# Quantum cryptography beyond quantum key distribution

@article{Broadbent2016QuantumCB, title={Quantum cryptography beyond quantum key distribution}, author={Anne Broadbent and Christian Schaffner}, journal={Designs, Codes, and Cryptography}, year={2016}, volume={78}, pages={351 - 382} }

Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secure two- and multi-party computation and delegated quantum computation. Quantum cryptography also studies the limitations and challenges resulting from quantum adversaries—including the impossibility…

## Tables from this paper

## 139 Citations

Quantum Cryptography: Security for the Post-Quantum world

- Computer Science, Mathematics
- 2020

This paper will discuss the current quantum cryptographic techniques both available and in development, such as: quantum key distribution (QKD), quantum networks, delegated quantum computing techniques (BQC and QHE) and quantum random number generators (QRNGS), along with a new classical scheme heralded as a classical QKD-like protocol.

Computational Security of Quantum Encryption

- Computer Science, MathematicsICITS
- 2016

This work develops natural definitions for private-key and public-key encryption schemes for quantum data and defines notions of semantic security and indistinguishability, and constructs secure quantum encryption schemes from basic primitives.

Enhanced Quantum Key Distribution using Hybrid Channels and Natural Random Numbers

- Computer Science, PhysicsArXiv
- 2020

This paper proposes three secure key distribution protocols based on a blend of classical and quantum channels that exploits the property of quantum computers to generate natural random numbers that can be easily transmitted using a single qubit over a quantum channel and can be used for distributing keys to the involved parties in a communication network.

Quantum-Resistant Cryptography

- Computer Science, MathematicsCryptography Apocalypse
- 2019

This report surveys the computational model of quantum computers; the quantum algorithms that affect cryptography the most; the risk of Cryptographically Relevant Quantum Computers (CRQCs) being built; the security of symmetric and public- key cryptography in the presence of CRQCs; the NIST PQC standardization effort; the migration to quantum-resistant public-key cryptography; the relevance of Quantum Key Distribution as a complement to conventional cryptography.

Advances in Quantum Cryptography

- Computer Science
- 2019

This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.

Quantum Security of Cryptographic Primitives

- Computer Science, MathematicsArXiv
- 2017

This work proposes the first systematic classification of quantum security scenarios, and provides a novel framework for the quantum security (both in terms of indistinguishability and semantic security) of secret-key encryption schemes, and gives explicit secure constructions, as well as impossibility results.

Quantum Cryptography: A Survey

- Computer Science, MathematicsIBICA
- 2018

This paper represents the overview of Quantum Cryptography, which provides a solution to the breaking of various popular public key encryption and signature schemes and helps to solve the security problems and also makes the communication channel is more secure.

On the Use of Quantum Entanglement in Secure Communications: A Survey

- Computer Science, PhysicsArXiv
- 2020

It turns out that Heisenberg's Uncertainty Principle, one of the most interesting results in Quantum Mechanics, could be the theoretical basis and the main scientific principle behind the ultimate frontier in quantum cryptography or secure communications in conjunction with Quantum Entanglement.

Garbled Quantum Computation

- Computer Science, PhysicsCryptogr.
- 2017

This contribution explores the possibility of extending the verifiable UBQC, and presents a “Yao”-type protocol for secure two-party quantum computation that is secure against a specious (quantum honest-but-curious) garbler, but in this case, against a (fully) malicious evaluator.

The AES-256 Cryptosystem Resists Quantum Attacks

- Computer Science, Mathematics
- 2017

The proof of AES-256 using Grover’s algorithm which can resist quantum is depicted and it is shown that this algorithm can resist conventional computers as well as quantum computers.

## References

SHOWING 1-10 OF 304 REFERENCES

A Note on Quantum Security for Post-Quantum Cryptography

- Computer Science, MathematicsPQCrypto
- 2014

Shor’s quantum factoring algorithm and a few other efficient quantum algorithms break many classical crypto-systems. In response, people proposed post-quantum cryptography based on computational…

Classical Cryptographic Protocols in a Quantum World

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2015

This work shows the existence of classical two-party protocols for the secure evaluation of any polynomial-time function under reasonable computational assumptions and shows that the basic two- party feasibility picture from classical cryptography remains unchanged in a quantum world.

Tight finite-key analysis for quantum cryptography

- Computer Science, MathematicsNature communications
- 2012

Here it is shown that gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

Quantum vernam cipher

- Computer Science, PhysicsQuantum Inf. Comput.
- 2002

Parts of secure quantum communication are discussed by proposing and analyzing a quantum analog of the Vernam cipher (one-time-pad), which shows that key recycling is intrinsic to the quantum cipher-text, rather than using entanglement as the key.

BLIND QUANTUM COMPUTATION

- Computer Science, Physics
- 2012

This recognition opened the door to many other quantum protocols that provide unconditional security based on the laws of physics rather than conjectures on computational hardness.

No signaling and quantum key distribution.

- PhysicsPhysical review letters
- 2005

A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.

On optimising quantum communication in verifiable quantum computing

- Computer Science
- 2015

This work presents a new protocol for quantum verification by incorporating existing techniques in a non-standard composition to reduce the required quantum communications between the verifier and the prover.

Fully device-independent quantum key distribution.

- Computer Science
- 2014

This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.

Robust device independent quantum key distribution

- Computer Science, MathematicsITCS
- 2014

The proof of security builds upon a number of techniques, including randomness extractors that are secure against quantum storage as well as ideas originating in the coding strategy used in the proof of the Holevo-Schumacher-Westmoreland theorem which apply to bound correlations across multiple rounds in a way not unrelated to information-theoretic proofs of the parallel repetition property for multiplayer games.

Quantum computing on encrypted data.

- Computer Science, PhysicsNature communications
- 2014

It is proved that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation.