Will quantum computers be the end of public key encryption?

被引:0
|
作者
机构
[1] Buchanan, William
[2] Woodward, Alan
来源
Woodward, Alan (alan.woodward@surrey.ac.uk) | 1600年 / Taylor and Francis Ltd.卷 / 01期
关键词
Public key cryptography - Quantum cryptography - Quantum theory - Quantum computers - Computer architecture;
D O I
10.1080/23742917.2016.1226650
中图分类号
学科分类号
摘要
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well understood algorithms run in polynomial time on certain quantum computer architectures. Many appear to be heralding this next step in computing as ‘the end of public key encryption’. We argue that this is not the case and that there are many fields of mathematics that can be used for creating ‘quantum resistant’ cryptographic schemes. We present a high-level review of the threat posed by quantum computers, using RSA and Shor’s algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat to public key encryption schemes is likely to be limited in future. We discuss some of the other schemes that we believe could form the basis for public key encryption schemes, some of which could enter widespread use in the very near future, and indicate why some are more likely to be adopted. © 2016, © 2016 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
相关论文
共 50 条
  • [41] Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search
    Yang, Yang
    Yang, Shu-Lve
    Wang, Feng-He
    Sun, Jin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (02) : 485 - 497
  • [42] An image encryption scheme based on public key cryptosystem and quantum logistic map
    Ye, Guodong
    Jiao, Kaixin
    Huang, Xiaoling
    Goi, Bok-Min
    Yap, Wun-She
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [43] From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments
    Hhan, Minki
    Morimae, Tomoyuki
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 639 - 667
  • [44] An image encryption scheme based on public key cryptosystem and quantum logistic map
    Guodong Ye
    Kaixin Jiao
    Xiaoling Huang
    Bok-Min Goi
    Wun-She Yap
    Scientific Reports, 10
  • [45] Quantum Computing: The End of Encryption?
    Dysart, Joe
    COMMUNICATIONS OF THE ACM, 2018, 61 (05) : 28 - 28
  • [46] Quantum public-key encryption protocol based on single-photon
    Luo, Wen-Jun
    Liu, Guan-Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 9 - 13
  • [47] Quantum public-key encryption protocols with information-theoretic security
    Yang, Li
    Yang, Biyao
    Pan, Jiangyou
    QUANTUM OPTICS II, 2012, 8440
  • [48] Deterministic quantum-public-key encryption: Forward search attack and randomization
    Nikolopoulos, Georgios M.
    Ioannou, Lawrence M.
    PHYSICAL REVIEW A, 2009, 79 (04):
  • [49] Quantum key distribution via quantum encryption
    Zhang, YS
    Li, CF
    Guo, GC
    PHYSICAL REVIEW A, 2001, 64 (02): : 4
  • [50] Quantum key distribution via quantum encryption
    Zhang, Yong-Sheng
    Li, Chuan-Feng
    Guo, Guang-Can
    Physical Review A. Atomic, Molecular, and Optical Physics, 2001, 64 (02): : 1 - 024302