Post-quantum cryptography and the quantum future of cybersecurity

被引:0
|
作者
Liu, Yi-Kai [1 ,2 ]
Moody, Dustin [1 ]
机构
[1] Natl Inst Stand & Technol NIST, Gaithersburg, MD 20899 USA
[2] Univ Maryland, Joint Ctr Quantum Informat & Comp Sci QuICS, NIST, College Pk, MD 20742 USA
来源
PHYSICAL REVIEW APPLIED | 2024年 / 21卷 / 04期
关键词
RANDOMNESS; ADVANTAGE; SECURITY; MEMORY; SPINS; SIGN;
D O I
10.1103/PhysRevApplied.21.040501
中图分类号
O59 [应用物理学];
学科分类号
摘要
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond. We focus on two goals: protecting the secret keys that are used in classical cryptography, and ensuring the trustworthiness of quantum computations. These goals may soon be within reach, thanks to recent progress in both theory and experiment. This progress includes interactive protocols for testing quantumness as well as for performing uncloneable cryptographic computations; and experimental demonstrations of device-independent random number generators, device-independent quantum key distribution, quantum memories, and analog quantum simulators.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography
    Biasse, J-F
    Bonnetain, X.
    Kirshanova, E.
    Schrottenloher, A.
    Song, F.
    [J]. IET INFORMATION SECURITY, 2023, 17 (02) : 171 - 209
  • [42] Post-Quantum Cryptography What Advancements in Quantum Computing Mean for IT Professionals
    Mailloux, Logan O.
    Lewis, Charlton D., II
    Riggs, Casey
    Grimaila, Michael R.
    [J]. IT PROFESSIONAL, 2016, 18 (05) : 42 - 47
  • [43] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    [J]. IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [44] A Survey of Post-Quantum Cryptography: Start of a New Race
    Dam, Duc-Thuan
    Tran, Thai-Ha
    Hoang, Van-Phuc
    Pham, Cong-Kha
    Hoang, Trong-Thuc
    [J]. CRYPTOGRAPHY, 2023, 7 (03)
  • [45] Network coding-based post-quantum cryptography
    Cohen A.
    D’Oliveira R.G.L.
    Salamatian S.
    Médard M.
    [J]. IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 49 - 64
  • [46] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    [J]. ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99
  • [47] QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging
    Kern, Dustin
    Krauss, Christoph
    Lauser, Timm
    Alnahawi, Nouri
    Wiesmaier, Alexander
    Niederhagen, Ruben
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 85 - 111
  • [48] NIST's Post-Quantum Cryptography Standards Competition
    Schneier, Bruce
    [J]. IEEE SECURITY & PRIVACY, 2022, 20 (05) : 107 - 108
  • [49] The Long Road Ahead to Transition to Post-Quantum Cryptography
    La Macchia, Brian
    [J]. COMMUNICATIONS OF THE ACM, 2022, 65 (01) : 28 - 30
  • [50] Post-Quantum Cryptography Research Landscape: A Scientometric Perspective
    Sharma, Priya
    Gupta, Vrinda
    Sood, Sandeep Kumar
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023,