Security in Quantum Computing
DOI:
https://doi.org/10.51381/adrs.v3i1.40Keywords:
qubit, encryption, superposition, entanglement, photon polarizationAbstract
Quantum key distribution will bring more confidentiality and privacy of communication in the future ICT world and will solve the eavesdropping issue. Domains regarded are e-government, e-commerce, e-health, transmission of biometric data, intelligent transport systems and more. So far, quantum researches focus on using properties of the qubit to bring improvements in technologies from our days. The purpose of this paper is to describe the quantum encryption methods. These methods can bring more efficiency of security in existing communications. In this matter, many encryption architectures have been proposed. As an example, the QKD architecture is presented in this paper.
References
Bloch, Felix. (1946). Nuclear Induction. Physical Review, 70(7–8), 460–474., https://doi.org/10.1103/PhysRev.70.460
Bruss, D., Erdélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum cryptography. ACM Computing Surveys, 39(2), 6. https://doi.org/10.1145/1242471.1242474
Takahashi, Dean. (2020). Intel and QuTech unveil Horse Ridge cryogenic control chip for quantum computing. Retrieved on 18.02.2020 from https://venturebeat.com/2020/02/18/intel-and-qutech-unveil-horse-ridge-cryogenic-control-chip-for-quantum-computing/
ETSI GS QKD 002. (2010). Quantum Key Distribution Use Cases. Retrieved on June 2010 from https://www.etsi.org/deliver/etsi_gs/qkd/001_099/002/01.01.01_60/gs_qkd002v010101p.pdf
ETSI World Class Standards.2008.Quantum Key Distribution Architecture.Retrieved on 2008 from https://www.etsi.org/technologies/quantum-key-distribution
ETSI Quantum Key Distribution. Retrieved from https://www.etsi.org/technologies/quantum-key-distribution
Information Technology and Information Foundation. (2019). TIF Technology Explainer: What Is Quantum Computing?. Retrieved on January 29, 2019 from https://www.technologyreview.com/s/612844/what-is-quantum-computing/
Giles, M. (2019). Explainer: What is a quantum computer? Retrieved December 22, 2020, from https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/
Haitjema, Mart. (2007). A Survey of the Prominent Quantum Key Distribution Protocols. Retrieved on 2007 from https:/www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/
Lu, Y., Bengtsson, A., Burnett, J. J., Wiegand, E., Suri, B., Krantz, P., … Delsing, P. (2019). Characterizing decoherence rates of a superconducting qubit by direct microwave scattering. Retrieved from http://arxiv.org/abs/1912.02124
Logan O. Mailloux, Dr. Michael R. Grimaila, Douglas D. Hodson, Colin V. McLaughlin and G.B. Baumgartner. 2016. Quantum Key Distribution: Boon or Bust? Published in Journal of Cyber Security and Information Systems, Volume: 4 Number: 2 - Basic Complexity
Shukla, M., & Patel, S. (2018). Prominent Security of the Quantum Key Distribution Protocol. International Journal of Science and Research, 8. https://doi.org/10.21275/ART20199396
Quantum-Safe Security Working Group.(2018). What is Quantum Key Distribution?. Retrieved on 2018 from https://www.etsi.org/images/files/ETSITechnologyLeaflets/QuantumKeyDistribution.pdf
Shor, P. W., & Preskill, J. (2000). Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85(2), 441–444. https://doi.org/10.1103/PhysRevLett.85.441
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., … Wallden, P. (2019). Advances in Quantum Cryptography. https://doi.org/10.1364/AOP.361502
RIKEN Center for Emergent Matter Science. (2020). Scientists measure electron spin qubit without demolishing it. Retrieved on 2.03.2020 from https://phys.org/news/2020-03-scientists-electron-qubit-demolishing.html
Dai, H., and Xu, H. (2010). Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE SENSORS JOURNAL, 10(8), 1399. https://doi.org/10.1109/JSEN.2009.2039130