Quantum Advantage in Cryptography

  title={Quantum Advantage in Cryptography},
  author={Renato Renner and Ramona Wolf},
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle? At first sight, it looks as if it just lifts the competition between cryptographers and cryptanalysts to the next level. Indeed, quantum computers will render most of today… 
1 Citations

Figures and Tables from this paper

Performance investigations on data protection algorithms in generalized multi protocol label switched optical networks

RSA gives better performance than AES algorithm and enhance the quality of service considering blocking probability, latency and overheads in GMPLS optical networks leading to enhanced data protection.



Quantum cryptography: Public key distribution and coin tossing

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

Practical device-independent quantum cryptography via entropy accumulation

A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.

Limitations of Practical Quantum Cryptography

In this paper the various limitations of quantum cryptography along with its many real time implementation problems are described.

No signaling and quantum key distribution.

A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.

Post-quantum cryptography

The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

Experimental quantum key distribution certified by Bell's theorem.

The experimental realization of a complete quantum key distribution protocol immune to eavesdropping attacks is presented, and it is shown that provably secure cryptography under general assumptions is possible with real-world devices, and paves the way for further quantum information applications based on the device-independence principle.

Experimental quantum cryptography

An apparatus and protocol designed to implement quantum key distribution is described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.

Security of quantum key distribution from generalised entropy accumulation

This work shows that for a very broad class of QKD protocols, security against collective attacks implies security against general attacks, which can be applied much more broadly and easily.