Quantum cryptography is the science of exploiting    quantum mechanical properties to    perform cryptographic tasks. The best known    example of quantum cryptography is quantum key distribution which    offers an information-theoretically    secure solution to the key exchange problem. Currently used popular    public-key encryption and    signature schemes (e.g., RSA and ElGamal) can be broken    by quantum adversaries. The advantage of quantum cryptography    lies in the fact that it allows the completion of various    cryptographic tasks that are proven or conjectured to be    impossible using only classical (i.e. non-quantum)    communication (see below for examples). For example, it is    impossible to copy data encoded in a    quantum state and the very act of reading data encoded in a    quantum state changes the state. This is used    to detect eavesdropping in quantum key distribution.  
    Quantum cryptography uses Heisenberg's uncertainty principle[1] formulated in 1927, and the    No-cloning theorem[2] first    articulated by Wootters and    Zurek and Dieks in 1982.    Werner Heisenberg discovered one of the fundamental principles    of quantum mechanics: "At the instant at which the position of    the electron is known, its momentum therefore can be known only    up to magnitudes which correspond to that discontinuous change;    thus, the more precisely the position is determined, the less    precisely the momentum is known, and conversely[3] (Heisenberg, 1927: 1745). This    simply means that observation of quanta changes its behavior.    By measuring the velocity of quanta we would affect it, and    thereby change its position; if we want to find a quant's    position, we are forced to change its velocity. Therefore, we    cannot measure a quantum system's characteristics without    changing it[4] (Clark, n.d.) and we cannot record    all characteristics of a quantum system before those    characteristics are measured. The No-cloning theorem    demonstrates that it is impossible to create a copy of an    arbitrary unknown quantum state. This makes unobserved    eavesdropping impossible because it will be quickly detected,    thus greatly improving assurance that the communicated data    remains private.  
    Quantum cryptography was proposed first by Stephen    Wiesner, then at Columbia University in New York, who, in    the early 1970s, introduced the concept of quantum conjugate    coding. His seminal paper titled "Conjugate Coding" was    rejected by IEEE Information Theory    Society, but was eventually published in 1983 in SIGACT News (15:1    pp.7888, 1983). In this paper he showed how to store or    transmit two messages by encoding them in two "conjugate    observables", such as linear and circular polarization of    light, so that either, but not both, of which may be received    and decoded. He illustrated his idea with a design of    unforgeable bank notes. In 1984, building upon this work,    Charles H.    Bennett, of the IBM's Thomas J. Watson Research    Center, and Gilles Brassard, of the Universit de Montral, proposed a    method for secure communication based on    Wiesner's "conjugate observables", which is now called BB84.[5] In 1991    Artur Ekert    developed a different approach to quantum key distribution    based on peculiar quantum correlations known as quantum    entanglement.[6]  
    Random rotations of the polarization by both parties (usually    called Alice and Bob) have been proposed in Kak's    three-stage quantum cryptography protocol.[7] In    principle, this method can be used for continuous, unbreakable    encryption of data if single photons are used.[8] The basic polarization rotation    scheme has been implemented.[9]  
    The BB84 method is at the basis of quantum key distribution    methods. Companies that manufacture quantum cryptography    systems include MagiQ Technologies, Inc.    (Boston, Massachusetts,    United    States), ID Quantique (Geneva, Switzerland), QuintessenceLabs (Canberra, Australia) and    SeQureNet (Paris,    France).  
    The most well known and developed application of quantum    cryptography is quantum key distribution, which    is the process of using quantum communication to establish a    shared key between two parties (Alice and Bob, for example)    without a third party (Eve) learning anything about that key,    even if Eve can eavesdrop on all communication between Alice    and Bob. If Eve tries to learn information about the key being    established, key establishment will fail causing Alice and Bob    to notice. Once the key is established, it is then typically    used for encrypted communication using classical    techniques. For instance, the exchanged key could be used as    for symmetric cryptography.  
    The security of quantum key distribution can be proven    mathematically without imposing any restrictions on the    abilities of an eavesdropper, something not possible with    classical key distribution. This is usually described as    "unconditional security", although there are some minimal    assumptions required, including that the laws of quantum    mechanics apply and that Alice and Bob are able to authenticate    each other, i.e. Eve should not be able to impersonate Alice or    Bob as otherwise a man-in-the-middle attack    would be possible.  
