Quantum cryptography: State-of-art, challenges and future perspectives

With quantum computing, we are witnessing an exciting and very promising merging of three of the deepest and most successful scientific and technological developments of modern era: quantum physics, computer science, and nanotechnology. Quantum computers have the potential to perform certain calculations billions of times faster than any silicon-based computer. A functional quantum computer will be invaluable in factoring large numbers, and therefore extremely useful for decoding and encoding secret information. In this paper we have discussed contemporary cryptographic systems and their strengths and drawbacks. Two of the most common quantum key distribution protocols have been explained. This is followed by a note on the experimental realizations of quantum key distribution and the associated technological challenges. A few novel extensions of this concept in the future have also been dealt with. This paper aims at familiarizing the reader with the field of quantum cryptography and gives an insight about the latest developments.

[1]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[2]  Andrea Fiore,et al.  Nanostructured current-confined single quantum dot light-emitting diode at 1300 nm. , 2006, Nano letters.

[3]  Debbie W. Leung,et al.  Quantum data hiding , 2002, IEEE Trans. Inf. Theory.

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Yoshihisa Yamamoto,et al.  Single photons for quantum information systems , 2005 .

[6]  A. Galindo,et al.  Information and computation: Classical and quantum aspects , 2001, quant-ph/0112105.

[7]  A. Winter,et al.  Randomizing Quantum States: Constructions and Applications , 2003, quant-ph/0307104.

[8]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[9]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[10]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[11]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[12]  Daniel Gottesman Uncloneable encryption , 2003, Quantum Inf. Comput..

[13]  G. Ribordy Practical quantum key distribution systems based on faint laser pulses , 2006, 2006 Digest of the LEOS Summer Topical Meetings.

[14]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.

[15]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[16]  Simon J. Devitt,et al.  Robustness of Shor's algorithm , 2006, Quantum Inf. Comput..

[17]  Samuel J. Lomonaco,et al.  A Quick Glance at Quantum Cryptography , 1998, Cryptologia.

[18]  G. R. Blakley One time Pads are Key Safegaurding Schemes, not Cryptosystems. Fast Key Safeguarding Schemes (Threshold Schemes) Exist. , 1980, 1980 IEEE Symposium on Security and Privacy.

[19]  Rupert Ursin,et al.  Entangled state quantum key distribution and teleportation , 2006 .

[20]  D. R. Kuhn A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography , 2003, quant-ph/0301150.