Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

Cryptography in a Quantum World

verfasst von : Gilles Brassard

Erschienen in: SOFSEM 2016: Theory and Practice of Computer Science

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although practised as an art and science for ages, cryptography had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon’s approach was rooted is his own information theory, itself inspired by the classical physics of Newton and Einstein. But our world is ruled by the laws of quantum mechanics. When quantum-mechanical phenomena are taken into account, new vistas open up both for codemakers and codebreakers. Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out!

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kahn, D.: The Codebreakers: the Comprehensive History of Secret Communication from Ancient Times to the Internet, 2nd revised edn. Scribner, New York (1996) Kahn, D.: The Codebreakers: the Comprehensive History of Secret Communication from Ancient Times to the Internet, 2nd revised edn. Scribner, New York (1996)
2.
Zurück zum Zitat Singh, S.: The Code Book: the Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books, New York (2000) Singh, S.: The Code Book: the Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books, New York (2000)
4.
5.
Zurück zum Zitat Rejewski, M.: How Polish mathematicians broke the Enigma cipher. Ann. Hist. Comput. 3(3), 213–234 (1981)CrossRef Rejewski, M.: How Polish mathematicians broke the Enigma cipher. Ann. Hist. Comput. 3(3), 213–234 (1981)CrossRef
6.
Zurück zum Zitat Tyldum, M., Moore, G.: The imitation game (2014) Tyldum, M., Moore, G.: The imitation game (2014)
10.
Zurück zum Zitat Poe, E.A.: A few words on secret writing. Graham’s Lady’s Gentleman’s Mag. XIX(1), 33–38 (1841) Poe, E.A.: A few words on secret writing. Graham’s Lady’s Gentleman’s Mag. XIX(1), 33–38 (1841)
11.
Zurück zum Zitat Poe, E.A.: The Gold-Bug. Philadelphia Dollar Newspaper, Philadelphia (1843) Poe, E.A.: The Gold-Bug. Philadelphia Dollar Newspaper, Philadelphia (1843)
12.
Zurück zum Zitat Rosenheim, S.J.: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Johns Hopkins University Press, Baltimore (1997) Rosenheim, S.J.: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet. Johns Hopkins University Press, Baltimore (1997)
16.
Zurück zum Zitat Vernam, G.: Secret signaling system, U.S. Patent 1,310,719 (1919) Vernam, G.: Secret signaling system, U.S. Patent 1,310,719 (1919)
17.
Zurück zum Zitat Bellovin, S.M.: Frank Miller: inventor of the one-time pad. Cryptologia 35(3), 203–222 (2011)MATHCrossRef Bellovin, S.M.: Frank Miller: inventor of the one-time pad. Cryptologia 35(3), 203–222 (2011)MATHCrossRef
19.
Zurück zum Zitat James, D.: Ché Guevara: a Biography. Rowman & Littlefield, Lanham (1970) James, D.: Ché Guevara: a Biography. Rowman & Littlefield, Lanham (1970)
21.
Zurück zum Zitat Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)CrossRef Merkle, R.C.: Secure communications over insecure channels. Commun. ACM 21(4), 294–299 (1978)CrossRef
23.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MATHMathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MATHMathSciNetCrossRef
25.
Zurück zum Zitat McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978) McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978)
27.
Zurück zum Zitat Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986) Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
29.
Zurück zum Zitat Feynman, R.P.: Quantum mechanical computers. Opt. News 11(2), 11–20 (1985)CrossRef Feynman, R.P.: Quantum mechanical computers. Opt. News 11(2), 11–20 (1985)CrossRef
30.
Zurück zum Zitat Deutsch, D.: Quantum theory, the Church-Turing principle and the universal quantum computer. Proc. R. Soc. London A 400, 97–117 (1985)MATHMathSciNetCrossRef Deutsch, D.: Quantum theory, the Church-Turing principle and the universal quantum computer. Proc. R. Soc. London A 400, 97–117 (1985)MATHMathSciNetCrossRef
31.
Zurück zum Zitat Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MATHMathSciNetCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MATHMathSciNetCrossRef
