Will quantum computers be the end of public key encryption?

被引:0
|
作者
机构
[1] Buchanan, William
[2] Woodward, Alan
来源
Woodward, Alan (alan.woodward@surrey.ac.uk) | 1600年 / Taylor and Francis Ltd.卷 / 01期
关键词
Public key cryptography - Quantum cryptography - Quantum theory - Quantum computers - Computer architecture;
D O I
10.1080/23742917.2016.1226650
中图分类号
学科分类号
摘要
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well understood algorithms run in polynomial time on certain quantum computer architectures. Many appear to be heralding this next step in computing as ‘the end of public key encryption’. We argue that this is not the case and that there are many fields of mathematics that can be used for creating ‘quantum resistant’ cryptographic schemes. We present a high-level review of the threat posed by quantum computers, using RSA and Shor’s algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat to public key encryption schemes is likely to be limited in future. We discuss some of the other schemes that we believe could form the basis for public key encryption schemes, some of which could enter widespread use in the very near future, and indicate why some are more likely to be adopted. © 2016, © 2016 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
相关论文
共 50 条
  • [1] The End of Encryption? - The Era of Quantum Computers
    Szikora, Peter
    Lazanyi, Kornelia
    SECURITY-RELATED ADVANCED TECHNOLOGIES IN CRITICAL INFRASTRUCTURE PROTECTION: THEORETICAL AND PRACTICAL APPROACH, 2022, : 61 - 72
  • [2] Quantum Indistinguishability for Public Key Encryption
    Gagliardoni, Tommaso
    Kraemer, Juliane
    Struck, Patrick
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 463 - 482
  • [3] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [4] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [5] Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution
    Malavolta, Giulio
    Walter, Michael
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VII, 2024, 14926 : 126 - 151
  • [6] A Practical Quantum Public-key Encryption Model
    Wang, Yuqi
    She, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 367 - 372
  • [7] Public-key encryption and authentication of quantum information
    Liang Min
    Yang Li
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2012, 55 (09) : 1618 - 1629
  • [8] Public-key encryption and authentication of quantum information
    Min Liang
    Li Yang
    Science China Physics, Mechanics and Astronomy, 2012, 55 : 1618 - 1629
  • [9] Public-key encryption and authentication of quantum information
    LIANG Min 1
    2 Graduate University of Chinese Academy of Sciences
    Science China(Physics,Mechanics & Astronomy), 2012, (09) : 1618 - 1629
  • [10] Quantum Resistant Public Key Encryption Scheme HermitianRLCE
    Matthews, Gretchen L.
    Wang, Yongge
    CODE-BASED CRYPTOGRAPHY, CBC 2019, 2019, 11666 : 1 - 10