Transitioning organizations to post-quantum cryptography

D Joseph, R Misoczki, M Manzano, J Tricot… - Nature, 2022 - nature.com
Quantum computers are expected to break modern public key cryptography owing to Shor's
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …

Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Universal blind quantum computation

A Broadbent, J Fitzsimons… - 2009 50th annual IEEE …, 2009 - ieeexplore.ieee.org
We present a protocol which allows a client to have a server carry out a quantum
computation for her such that the client's inputs, outputs and computation remain perfectly …

Quantum cryptography beyond quantum key distribution

A Broadbent, C Schaffner - Designs, Codes and Cryptography, 2016 - Springer
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …

[图书][B] Quantum computing: A gentle introduction

EG Rieffel, WH Polak - 2011 - books.google.com
A thorough exposition of quantum computing and the underlying concepts of quantum
physics, with explanations of the relevant mathematics and numerous examples. The …

Nonbinary stabilizer codes over finite fields

A Ketkar, A Klappenecker, S Kumar… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
One formidable difficulty in quantum communication and computation is to protect
information-carrying quantum states against undesired interactions with the environment. To …

Quantum digital signatures

D Gottesman, I Chuang - arXiv preprint quant-ph/0105032, 2001 - arxiv.org
We present a quantum digital signature scheme whose security is based on fundamental
principles of quantum physics. It allows a sender (Alice) to sign a message in such a way …

Verification of quantum computation: An overview of existing approaches

A Gheorghiu, T Kapourniotis, E Kashefi - Theory of computing systems, 2019 - Springer
Quantum computers promise to efficiently solve not only problems believed to be intractable
for classical computers, but also problems for which verifying the solution is also considered …

Unconditionally verifiable blind quantum computation

JF Fitzsimons, E Kashefi - Physical Review A, 2017 - APS
Blind quantum computing (BQC) allows a client to have a server carry out a quantum
computation for them such that the client's input, output, and computation remain private. A …