Will quantum computers be the end of public key encryption?

被引:0
作者
机构
[1] School of Computing, Napier University, Edinburgh
[2] Department of Computer Science, University of Surrey, Guildford
来源
Woodward, Alan (alan.woodward@surrey.ac.uk) | 1600年 / Taylor and Francis Ltd.卷 / 01期
关键词
hidden subset problem; Post-quantum cryptography; Shor’s algorithm;
D O I
10.1080/23742917.2016.1226650
中图分类号
学科分类号
摘要
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well understood algorithms run in polynomial time on certain quantum computer architectures. Many appear to be heralding this next step in computing as ‘the end of public key encryption’. We argue that this is not the case and that there are many fields of mathematics that can be used for creating ‘quantum resistant’ cryptographic schemes. We present a high-level review of the threat posed by quantum computers, using RSA and Shor’s algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat to public key encryption schemes is likely to be limited in future. We discuss some of the other schemes that we believe could form the basis for public key encryption schemes, some of which could enter widespread use in the very near future, and indicate why some are more likely to be adopted. © 2016, © 2016 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:1 / 22
页数:21
相关论文
共 50 条
  • [31] A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
    Shim, Kyung-Ah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 14025 - 14042
  • [32] Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices
    Chikouche, Noureddine
    Ghadbane, Abderrahmen
    CHALLENGES AND OPPORTUNITIES IN THE DIGITAL ERA, 2018, 11195 : 67 - 80
  • [33] Quantum-safe global encryption policy
    Zornetta, Alessia
    INTERNATIONAL JOURNAL OF LAW AND INFORMATION TECHNOLOGY, 2024, 32 (01):
  • [34] Post-quantum Commutative Encryption Algorithm
    Moldovyan, Dmitriy N.
    Moldovyan, Alexandr A.
    Han Ngoc Phieu
    Minh Hieu Nguyen
    CONTEXT-AWARE SYSTEMS AND APPLICATIONS, AND NATURE OF COMPUTATION AND COMMUNICATION, 2019, 298 : 205 - 214
  • [35] Scenarios for Optical Encryption Using Quantum Keys
    Velasco, Luis
    Ahmadian, Morteza
    Ortiz, Laura
    Brito, Juan P.
    Pastor, Antonio
    Rivas, Jose M.
    Barzegar, Sima
    Comellas, Jaume
    Martin, Vicente
    Ruiz, Marc
    SENSORS, 2024, 24 (20)
  • [36] An Efficient Key Generation of ZHFE Public Key Cryptosystem
    Ikematsu, Yasuhiko
    Dung Hoang Duong
    Petzoldt, Albrecht
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01): : 29 - 38
  • [37] Security analysis of public-key cryptosystems based on matrix action problem against quantum attack
    Huang H.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (03): : 220 - 226
  • [38] Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
    Yunakovsky, Sergey E.
    Kot, Maxim
    Pozhar, Nikolay
    Nabokov, Denis
    Kudinov, Mikhail
    Guglya, Anton
    Kiktenko, Evgeniy O.
    Kolycheva, Ekaterina
    Borisov, Alexander
    Fedorov, Aleksey K.
    EPJ QUANTUM TECHNOLOGY, 2021, 8 (01)
  • [39] Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
    Sergey E. Yunakovsky
    Maxim Kot
    Nikolay Pozhar
    Denis Nabokov
    Mikhail Kudinov
    Anton Guglya
    Evgeniy O. Kiktenko
    Ekaterina Kolycheva
    Alexander Borisov
    Aleksey K. Fedorov
    EPJ Quantum Technology, 2021, 8
  • [40] Structural Key Recovery of Simple Matrix Encryption Scheme Family
    Liu, Jinhui
    Yu, Yong
    Yang, Bo
    Jia, Jianwei
    Wang, Shijia
    Wang, Houzhen
    COMPUTER JOURNAL, 2018, 61 (12) : 1880 - 1896