Post-quantum key exchange protocols

If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.

[1]  Louis H. Kauffman,et al.  Braiding operators are universal quantum gates , 2004, quant-ph/0401090.

[2]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[3]  Brian Hayes,et al.  Randomness as a Resource , 2001, American Scientist.

[4]  Giuliano Scarcelli,et al.  Distant Clock Synchronization Using Entangled Photon Pairs , 2004 .

[5]  Julia Kempe,et al.  Quantum random walks: An introductory overview , 2003, quant-ph/0303081.

[6]  Keisuke Tanaka,et al.  Quantum Public-Key Cryptosystems , 2000, CRYPTO.

[7]  Dorian Goldfeld,et al.  Zeta functions, one-way functions, and pseudorandom number generators , 1997 .

[8]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[9]  W. J. Klepczynski,et al.  GPS: primary tool for time transfer , 1999, Proc. IEEE.

[10]  G. Collins Computing with quantum knots. , 2006, Scientific American.

[11]  Gilles Brassard,et al.  Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..

[12]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[13]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[14]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[15]  Andrew Chi-Chih Yao,et al.  Quantum Circuit Complexity , 1993, FOCS.

[16]  Gadiel Seroussi,et al.  Efficient Quantum Algorithms for Estimating Gauss Sums , 2002, quant-ph/0207131.

[17]  Thomas Beth,et al.  Synchronizing quantum clocks with classical one-way communication: Bounds on the generated entropy , 2003 .

[18]  Andris Ambainis,et al.  Quantum walks on graphs , 2000, STOC '01.

[19]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[20]  Chuang Quantum algorithm for distributed clock synchronization , 2000, Physical review letters.

[21]  Hoi-Kwong Lo,et al.  Security of Quantum Key Distribution , 1998 .

[22]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[23]  Richard J. Hughes,et al.  FREE-SPACE QUANTUM-KEY DISTRIBUTION , 1998, quant-ph/9801006.

[24]  H. Weinfurter,et al.  Experimental quantum teleportation , 1997, Nature.

[25]  Chil-Min Kim,et al.  Quantum key distribution with blind polarization bases. , 2005, Physical review letters.

[26]  Mark Hillery,et al.  Scattering theory and discrete-time quantum walks , 2003, quant-ph/0312062.

[27]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[28]  N. Gisin,et al.  Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .

[29]  S. Bartlett,et al.  Quantum methods for clock synchronization: Beating the standard quantum limit without entanglement , 2005, quant-ph/0505112.

[30]  Michael O. Rabin,et al.  Hyper-Encryption and Everlasting Security , 2002, STACS.

[31]  Nancy A. Lynch,et al.  An Overview of Clock Synchronization , 1986, Fault-Tolerant Distributed Computing.

[32]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[33]  Louis H. Kauffman Teleportation topology , 2005 .

[34]  Yakir Aharonov,et al.  Can we make sense out of the measurement process in relativistic quantum mechanics , 1981 .