Will quantum computers be the end of public key encryption?

被引:0
|
作者
机构
[1] School of Computing, Napier University, Edinburgh
[2] Department of Computer Science, University of Surrey, Guildford
来源
Woodward, Alan (alan.woodward@surrey.ac.uk) | 1600年 / Taylor and Francis Ltd.卷 / 01期
关键词
hidden subset problem; Post-quantum cryptography; Shor’s algorithm;
D O I
10.1080/23742917.2016.1226650
中图分类号
学科分类号
摘要
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well understood algorithms run in polynomial time on certain quantum computer architectures. Many appear to be heralding this next step in computing as ‘the end of public key encryption’. We argue that this is not the case and that there are many fields of mathematics that can be used for creating ‘quantum resistant’ cryptographic schemes. We present a high-level review of the threat posed by quantum computers, using RSA and Shor’s algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat to public key encryption schemes is likely to be limited in future. We discuss some of the other schemes that we believe could form the basis for public key encryption schemes, some of which could enter widespread use in the very near future, and indicate why some are more likely to be adopted. © 2016, © 2016 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:1 / 22
页数:21
相关论文
共 50 条
  • [1] Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies
    Eaton, Edward
    Jao, David
    Komlo, Chelsea
    Mokrani, Youcef
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 461 - 482
  • [2] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    CRYPTOGRAPHY, 2023, 7 (04)
  • [3] Evolution of the McEliece Public Key Encryption Scheme
    Bucerzan, Dominic
    Dragoi, Vlad
    Kalachi, Herve Tale
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149
  • [4] Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System
    Kuang, Randy
    Barbeau, Michel
    2021 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2021,
  • [5] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Debnath, Sumit Kumar
    Mesnager, Sihem
    Dey, Kunal
    Kundu, Nibedita
    MEDITERRANEAN JOURNAL OF MATHEMATICS, 2021, 18 (05)
  • [6] Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography
    Sumit Kumar Debnath
    Sihem Mesnager
    Kunal Dey
    Nibedita Kundu
    Mediterranean Journal of Mathematics, 2021, 18
  • [7] Chosen ciphertext attacks on lattice-based public key encryption and modem (non-quantum) cryptography in a quantum environment
    Izmerly, Oleg
    Mor, Tal
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (03) : 308 - 323
  • [8] A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms
    Roman, Roberto
    Arjona, Rosario
    Lopez-Gonzalez, Paula
    Baturone, Iluminada
    PROCEEDINGS OF THE 21ST 2022 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2022), 2022, P-329
  • [9] Extended multivariate public key cryptosystems with secure encryption function
    Wang HouZhen
    Zhang HuanGuo
    Wang ZhangYi
    Tang Ming
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (06) : 1161 - 1171
  • [10] Extended multivariate public key cryptosystems with secure encryption function
    HouZhen Wang
    HuanGuo Zhang
    ZhangYi Wang
    Ming Tang
    Science China Information Sciences, 2011, 54