    One aspect of quantum key distribution is that it is secure    against quantum computers. Its strength does not depend on    mathematical complexity, like post-quantum cryptography, but    on physical principles.  
    Unlike quantum key distribution, quantum coin flipping is a protocol    that is used between two participants who do not trust each    other.[10]    The participants communicate via a quantum channel and exchange    information through the transmission of qubits.[11]    Alice will determine a random basis and sequence of qubits and    then transmit them to Bob. Bob then detects and records the    qubits. Once Bob has recorded the qubits sent by Alice, he    makes a guess to Alice on what basis she chose. Alice reports    whether he won or lost to Bob and then sends Bob her entire    original qubit sequence. Since the two parties do not trust    each other, cheating is likely to occur at any step in the    process.     [12]  
    Quantum coin flipping is theoretically a secure means of    communicating through two distrustful parties, but it is    difficult to physically accomplish.     [10]  
    Following the discovery of quantum key distribution and its    unconditional security, researchers tried to achieve other    cryptographic tasks with unconditional security. One such task    was commitment. A commitment scheme allows    a party Alice to fix a certain value (to "commit") in such a    way that Alice cannot change that value while at the same time    ensuring that the recipient Bob cannot learn anything about    that value until Alice reveal it. Such commitment schemes are    commonly in cryptographic protocols. In the quantum setting,    they would be particularly useful: Crpeau and Kilian showed    that from a commitment and a quantum channel, one can construct    an unconditionally secure protocol for performing so-called    oblivious transfer.[13]Oblivious    transfer, on the other hand, had been shown by Kilian to    allow implementation of almost any distributed computation in a    secure way (so-called secure multi-party    computation).[14] (Notice that    here we are a bit imprecise: The results by Crpeau and    Kilian[13][14] together do not    directly imply that given a commitment and a quantum channel    one can perform secure multi-party computation. This is because    the results do not guarantee "composability", that is, when    plugging them together, one might lose security. Later works    showed, however, how composability can be ensured in this    setting.[citation    needed])  
    Unfortunately, early quantum commitment protocols[15] were shown    to be flawed. In fact, Mayers showed that (unconditionally    secure) quantum commitment is impossible: a computationally    unlimited attacker can break any quantum commitment    protocol.[16]  
    Yet, the result by Mayers does not preclude the possibility of    constructing quantum commitment protocols (and thus secure    multi-party computation protocols) under assumptions that they    are much weaker than the assumptions needed for commitment    protocols that do not use quantum communication. The bounded    quantum storage model described below is an example for a    setting in which quantum communication can be used to construct    commitment protocols. A breakthrough in November 2013 offers    "unconditional" security of information by harnessing quantum    theory and relativity, which has been successfully demonstrated    on a global scale for the first time.[17]  
    One possibility to construct unconditionally secure quantum    commitment and quantum oblivious    transfer (OT) protocols is to use the bounded quantum    storage model (BQSM). In this model, we assume that the amount    of quantum data that an adversary can store is limited by some    known constant Q. We do not, however, impose any limit on the    amount of classical (i.e., non-quantum) data the adversary may    store.  
    In the BQSM, one can construct commitment and oblivious    transfer protocols.[18] The underlying    idea is the following: The protocol parties exchange more than    Q quantum bits (qubits). Since even a dishonest party cannot    store all that information (the quantum memory of the adversary    is limited to Q qubits), a large part of the data will have to    be either measured or discarded. Forcing dishonest parties to    measure a large part of the data allows to circumvent the    impossibility result by Mayers;[16] commitment    and oblivious transfer protocols can now be implemented.  
    The protocols in the BQSM presented by Damgrd, Fehr, Salvail,    and Schaffner[18] do not assume    that honest protocol participants store any quantum    information; the technical requirements are similar to those in    QKD protocols. These protocols    can thus, at least in principle, be realized with today's    technology. The communication complexity is only a constant    factor larger than the bound Q on the adversary's quantum    memory.  
    The advantage of the BQSM is that the assumption that the    adversary's quantum memory is limited is quite realistic. With    today's technology, storing even a single qubit reliably over a    sufficiently long time is difficult. (What "sufficiently long"    means depends on the protocol details. By introducing an    artificial pause in the protocol, the amount of time over which    the adversary needs to store quantum data can be made    arbitrarily large.)  
