A quantum jump in security

被引:0
作者
Lo, HK [1 ]
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
来源
APPLICATIONS OF PHOTONIC TECHNOLOGY 6: CLOSING THE GAP BETWEEN THEORY, DEVELOPMENT, AND APPLICATION | 2003年 / 5260卷
关键词
quantum computing; quantum information; quantum cryptography; security; key distribution; cryptography;
D O I
10.1117/12.543335
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum mechanics can revolutionize the art of code-making by breaking standard encryption schemes and by making unbreakable codes. In this document, I survey the motivation, power and limitation of quantum code-making.*
引用
收藏
页码:127 / 135
页数:9
相关论文
共 31 条
  • [1] [Anonymous], 2009, Quantum computation and quantum information, DOI DOI 10.1119/1.1463744
  • [2] Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
  • [3] BENOR M, INTR WORKSH QUANT CO
  • [4] Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
  • [5] Brassard G., 1993, Proceedings. 34th Annual Symposium on Foundations of Computer Science (Cat. No.93CH3368-8), P362, DOI 10.1109/SFCS.1993.366851
  • [6] Brassard G., 1996, SIGACT News, V27, P13, DOI 10.1145/235666.235669
  • [7] COMMUNICATION BY ELECTRON-PARAMAGNETIC-RES DEVICES
    DIEKS, D
    [J]. PHYSICS LETTERS A, 1982, 92 (06) : 271 - 272
  • [8] Can quantum-mechanical description of physical reality be considered complete?
    Einstein, A
    Podolsky, B
    Rosen, N
    [J]. PHYSICAL REVIEW, 1935, 47 (10): : 0777 - 0780
  • [9] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [10] GISIN N, QUANTUM CRYPTOGRAPHY