Post-Quantum Security: Opportunities and Challenges

被引:6
作者
Li, Silong [1 ]
Chen, Yuxiang [1 ]
Chen, Lin [1 ]
Liao, Jing [1 ]
Kuang, Chanchan [1 ]
Li, Kuanching [1 ]
Liang, Wei [1 ]
Xiong, Naixue [1 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
关键词
cryptography; post-quantum encryption; quantum computing; CRYSTALS-KYBER; quantum security; SCHEME; ALGORITHMS; SIGNATURES; INTERNET; SYSTEM;
D O I
10.3390/s23218744
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
引用
收藏
页数:26
相关论文
共 105 条
  • [91] Wang LJ, 2021, NPJ QUANTUM INFORM, V7, DOI [10.10381/s41534-021-00400-7, 10.1038/s41534-021-00400-7]
  • [92] Computation offloading optimization for UAV-assisted mobile edge computing: a deep deterministic policy gradient approach
    Wang, Yunpeng
    Fang, Weiwei
    Ding, Yi
    Xiong, Naixue
    [J]. WIRELESS NETWORKS, 2021, 27 (04) : 2991 - 3006
  • [93] Wikipedia, 2014, Timeline of Quantum Computing-Wikipedia, the Free Encyclopedia
  • [94] CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation
    Xiao, Lijun
    Han, Dezhi
    Li, Dun
    Liang, Wei
    Yang, Ce
    Li, Kuan-Ching
    Castiglione, Arcangelo
    [J]. SOFT COMPUTING, 2023, 27 (16) : 11647 - 11660
  • [95] Xing Y., 2021, IACR T CRYPTOGRAPH H, P328, DOI DOI 10.46586/TCHES.V2021.I2.328-356
  • [96] Green cloud computing schemes based on networks: a survey
    Xiong, N.
    Han, W.
    Vandenberg, A.
    [J]. IET COMMUNICATIONS, 2012, 6 (18) : 3294 - 3300
  • [97] Secure quantum key distribution with realistic devices
    Xu, Feihu
    Ma, Xiongfeng
    Zhang, Qiang
    Lo, Hoi-Kwong
    Pan, Jian-Wei
    [J]. REVIEWS OF MODERN PHYSICS, 2020, 92 (02)
  • [98] Experimental quantum secure network with digital signatures and encryption
    Yin, Hua-Lei
    Fu, Yao
    Li, Chen-Long
    Weng, Chen-Xun
    Li, Bing-Hong
    Gu, Jie
    Lu, Yu-Shuo
    Huang, Shan
    Chen, Zeng-Bing
    [J]. NATIONAL SCIENCE REVIEW, 2023, 10 (04)
  • [99] The Entropy-Based Hop Scheme for Influence Maximization in Dynamic Social Networks
    Yu, Jianyong
    Liu, Zekun
    Liang, Wei
    Han, Xue
    Xiong, Neal N.
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13
  • [100] An efficient intelligent control algorithm for drying rack system
    Zhang, Shiwen
    Hu, Wang
    Liang, Wei
    Lei, Changjian
    Xiong, Neal N.
    [J]. IET COMMUNICATIONS, 2023, 17 (14) : 1691 - 1705