Advertisement

Cryptography in Quantum Computing

  • Pam Choy
  • Dustin CatesEmail author
  • Florent Chehwan
  • Cindy Rodriguez
  • Avery Leider
  • Charles C. Tappert
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1069)

Abstract

Quantum cryptography is an area of intense interest, as quantum computers contain the potential to break many classical encryption algorithms. With so much on the line, it is imperative to find a new quantum encryption method before quantum technology catches up with current cryptography. This study examines one of the very few experiments on encryption that has already been conducted and analyzes the results of the tests run on the IBM Cloud Server. It attempts to recreate the sample experiment and make comprehensive adjustments for a real-world environment. This study also looks at the possible application of quantum public key encryption and the theoretical importance of quantum key distribution.

Keywords

Quantum computers Quantum cryptography Quantum encryption Encryption algorithm Quantum public key encryption Quantum key distribution 

Notes

Acknowledgment

The authors would like to thank Prof Charles Tappert, PhD and Prof Avery Leider.

References

  1. 1.
    Quantum computing report: Where qubits entangle with commerce. https://quantumcomputingreport.com/players/universities/. Accessed 29 Nov 2018
  2. 2.
    Cartlidge, E.: Europe’s€ 1 billion quantum flagship announces grants (2018)CrossRefGoogle Scholar
  3. 3.
    Chen, S.: Quantum cryptography explained. https://youtu.be/UiJiXNEm-Go
  4. 4.
    Furuta, A.: One thing is certain: Heisenberg’s uncertainty principle is not dead. Scientific American (2012)Google Scholar
  5. 5.
    Grimes, R.: The quantum break is coming will you be ready? https://youtu.be/jB47_xoeB4o
  6. 6.
    Harrow, A.W., Hassidim, A., Lloyd, S.: Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 103(15), 150502 (2009)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Herrero-Collantes, M., Garcia-Escartin, J.C.: Quantum random number generators. Rev. Mod. Phys. 89(1), 015004 (2017)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Huang, H.-L., Zhao, Y.-W., Li, T., Li, F.-G., Du, Y.-T., Fu, X.-Q., Zhang, S., Wang, X., Bao, W.-S.: Homomorphic encryption experiments on IBM’s cloud quantum computing platform. Front. Phys. 12(1), 120305 (2017)CrossRefGoogle Scholar
  9. 9.
    Ismail, Y., Petruccione, F.: The race towards quantum security. In: 2018 IST-Africa Week Conference (IST-Africa), pp. Page–1. IEEE (2018)Google Scholar
  10. 10.
    Lai, H., Luo, M.-X., Pieprzyk, J., Zhang, J., Pan, L., Li, S., Orgun, M.A.: Fast and simple high-capacity quantum cryptography with error detection. Sci. Rep. 7, 46302 (2017)CrossRefGoogle Scholar
  11. 11.
    Lindsay, J.: Why quantum computing will not destabilize international security: The political logic of cryptology (2018)Google Scholar
  12. 12.
    Lo, H.-K., Lütkenhaus, N.: Quantum cryptography: from theory to practice, arXiv preprint quant-ph/0702202 (2007)Google Scholar
  13. 13.
    Moller, M., Vuik, C.: On the impact of quantum computing technology on future developments in high-performance scientific computing. Ethics Inf. Technol. 19(4), 253–269 (2017)CrossRefGoogle Scholar
  14. 14.
    Patel, D., Patro, S., Vanarasa, C., Chakrabarty, I., Pati, A.K.: Impossibility of cloning of quantum coherence, arXiv preprint arXiv:1806.05706 (2018)
  15. 15.
    Prisco, J.: The quantum computing race the US can’t afford to lose. https://thenextweb.com/contributors/2018/09/01/quantum-race-united-states-must-compete/. Accessed 4 Dec 2018
  16. 16.
    Segal, A., Nilekani, N., Dixon, H., Flournoy, M., Sulmeyer, M., Mayer-Schiinberger, V., Ramge, T.: When China rules the web. Foreign Aff. 97(5), 10–18 (2018)Google Scholar
  17. 17.
    Wang, Y., She, K.: A practical quantum public-key encryption model. In: 2017 3rd International Conference on Information Management (ICIM), pp. 367–372. IEEE (2017)Google Scholar
  18. 18.
    Woodford, C.: Quantum computing: A simple introduction (2012). https://www.explainthatstuff.com/quantum-computing.html
  19. 19.
    Li, X.-H., Li, C.-Y., Deng, F.-G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Quantum secure direct communication with quantum encryption based on pure entangled states. Chin. Phys. 16(8), 2149–2153 (2007)Google Scholar
  20. 20.
    Yuan, Y., Wang, F.-Y.: Blockchain: the state of the art and future trends. Acta Automatica Sin. 42(4), 481–494 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Pam Choy
    • 1
  • Dustin Cates
    • 1
    Email author
  • Florent Chehwan
    • 1
  • Cindy Rodriguez
    • 1
  • Avery Leider
    • 1
  • Charles C. Tappert
    • 1
  1. 1.Seidenberg School of Computer Science and Information SystemsPace UniversityPleasantvilleUSA

Personalised recommendations