Will quantum computers be the end of public key encryption?

被引:0
作者
机构
[1] School of Computing, Napier University, Edinburgh
[2] Department of Computer Science, University of Surrey, Guildford
来源
Woodward, Alan (alan.woodward@surrey.ac.uk) | 1600年 / Taylor and Francis Ltd.卷 / 01期
关键词
hidden subset problem; Post-quantum cryptography; Shor’s algorithm;
D O I
10.1080/23742917.2016.1226650
中图分类号
学科分类号
摘要
The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete logarithm problem run at best in superpolynomial time on conventional computers, new, less well understood algorithms run in polynomial time on certain quantum computer architectures. Many appear to be heralding this next step in computing as ‘the end of public key encryption’. We argue that this is not the case and that there are many fields of mathematics that can be used for creating ‘quantum resistant’ cryptographic schemes. We present a high-level review of the threat posed by quantum computers, using RSA and Shor’s algorithm as an example but we explain why we feel that the range of quantum algorithms that pose a threat to public key encryption schemes is likely to be limited in future. We discuss some of the other schemes that we believe could form the basis for public key encryption schemes, some of which could enter widespread use in the very near future, and indicate why some are more likely to be adopted. © 2016, © 2016 The Author(s). Published by Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:1 / 22
页数:21
相关论文
共 50 条
  • [41] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [42] Leveraging the power of quantum computing for breaking RSA encryption
    Sharma M.
    Choudhary V.
    Bhatia R.S.
    Malik S.
    Raina A.
    Khandelwal H.
    [J]. Cyber-Physical Systems, 2021, 7 (02) : 73 - 92
  • [43] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [44] QCB: Efficient Quantum-Secure Authenticated Encryption
    Bhaumik, Ritam
    Bonnetain, Xavier
    Chailloux, Andre
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    Seurin, Yannick
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 668 - 698
  • [45] Muckle plus : End-to-End Hybrid Authenticated Key Exchanges
    Bruckner, Sonja
    Ramacher, Sebastian
    Striecks, Christoph
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 601 - 633
  • [46] Breaking the HFEM public key scheme
    [J]. Gu, C.-S., 1600, Editorial Board of Journal on Communications (34): : 85 - 89+98
  • [47] Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks?
    Schoeffel, Maximilian
    Lauer, Frederik
    Rheinlaender, Carl C.
    Wehn, Norbert
    [J]. SENSORS, 2022, 22 (07)
  • [48] The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers
    Aono, Yoshinori
    Liu, Sitong
    Tanaka, Tomoki
    Uno, Shumpei
    van Meter, Rodney
    Shinohara, Naoyuki
    Nojima, Ryo
    [J]. IEEE TRANSACTIONS ON QUANTUM ENGINEERING, 2022, 3
  • [49] Designing quantum-secure attribute-based encryption
    Rao, Y. Sreenivasa
    Srivastava, Vikas
    Mohanty, Tapaswini
    Debnath, Sumit Kumar
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13075 - 13091
  • [50] Maintaining Secure Level on Symmetric Encryption under Quantum Attack
    Shiu, Hung
    Yang, Chao-Tung
    Tsai, Yun-Ru
    Lin, Wei-Chung
    Lai, Chun-Ming
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (11):