    An extension of the BQSM is the noisy-storage model introduced by    Wehner, Schaffner and Terhal.[19] Instead of    considering an upper bound on the physical size of the    adversary's quantum memory, an adversary is allowed to use    imperfect quantum storage devices of arbitrary size. The level    of imperfection is modelled by noisy quantum channels. For high    enough noise levels, the same primitives as in the BQSM can be    achieved[20] and the BQSM forms    a special case of the noisy-storage model.  
    In the classical setting, similar results can be achieved when    assuming a bound on the amount of classical (non-quantum) data    that the adversary can store.[21] It was proven,    however, that in this model also the honest parties have to use    a large amount of memory (namely the square-root of the    adversary's memory bound).[22] This makes    these protocols impractical for realistic memory bounds. (Note    that with today's technology such as hard disks, an adversary    can cheaply store large amounts of classical data.)  
    The goal of position-based quantum cryptography is to use the    geographical location of a player as its (only)    credential. For example, one wants to send a message to a    player at a specified position with the guarantee that it can    only be read if the receiving party is located at that    particular position. In the basic task of    position-verification, a player, Alice, wants to    convince the (honest) verifiers that she is located at a    particular point. It has been shown by Chandran et al.    that position-verification using classical protocols is    impossible against colluding adversaries (who control all    positions except the prover's claimed position).[23] Under    various restrictions on the adversaries, schemes are possible.  
    Under the name of 'quantum tagging', the first position-based    quantum schemes have been investigated in 2002 by Kent. A    US-patent[24]    was granted in 2006, but the results only appeared in the    scientific literature in 2010.[25] After several other    quantum protocols for position verification have been suggested    in 2010,[26][27] Buhrman et al.    were able to show a general impossibility result:[28] using an    enormous amount of quantum entanglement (they use a    doubly exponential number of EPR pairs, in the number of    qubits the honest player operates on), colluding adversaries    are always able to make it look to the verifiers as if they    were at the claimed position. However, this result does not    exclude the possibility of practical schemes in the bounded- or    noisy-quantum-storage model (see above). Later Beigi and Knig    improved the amount of EPR pairs needed in the general attack    against position-verification protocols to exponential. They    also showed that a particular protocol remains secure against    adversaries who controls only a linear amount of EPR    pairs.[29]  
    A quantum cryptographic protocol is device-independent    if its security does not rely on trusting that the quantum    devices used are truthful. Thus the security analysis of such a    protocol needs to consider scenarios of imperfect or even    malicious devices. Mayers and Yao[30] proposed the idea of    designing quantum protocols using "self-testing" quantum    apparatus, the internal operations of which can be uniquely    determined by their input-output statistics. Subsequently,    Roger Colbeck in his Thesis[31] proposed the use    of Bell    tests for checking the honesty of the devices. Since then,    several problems have been shown to admit unconditional secure    and device-independent protocols, even when the actual devices    performing the Bell test are substantially "noisy," i.e., far    from being ideal. These problems include quantum key    distribution,[32][33]randomness    expansion,[33][34] and randomness    amplification.[35]  
    Quantum computers may become a    technological reality; it is therefore important to study    cryptographic schemes used against adversaries with access to a    quantum computer. The study of such schemes is often referred    to as post-quantum cryptography. The    need for post-quantum cryptography arises from the fact that    many popular encryption and signature schemes (such as RSA and    its variants, and schemes based on elliptic curves) can be    broken using Shor's algorithm for factoring and computing discrete logarithms on a quantum    computer. Examples for schemes that are, as of today's    knowledge, secure against quantum adversaries are McEliece and lattice-based schemes. Surveys    of post-quantum cryptography are available.[36][37]  
    There is also research into how existing cryptographic    techniques have to be modified to be able to cope with quantum    adversaries. For example, when trying to develop zero-knowledge proof systems that    are secure against quantum adversaries, new techniques need to    be used: In a classical setting, the analysis of a    zero-knowledge proof system usually involves "rewinding", a    technique that makes it necessary to copy the internal state of    the adversary. In a quantum setting, copying a state is not    always possible (no-cloning theorem); a variant of the    rewinding technique has to be used.[38]  
    Post quantum algorithms are also called "quantum resistant",    because  unlike QKD  it is not known or provable that there    will not be potential future quantum attacks against them. Even    though they are not vulnerable to Shor's algorithm the NSA are    announcing plans to transition to quantum resistant    algorithms.[39] The National    Institute of Security and Technology (NIST) believes that it is    time to think of quantum-safe primitives.[40]  
Continued here:
Quantum cryptography - Wikipedia
Read More..