Post-quantum cryptography and the quantum future of cybersecurity

被引:0
|
作者
Liu, Yi-Kai [1 ,2 ]
Moody, Dustin [1 ]
机构
[1] Natl Inst Stand & Technol NIST, Gaithersburg, MD 20899 USA
[2] Univ Maryland, Joint Ctr Quantum Informat & Comp Sci QuICS, NIST, College Pk, MD 20742 USA
来源
PHYSICAL REVIEW APPLIED | 2024年 / 21卷 / 04期
关键词
RANDOMNESS; ADVANTAGE; SECURITY; MEMORY; SPINS; SIGN;
D O I
10.1103/PhysRevApplied.21.040501
中图分类号
O59 [应用物理学];
学科分类号
摘要
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond. We focus on two goals: protecting the secret keys that are used in classical cryptography, and ensuring the trustworthiness of quantum computations. These goals may soon be within reach, thanks to recent progress in both theory and experiment. This progress includes interactive protocols for testing quantumness as well as for performing uncloneable cryptographic computations; and experimental demonstrations of device-independent random number generators, device-independent quantum key distribution, quantum memories, and analog quantum simulators.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
    Oliva Del Moral, Javier
    Demarti Iolius, Antonio
    Vidal, Gerard
    Crespo, Pedro M.
    Etxezarreta Martinez, Josu
    [J]. IEEE Internet of Things Journal, 2024, 11 (18) : 30217 - 30244
  • [2] Post-Quantum Cryptography
    Monroe, Don
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [3] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. NATURE, 2017, 549 (7671) : 188 - 194
  • [4] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    [J]. Nature, 2017, 549 : 188 - 194
  • [5] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [6] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    [J]. SECURITY AND PRIVACY, 2022, 5 (02)
  • [7] A note on quantum security for post-quantum cryptography
    Song, Fang
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [8] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [9] EasyPQC: Verifying Post-Quantum Cryptography
    Barbosa, Manuel
    Barthe, Gilles
    Fan, Xiong
    Gregoire, Benjamin
    Hung, Shih-Han
    Katz, Jonathan
    Strub, Pierre-Yves
    Wu, Xiaodi
    Zhou, Li
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2564 - 2586
  • [10] A Mathematical Perspective on Post-Quantum Cryptography
    Richter, Maximilian
    Bertram, Magdalena
    Seidensticker, Jasper
    Tschache, Alexander
    [J]. MATHEMATICS, 2022, 10 (15)