Discover the top research papers on Quantum Cryptography and stay ahead in the revolutionary field of secure communication. Our curated list highlights significant advancements and insightful studies that pave the way for the future of cryptographic techniques using quantum mechanics. From fundamental principles to cutting-edge applications, these papers are essential reading for anyone passionate about the potential of quantum cryptography.
Looking for research-backed answers?Try AI Search
A. J. Gabriel, B. K. Alese, O. Adebayo + 1 more
8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
This paper proposes a new Crystographic System that combines Post Quantum Cryptography with Steganography to ensure that security of communication is maintained both in Classical Computing era as well as Post-Quantum Computing era.
Pallavi Niraj Vithalkar, Parmanand Prabhat, Vikas Haribhau Satonkar + 3 more
Communications on Applied Nonlinear Analysis
Post-quantum cryptography methods are made to stand up to the strength of quantum algorithms and protect the privacy, integrity, and validity of private data even when quantum attackers are present.
Feng Hu, L. Lamata, M. Sanz + 4 more
ArXiv
This work shows how to codify super-exponential cryptographic problems into quantum annealers and paves the way for reaching quantum supremacy with an adequately designed chip.
Wang A-chuan, Cao Jun
China Safety Science Journal
Current experimental progress on this aspect is introduced, existing problems are analyzed and some constructive suggestions are proposed, the developing trend for the theory of quantum password is prospected and the course of quantum key production and distribution in the quantum communication is discussed.
Seung-Min Kim, Sunghee Lim, SoโHee Kim + 1 more
journal unavailable
1. ์๋ก ํ์ฌ ์ฌ์ฉ๋๊ณ ์๋ ์ํธ์ฒด๊ณ๋ก๋ RSA๊ณต๊ฐํค ๋ฐฉ์์ด ๋ํ์ ์ด๋ค. R. Rivest, A. Shamir, L. Adleman์ด ๊ฐ๋ฐํ RSA๊ณต๊ฐํค ์ํธ์ฒด๊ณ[1]๋ ์ก์ ์๊ฐ ๊ณต๊ฐํค๋ฅผ ์ด์ฉํด ๋ฉ์ ์ง๋ฅผ ์ํธํ ํ๊ณ ์์ ์๋ ์์ ๋ง์ด ์๊ณ ์๋ ๋น๋ฐํค๋ฅผ ์ด์ฉํด ํ๋ฌธํ๋ฅผ ํ๋ค. ์ด ๊ณต๊ฐํค ๋ฐฉ์์ ์ํธ๋ฅผ ํ๊ธฐ ์ ํด์๋ ์์ธ์๋ถํด๋ฅผ ํด์ผ ํ๋๋ฐ ์๋ฌด๋ฆฌ ์ฑ๋ฅ ์ข์ ์ปดํจ ํฐ๋ผ๋ ํฐ ์์ ์์ธ์๋ถํด๋ ํ๊ธฐ ์ด๋ ค์ ์์ ํ ์ํธ์ฒด ๊ณ๋ค. ๊ทธ๋ฌ๋ 1990๋ ๋ ์ค๋ฐ, ๋ฒจ์ฐ๊ตฌ์์ ์์ฉ์ํ์ Peter Shor๊ฐ ์์ธ์๋ถํด๋ฅผ ์ฝ๊ฒ ํ ์ ์๋ ์์์๊ณ ๋ฆฌ์ฆ์ ๊ฐ ๋ฐํ๋ค[2], [3]. ์ด๋ ์์์ปดํจํฐ๊ฐ ๊ฐ๋ฐ์ด ๋๋ฉด ์ง๊ธ์ ๊ณต ๊ฐํค ๋ฐฉ์์ ์ํธ์ฒด๊ณ๊ฐ ๋์ฒญ ์ํ์ ์ง๋ฉดํ๋ค๋ ๊ฒ์ด๋ค. ์ด ๋ฌธ์ ์ ๋ํ ๋์์ผ๋ก 1983๋ ์ฒ์ Stephen Wiesner๊ฐ ์ ์ํ ์์์ํธ[4], [5]๊ฐ ์๋ค. ์์์ํธ๋ ๋น์ ์์ ์ญ ํ์ ์ด์ฉํ ์ํธ ์ฒด๊ณ์ด๋ค. ์ด์ ํจ๊ป Wiesner๋ ์์กฐ ๋ถ ๊ฐ๋ฅํ ํํ์ธ ์์ ํํ[6]๋ฅผ ๊ตฌ์ํ๋ค. ์์ ์ฝํ์ด๋ผ๋ ์์ ์ญํ์ ํน์ฑ์ ์ด์ฉํ ์์ ํํ๋ ์ต๊ทผ ์์กฐํํ๋ก ๋ฌธ์ ๊ฐ ๋๊ณ ์๋ ๋ถ๋ถ์ ๋ํด ์ต์ ์ ๋์์ฑ ์ผ๋ก ์ฌ๊ฒจ์ง ๊ณ ์๋ค. ๋ณธ ๋ ผ๋ฌธ์์๋ ์์์ํธ...