32.
Zurück zum Zitat Kitaev, A.Y.: Quantum measurements and the Abelian stabilizer problem. arXiv preprint quant-ph/9511026 (1995) Kitaev, A.Y.: Quantum measurements and the Abelian stabilizer problem. arXiv preprint quant-ph/9511026 (1995)
33.
Zurück zum Zitat Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer Science & Business Media, Berlin (2009)MATH Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer Science & Business Media, Berlin (2009)MATH
35.
Zurück zum Zitat Micciancio, D., Regev, O.: Lattice-based cryptography, pp. 147–191. In: [33] (2009) Micciancio, D., Regev, O.: Lattice-based cryptography, pp. 147–191. In: [33] (2009)
40.
Zurück zum Zitat Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328 (1997)CrossRef Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328 (1997)CrossRef
41.
Zurück zum Zitat Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.: Strengths and weaknesses of quantum computing. SIAM J. Comput. 26(5), 1510–1523 (1997)MATHMathSciNetCrossRef Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.: Strengths and weaknesses of quantum computing. SIAM J. Comput. 26(5), 1510–1523 (1997)MATHMathSciNetCrossRef
42.
Zurück zum Zitat Brassard, G., Salvail, L.: Quantum Merkle puzzles. In: Second International Conference on Quantum, Nano and Micro Technologies, pp. 76–79 (2008) Brassard, G., Salvail, L.: Quantum Merkle puzzles. In: Second International Conference on Quantum, Nano and Micro Technologies, pp. 76–79 (2008)
43.
Zurück zum Zitat Brassard, G., Høyer, P., Kalach, K., Kaplan, M., Laplante, S., Salvail, L.: Merkle puzzles in a quantum world. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 391–410. Springer, Heidelberg (2011)CrossRef Brassard, G., Høyer, P., Kalach, K., Kaplan, M., Laplante, S., Salvail, L.: Merkle puzzles in a quantum world. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 391–410. Springer, Heidelberg (2011)CrossRef
44.
Zurück zum Zitat Boyer, M., Brassard, G., Høyer, P., Tapp, A.: Tight bounds on quantum searching. Fortschr. Phys. 46(4&5), 493–505 (1998)CrossRef Boyer, M., Brassard, G., Høyer, P., Tapp, A.: Tight bounds on quantum searching. Fortschr. Phys. 46(4&5), 493–505 (1998)CrossRef
45.
Zurück zum Zitat Wootters, W.K., Żurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)CrossRef Wootters, W.K., Żurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)CrossRef
46.
Zurück zum Zitat Wiesner, S.: Conjugate coding. ACM Sigact News 15(1), 78–88 (1983). Original manuscript written in 1968CrossRef Wiesner, S.: Conjugate coding. ACM Sigact News 15(1), 78–88 (1983). Original manuscript written in 1968CrossRef
47.
Zurück zum Zitat Bennett, C.H., Brassard, G., Breidbart, S.: Quantum cryptography II: how to re-use a one-time pad safely even if P=NP. Nat. Comput. 13(4), 453–458 (2014). Original manuscript written in 1982MathSciNetCrossRef Bennett, C.H., Brassard, G., Breidbart, S.: Quantum cryptography II: how to re-use a one-time pad safely even if P=NP. Nat. Comput. 13(4), 453–458 (2014). Original manuscript written in 1982MathSciNetCrossRef
48.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography and its application to provably secure key expansion, public-key distribution, and coin-tossing. In: Proceedings of IEEE International Symposium on Information Theory, p. 91, September 1983 Bennett, C.H., Brassard, G.: Quantum cryptography and its application to provably secure key expansion, public-key distribution, and coin-tossing. In: Proceedings of IEEE International Symposium on Information Theory, p. 91, September 1983
49.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of International Conference on Computers, Systems and Signal Processing, pp. 175–179, December 1984 Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of International Conference on Computers, Systems and Signal Processing, pp. 175–179, December 1984
50.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(Part 1), 7–11 (2014)MATHMathSciNetCrossRef Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(Part 1), 7–11 (2014)MATHMathSciNetCrossRef
