Post-quantum cryptography and the quantum future of cybersecurity

被引:0
|
作者
Liu, Yi-Kai [1 ,2 ]
Moody, Dustin [1 ]
机构
[1] Natl Inst Stand & Technol NIST, Gaithersburg, MD 20899 USA
[2] Univ Maryland, Joint Ctr Quantum Informat & Comp Sci QuICS, NIST, College Pk, MD 20742 USA
来源
PHYSICAL REVIEW APPLIED | 2024年 / 21卷 / 04期
关键词
RANDOMNESS; ADVANTAGE; SECURITY; MEMORY; SPINS; SIGN;
D O I
10.1103/PhysRevApplied.21.040501
中图分类号
O59 [应用物理学];
学科分类号
摘要
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond. We focus on two goals: protecting the secret keys that are used in classical cryptography, and ensuring the trustworthiness of quantum computations. These goals may soon be within reach, thanks to recent progress in both theory and experiment. This progress includes interactive protocols for testing quantumness as well as for performing uncloneable cryptographic computations; and experimental demonstrations of device-independent random number generators, device-independent quantum key distribution, quantum memories, and analog quantum simulators.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective
    Oliva del Moral, Javier
    deMarti iOlius, Antonio
    Vidal, Gerard
    Crespo, Pedro M.
    Etxezarreta Martinez, Josu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (18): : 30217 - 30244
  • [2] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [3] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [4] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [5] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [6] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    SECURITY AND PRIVACY, 2022, 5 (02)
  • [7] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [8] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [9] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [10] Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography
    Aydegers, Abdula
    Zeydan, Engin
    Yadav, Awaneesti Kumar
    Hemachandra, Kasun T.
    Liyanage, Madhusanka
    2024 15TH INTERNATIONAL CONFERENCE ON NETWORK OF THE FUTURE, NOF 2024, 2024, : 195 - 203