A Projection of the Future Effects of Quantum Computation on Information Privacy

Summary Many of the current issues with Information Privacy have been the result of inadequate consideration for privacy during the planning, design and implementation of Information Systems and communication networks. The area of Quantum Computation is still in its infancy, and a truly functional quantum computer has not been implemented. However, it is anticipated that within the next decade it may be feasible. This presents a unique opportunity to give due consideration to Information Privacy in the realm of future quantum computational devices and environments while they are still in their infancy. This paper provides an overview of the key Information Privacy issues that we feel may arise with the evolution and realization of quantum computation. Additionally we propose an integrated approach of technical, legal and social elements to address these issues.

[1]  Lynette Kvasny,et al.  The Existential Significance of the Digital Divide for America's Historically Underserved Populations , 2008 .

[2]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[3]  Silvana Faja,et al.  PRIVACY IN E-COMMERCE: UNDERSTANDING USER TRADE-OFFS , 2005 .

[4]  Egon Schwelb Privacy and Human Rights. , 1974, American Journal of International Law.

[5]  Johnny Hartz Søraker The moral status of information and information technologies: a relational theory of moral status , 2007 .

[6]  Lan Anh Tran,et al.  Securing Web Services: Practical Usage of Standards and Specifications , 2008 .

[7]  Hamid R. Nemati,et al.  Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .

[8]  Robert M. Davison,et al.  Information Privacy in a Globally Networked Society: Implications for IS Research , 2003, Commun. Assoc. Inf. Syst..

[9]  P. Orondo An Alternative Model of Information Security Investment , 2009 .

[10]  Raj Sharman,et al.  Handbook of Research on Social and Organizational Liabilities in Information Security , 2008 .

[11]  S. Wehner Quantum Computation and Privacy , 2004 .

[12]  Elizabeth Chang,et al.  A conceptual framework for information privacy and security in collaborative environments , 2006 .

[13]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[14]  Robert Hauptman Encyclopedia of Information Ethics and Security , 2007, Encyclopedia of Information Ethics and Security.

[15]  E. Chang,et al.  PP-SDLC The privacy protecting systems development life cycle , 2005 .

[16]  Lov K. Grover Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.

[17]  Dawn N. Jutla,et al.  Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[18]  V. R. Christie,et al.  Metrics Based Security Assessment , 2004 .

[19]  Ian Goldberg,et al.  Privacy-Enhancing Technologies for the Internet, II: Five Years Later , 2002, Privacy Enhancing Technologies.

[20]  J. Michael,et al.  Privacy and human rights , 1994 .

[21]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[22]  Matthias Christandl,et al.  Quantum Anonymous Transmissions , 2004, ASIACRYPT.

[23]  Dimitris Gritzalis,et al.  Embedding privacy in IT applications development , 2004, Inf. Manag. Comput. Secur..