Hoi-Kwong Lo, Yi Zhao
2009 International Conference and Seminar on Micro/Nanotechnologies and Electron Devices
The work presents results of experiments conducted on the developed setup based on single photon polarization coding, and describes developed fiber based quantum cryptography working with the telecom wavelength 1555 nm.
References: Scarani = Valerio Scarani et al. Rev. Mod. Phys. 81 (2009) 1301-1350. Lengthy review with much valuable material. QCQI = Quantum Computation and Quantum Information by Nielsen and Chuang (Cambridge, 2000), Sec. 12.6 through 12.6.3. The material becomes more and more difficult as Sec. 12.6 advances Stinson = D. R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995). Contains considerable material on classical cryptography H. K. Lo and N. Lutkenhaus, โQuantum cryptography: from theory to practice,โ (2007). arXiv:quant-ph/0702202. A short and very readable introduction. H. K....
There is no abstract for this review article.
A new approach to provide a secure connection between internetbrowsers and website allowing people to transmit private data online, by integrating quantum cryptography in TLS protocol is introduced.
An idea of Stephen Wiesner is expanded to give a method of public key distribution which is provably secure under the principles of quantum mechanics and it appears that this scheme could actually be implemented in favorable environments.
Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper.
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
Promtucs Garnagee Jackson, Anmol Thakur, Kirandeep Kaur
SSRN Electronic Journal
PQShield and Si-Five advance post-quantum cryptography in RISC-V
N. Gisin, Grรฉgoire Ribordy, Wolfgang Tittel + 1 more
journal unavailable
The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
Mustafa Toyran
2007 IEEE 15th Signal Processing and Communications Applications
The definition of classical and quantum cryptography is given and the difference between the two is emphasized and the famous quantum key distribution example is presented.
The material becomes more and more difficult as Sec. 12.6 through 12.3.6 advances.
: In the rapidly evolving field of cyber security, integrating classical and quantum cryptographic techniques to protect sensitive information is becoming increasingly important. This project leverages the capabilities of Microsoft Azure to create a robust security framework that includes two servers: a host server and a user server. The host server uses quantum cryptography to generate encryption keys, while the user server implements the Fernet algorithm for data encryption.
Encryption, in this context, ensures that only the intended sender and receiver can understand any message being sent over an Internet channel.
S. Lakshmi, S. Krishnamoorthy, Mudassir Khan + 2 more
Limitations and Future Applications of Quantum Cryptography
This paper discusses quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding, which is used to establish communication by generating cryptographic keys.
S. Jaฤimovski, J. ล etrajฤiฤ, J. Lamovec
ะะฃะ ะะะ ะะ ะะะะะะะะะะกะข ะ ะะ ะะะะะะะะกะขะะะฃ
This paper seeks to address the principles of the quantum distribution of a key for information encryption and the fundamental problems arising from the execution.
The theory of quantum cryptography, its potential relevance and the development of a prototype system at Los Alamos, which utilises the phenomenon of single-photon interference to perform quantum cryptography over an optical fiber communications link are described.
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas and quantum key distribution is considered as the third and final insight to transform cryptography in the 20th century.
This is a chapter on quantum cryptography for the book"A Multidisciplinary Introduction to Information Security"to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.
Nobuyuki Imoto
Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464)
A theory on quantum key distribution (QKD) with coherent states and a theory on two-state QKD with noisy light sources are developed.
H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin + 1 more
Applied Physics B
After a short introduction to classic cryptography we explain thoroughly how quantum cryptography works. We present then an elegant experimental realization based on a self-balanced interferometer with Faraday mirrors. This phase-coding setup needs no alignment of the interferometer nor polarization control, and therefore considerably facilitates the experiment. Moreover it features excellent fringe visibility. Next, we estimate the practical limits of quantum cryptography. The importance of the detector noise is illustrated and means of reducing it are presented. With present-day technologies...
S. Billewar, G. Londhe, Sunil Ghane
Limitations and Future Applications of Quantum Cryptography
The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously.
This review article discusses the traditional application of quantum cryptography, quantum key distribution (QKD), from a modern perspective, and discusses some recent developments in the context of quantum two-party cooperation (2PC).
Nowadays, information is exchanged among the computer network. These data and information are involved in the business, military, academic education, research and etc. which are shared around the world in both private and public networks. Since, many categories of data are required restriction on the authorization of access, modify, delete, and insert, security in communication is increasingly important to network communication. Currently, computer security applies mathematic theory to computer security for encrypting and decrypting on both sender and receiver. To use a security attack with a ...
Though most people think they are science fiction, quantum cryptography systems are now operational, with prototypes protecting Internet traffic across metropolitan areas and quantum key distribution is considered as the third and final insight to transform cryptography in the 20th century.
