Will quantum computers be the end of public key encryption?

被引:0
|
作者
机构
[1] Buchanan, William
[2] Woodward, Alan
来源
Woodward, Alan (alan.woodward@surrey.ac.uk) | 1600年 / Taylor and Francis Ltd.卷 / 01期
关键词
Public key cryptography - Quantum cryptography - Quantum theory - Quantum computers - Computer architecture;
D O I
10.1080/23742917.2016.1226650
中图分类号
学科分类号
摘要
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well understood algorithms run in polynomial time on certain quantum computer architectures. Many appear to be heralding this next step in computing as ‘the end of public key encryption’. We argue that this is not the case and that there are many fields of mathematics that can be used for creating ‘quantum resistant’ cryptographic schemes. We present a high-level review of the threat posed by quantum computers, using RSA and Shor’s algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat to public key encryption schemes is likely to be limited in future. We discuss some of the other schemes that we believe could form the basis for public key encryption schemes, some of which could enter widespread use in the very near future, and indicate why some are more likely to be adopted. © 2016, © 2016 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
相关论文
共 50 条
  • [21] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [22] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [23] Video Encryption and Decryption on Quantum Computers
    Fei Yan
    Abdullah M. Iliyasu
    Salvador E. Venegas-Andraca
    Huamin Yang
    International Journal of Theoretical Physics, 2015, 54 : 2893 - 2904
  • [24] End-to-End Post-Quantum Cryptography Encryption Protocol for Video Conferencing System Based on Government Public Key Infrastructure
    Park, Yeongjae
    Yoo, Hyeondo
    Ryu, Jieun
    Choi, Young-Rak
    Kang, Ju-Sung
    Yeom, Yongjin
    APPLIED SYSTEM INNOVATION, 2023, 6 (04)
  • [25] Video Encryption and Decryption on Quantum Computers
    Yan, Fei
    Iliyasu, Abdullah M.
    Venegas-Andraca, Salvador E.
    Yang, Huamin
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (08) : 2893 - 2904
  • [26] Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes
    Zheng, Shihui
    Gu, Lize
    Xiao, Da
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (01) : 116 - 124
  • [27] Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes
    Shihui Zheng
    Lize Gu
    Da Xiao
    International Journal of Theoretical Physics, 2014, 53 : 116 - 124
  • [28] Quantum public-key encryption schemes based on conjugate coding
    Yang, Li
    Yang, Biyao
    Xiang, Chong
    QUANTUM INFORMATION PROCESSING, 2020, 19 (11)
  • [29] Post-Quantum Multi-Recipient Public Key Encryption
    Alwen, Joel
    Hartmann, Dominik
    Kiltz, Eike
    Mularczyk, Marta
    Schwabe, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1108 - 1122
  • [30] An Efficient Multi-Bit Quantum Public Key Encryption Scheme
    Zheng S.-H.
    Wen K.
    Gu L.-Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2019, 42 (04): : 38 - 42