society, the question of their energetic footprint has remained in a blind spot of current deployment strategies. In this Perspective, I argue that quantum technologies must urgently plan for the creation and structuration of a transverse quantum energy initiative, connecting quantum thermodynamics, quantum information science, q...