Nishant Mehta
journal unavailable
The need of Quantum Cryptography is highlighted and the basic concept behind it is elaborated, which makes use of the quantum mechanical effects to make or break the cipher.
P. Radanliev, D. D. Roure, Omar Santos + 1 more
journal unavailable
,
S. Bhandari
International Journal of Cooperative Information Systems
In this paper about quantum cryptography i.e working, limitation and advantages discussed, quantum cryptography is one of the latest and advanced cryptography technique different from all other cryptography technique and more secure.
A. Bykovsky, I. Kompanets
Quantum Electronics
This work discusses cryptographic data protection network schemes combining the approaches of quantum cryptography with advanced computer information processing methods and designs that are promising for increasing the dimension of the key space in the โone-time padโ method.
J. Gruska
Journal of the Indian Institute of Science
The first goal of the paper is to point out and to demonstrate large importance security issues have for modern science, technology and society and to discuss briefly the main areas, problems and challenges of classical cryptography.
Shravan Kumar Sehgal, Rashmi Gupta
2021 International Conference on Industrial Electronics Research and Applications (ICIERA)
The paper represents various algorithm that are used in quantum cryptography along with its comparison with the existing classical cryptography algorithms and includes the shortcomings of the present algorithms and the future aspect of quantum cryptography.
In quantum key distribution (QKD), Alice selects a sequence of characters from a finite alphabet and transmits the corresponding signals, each described by a quantum state, to Bob. Between Alice and Bob, Eve---with her own receiver and transmitter---can eavesdrop. Eve is assumed to know beforehand all the possible states from among which Alice chooses. The central question is: Can Eve gain significant information about the key without influencing what Bob receives in ways that Alice and Bob can detect? This formulation implies that many options are available to Eve. It is the purpose here to d...
This doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 to 2002.
A survey of quantum and post quantum cryptography is provided, reviewing the principle of a quatum computer as well as Shorโs algorithm and quantum key distribution and some cryptosystems, that are believed to resist classical and quantum computers.
The possible contributions of quantum mechanics to the fields of cryptography as well as to machine computation in general are examined, which can already boast of initial successes, especially in cryptography and quantum computing.
This work defines strong attacks of this type, and shows security against them, suggesting that quantum cryptography is secure, and suggests a new type of quantum key distribution scheme where quantum memories are used instead of quantum channels.
David E. Ott, Chris Peikert, et al.
ArXiv
On January 31-February 1, 2019, the Computing Community Consortium (CCC) held a workshop in Washington, D.C. to discuss research challenges associated with PQC migration and imagining a new science of "cryptographic agility".
A. Pandey, Aashish Banati, Balaji Rajendran + 2 more
2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)
This paper explores the motivation behind PQC and provides an overview of the experimental research conducted in the field, and discusses considerations for selecting and implementing post-quantum cryptographic algorithms, including security levels, algorithmic characteristics, performance tradeoffs, and integration challenges.
G. Murali, R. Prasad
2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
Comparison analysis performance in local and cloud environment is provided to identify the best environment using classical or quantum cryptography on various cryptographic algorithms.
Barot Savan Hareshbhai, S. Valiveti, Dilip Kothari + 1 more
2023 First International Conference on Microwave, Antenna and Communication (MAC)
This work primarily focuses on generating random numbers using the Quantum Key Distribution (QKD) as a parallel benefit and shows that the SSP protocol gives better randomization when compared to the BB84 protocol.
R. Ramos, R. F. Souza
Journal of Optical Communications
This work proposes the use of suitable properties of chaotic systems, such as great sensitivity to initial conditions, unpredictability, controllability and synchronisation of chaotic system to overcome some problems of quantum cryptography.
C. K. Gitonga
European Journal of Information Technologies and Computer Science
This paper addresses risks to classical cryptographic methods through a detailed investigation of quantum-resistant algorithms, focusing on lattice- based (CRYSTALS-Kyber), hash-based (SPHINCS+), and code-based (McEliece) systems, and proposes a transitional approach using hybrid cryptographic systems for a secure, gradual transition.
T. Moses
journal unavailable
Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries and Entrust Limited in Canada and other company and product names are registered trademarks of their respective owners.
Eren Danyel Uรงar
Human Computer Interaction
Post-quantum cryptography is at the forefront of protecting the digital future from the impact of quantum computing, ensuring the integrity and confidentiality of information in the post-quantum era.
J. Buchmann, Johannes Braun, Denise Demirel + 1 more
Quantum Science and Technology
This paper argues that a combination of quantum cryptography and classical cryptography can provide long-term confidentiality and it is argued that quantum random number generation and quantum key distribution can provide such protection.
Chuck Easttom
journal unavailable
Lattice based cryptosystems are a viable candidate for post-quantum computing because they will be able to render current number theoretic asymmetric cryptography algorithms obsolete.