Top Research Papers on Quantum Cryptography
Discover the top research papers on Quantum Cryptography and stay ahead in the revolutionary field of secure communication. Our curated list highlights significant advancements and insightful studies that pave the way for the future of cryptographic techniques using quantum mechanics. From fundamental principles to cutting-edge applications, these papers are essential reading for anyone passionate about the potential of quantum cryptography.
Looking for research-backed answers?Try AI Search
Advances in quantum cryptography
1629 Citations 2020S. Pirandola, U. L. Andersen, L. Banchi + 15 more
Advances in Optics and Photonics
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Security in quantum cryptography
311 Citations 2022Christopher Portmann, Renato Renner
Reviews of Modern Physics
This paper reviews this physical notion of security, focusing on quantum key distribution and secure communication, which relies entirely on the laws of quantum mechanics.
Transitioning organizations to post-quantum cryptography
186 Citations 2022David Joseph, Rafael Misoczki, Marc Manzano + 7 more
Nature
An organizational perspective of the post-quantum cryptography transition is presented and standards and recommendations for transitioning organizations to quantum-secure cryptographic protocols are outlined, including a discussion of transition timelines and the leading strategies to protect systems against quantum attacks.
Experimental authentication of quantum key distribution with post-quantum cryptography
120 Citations 2021Liujun Wang, Kaiyi Zhang, Jiayong Wang + 9 more
npj Quantum Information
Here, the feasibility, efficiency, and stability of the PQC algorithm in QKD authentication is experimentally verified, and the advantages when new users join theQKD network are demonstrated.
Quantum cryptography with highly entangled photons from semiconductor quantum dots
137 Citations 2021Christian Schimpf, Marcus Reindl, Daniel Huber + 6 more
Science Advances
This work demonstrates the viability of quantum dots as light sources for entanglement-based quantum key distribution and quantum networks, and increases the excitation rate and embedding the dots in state-of-the-art photonic structures, key generation rates in the gigabits per second range are in principle at reach.
Quantum cryptography: Public key distribution and coin tossing
5308 Citations 2020C. H. Bennett, Brassard, Gilles
arXiv (Cornell University)
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such a quantum channel can be used in conjunction with ordinary insecure classical channels to distribute random key information between two users with the assurance that it remains unknown to anyone else,...
Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks
535 Citations 2020Tiago M. Fernández‐Caramés, Paula Fraga‐Lamas
IEEE Access
Current state of the art on post-quantum cryptosystems and how they can be applied to blockchains and DLTs are studied, as well as their main challenges.
Entanglement-based secure quantum cryptography over 1,120 kilometres
675 Citations 2020Juan Yin, Yu-Huai Li, Sheng‐Kai Liao + 21 more
Nature
Entanglement-based quantum key distribution is demonstrated between two ground stations separated by 1,120 kilometres at a finite secret-key rate of 0.12 bits per second, without the need for trusted relays, which increases the secure distance on the ground tenfold and increases the practical security of QKD to an unprecedented level.
High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography
123 Citations 2021Mojtaba Bisheh-Niasar, Reza Azarderakhsh, Mehran Mozaffari Kermani
journal unavailable
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT) using a small Artix-7 FPGA and proposes several optimization strategies for efficiency improvement targeting different performance requirements for various applications.
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process
194 Citations 2022Gorjan Alagic, Daniel Apon, David A. Cooper + 11 more
journal unavailable
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public-key encryption, and key-establishment algorithms to augment Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS), as well as NIST Special Publication (SP) 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, and SP 800-56B Revision 2, Recommendation f...
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process
342 Citations 2022Gorjan Alagic, Daniel Apon, David A. Cooper + 11 more
journal unavailable
The National Institute of Standards and Technology is in the process of selecting public-key cryptographic algorithms through a public, competition-like process. The new public-key cryptography standards will specify additional digital signature, public-key encryption, and key-establishment algorithms to augment Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS), as well as NIST Special Publication (SP) 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, and SP 800-56B Revision 2, Recommendation f...
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
121 Citations 2020Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
IACR Transactions on Cryptographic Hardware and Embedded Systems
RISQ-V is presented, an enhanced RISC-V architecture that integrates a set of powerful tightly coupled accelerators to speed up lattice-based PQC and extended the Risc-V ISA with 29 new instructions to efficiently perform operations for lattices-based cryptography.
Status report on the second round of the NIST post-quantum cryptography standardization process
283 Citations 2020Dustin Moody, Gorjan Alagic, Daniel Apon + 10 more
journal unavailable
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure.ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology.ITL's responsibilities include the development of management, administrative, technical, and physical
VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture
110 Citations 2020Guozhu Xin, Jun Han, Tianyu Yin + 4 more
IEEE Transactions on Circuits and Systems I Regular Papers
Experimental results show that VPQC can speed up several typical key encapsulation mechanisms (NewHope, Kyber and LAC) by an order of magnitude compared with previous state-of-the-art hardware implementations.
Cryptography and Network Security
605 Citations 2022Marcelo Sampaio de Alencar
River Publishers eBooks
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP prot...
Introduction to Modern Cryptography
394 Citations 2020Jonathan Katz, Yehuda Lindell
journal unavailable
This book discusses Private-Key (Symmetric) Cryptography, Number Theory and Cryptographic Hardness Assumptions, and the Random-Oracle Model in Detail.
Combining cryptography with biometrics effectively
175 Citations 2021Feng Hao, Ross Anderson, John Daugman
journal unavailable
The first practical and secure way to integrate the iris biometric into cryptographic applications is proposed, and an error-free key can be reproduced reliably from genuine iris codes with a 99.5% success rate.
SoK: Computer-Aided Cryptography
103 Citations 2021Manuel Barbosa, Gilles Barthe, Karthik Bhargavan + 4 more
journal unavailable
A cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii) functional correctness and efficiency, and (iii) implementation- level security (with a focus on digital side-channel resistance).
Lightweight cryptography in IoT networks: A survey
210 Citations 2021Muhammad Rana, Quazi Mamun, Rafiqul Islam
Future Generation Computer Systems
With the advent of advanced technology, the IoT has made possible the connection of numerous devices that can collect vast volumes of data. Hence, the demands of IoT security is paramount. Cryptography is being used to secure the authentication, confidentiality, data integrity and access control of networks. However, due to the many constraints of IoT devices, traditional cryptographic protocols are no longer suited to all IoT environments, such as the smart city. As a result, researchers have been proposing various lightweight cryptographic algorithms and protocols to secure data on IoT netwo...
Visual cryptography in single-pixel imaging
145 Citations 2020Shuming Jiao, Jun Feng, Yang Gao + 2 more
Optics Express
Two novel visual cryptography schemes are proposed by combining VC with single-pixel imaging (SPI) for the first time, where the secret image is shared by multiple illumination pattern sequences and it can be recovered when the visual key patterns are projected onto identical items.