51.
Zurück zum Zitat Brassard, G.: Brief history of quantum cryptography: a personal perspective. In: Proceedings of IEEE Information Theory Workshop on Theory and Practice in Information Theoretic Security, pp. 19–23, October 2005. arxiv.org/abs/quant-ph/0604072 Brassard, G.: Brief history of quantum cryptography: a personal perspective. In: Proceedings of IEEE Information Theory Workshop on Theory and Practice in Information Theoretic Security, pp. 19–23, October 2005. arxiv.​org/​abs/​quant-ph/​0604072
52.
Zurück zum Zitat Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptology 5(1), 3–28 (1992)MATHCrossRef Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptology 5(1), 3–28 (1992)MATHCrossRef
53.
Zurück zum Zitat Mayers, D.: On the security of the quantum oblivious transfer and key distribution protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 124–135. Springer, Heidelberg (1995) Mayers, D.: On the security of the quantum oblivious transfer and key distribution protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 124–135. Springer, Heidelberg (1995)
54.
Zurück zum Zitat Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407–425. Springer, Heidelberg (2005)CrossRef Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407–425. Springer, Heidelberg (2005)CrossRef
55.
Zurück zum Zitat König, R., Renner, R., Bariska, A., Maurer, U.: Small accessible quantum information does not imply security. Phys. Rev. Lett. 98(14), 140502 (2007)CrossRef König, R., Renner, R., Bariska, A., Maurer, U.: Small accessible quantum information does not imply security. Phys. Rev. Lett. 98(14), 140502 (2007)CrossRef
56.
Zurück zum Zitat Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)CrossRef Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)CrossRef
57.
Zurück zum Zitat Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50–57 (1992)CrossRef Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50–57 (1992)CrossRef
60.
Zurück zum Zitat Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011)CrossRef Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011)CrossRef
61.
Zurück zum Zitat Unruh, D.: Everlasting multi-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 380–397. Springer, Heidelberg (2013)CrossRef Unruh, D.: Everlasting multi-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 380–397. Springer, Heidelberg (2013)CrossRef
63.
Zurück zum Zitat Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68(5), 557–559 (1992)MATHMathSciNetCrossRef Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68(5), 557–559 (1992)MATHMathSciNetCrossRef
64.
Zurück zum Zitat Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1(3), 195–200 (1964) Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1(3), 195–200 (1964)
65.
Zurück zum Zitat Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47(10), 777–780 (1935)MATHCrossRef Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47(10), 777–780 (1935)MATHCrossRef
66.
Zurück zum Zitat Ekert, A., Renner, R.: The ultimate physical limits of privacy. Nature 507(7493), 443–447 (2014)CrossRef Ekert, A., Renner, R.: The ultimate physical limits of privacy. Nature 507(7493), 443–447 (2014)CrossRef
67.
Zurück zum Zitat Hensen, B., Bernien, H., Dréau, A.E., Reiserer, A., Kalb, N., Blok, M.S., Ruitenberg, J., Vermeulen, R.F.L., Schouten, R.N., Abellán, C., Amaya, W., Pruneri, V., Mitchell, M.W., Markham, M., Twitchen, D.J., Elkouss, D., Wehner, S., Taminiau, T.H., Hanson, R.: Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526(7575), 682–686 (2015)CrossRef Hensen, B., Bernien, H., Dréau, A.E., Reiserer, A., Kalb, N., Blok, M.S., Ruitenberg, J., Vermeulen, R.F.L., Schouten, R.N., Abellán, C., Amaya, W., Pruneri, V., Mitchell, M.W., Markham, M., Twitchen, D.J., Elkouss, D., Wehner, S., Taminiau, T.H., Hanson, R.: Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526(7575), 682–686 (2015)CrossRef
Metadaten
Titel
Cryptography in a Quantum World
verfasst von
Gilles Brassard
Copyright-Jahr
2016
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-49192-8_1