Abstract
Quantum systems will significantly affect the field of cyber security research.
- 2013. Stored Encrypted Emails; https://www.technewsworld.com/story/79117.htmlGoogle Scholar
- 2017. Quantum Internet Alliance; http://quantum-internet.team/Google Scholar
- 2018. Google aims for quantum supremacy; https://physicsworld.com/a/google-aims-for-quantum-supremacy/Google Scholar
- Aaronson, S., Cojocaru, A., Gheorghiu, A. and Kashefi, E. On the implausibility of classical client blind quantum computing, 2017; arXiv:1704.08482.Google Scholar
- Belovs, A. et al. Provably secure key establishment against quantum adversaries. In Proceedings of the 12<sup>th</sup> Conf. Theory of Quantum Computation, Communication and Cryptography. M.M. Wilde, ed. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, 3:1--3:17.Google Scholar
- Bennett, C.H. and Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 560, P1 (2014), 7--11. Google ScholarDigital Library
- Bernstein, D.J. Introduction to post-quantum cryptography. Postquantum Cryptography. Springer, 2009, 1--14.Google Scholar
- Boneh, D. et al. Random oracles in a quantum world. Advances in Cryptology---ASIACRYPT 2011. D.H Lee and X. Wang, eds. Springer. Google ScholarDigital Library
- Boneh, D. and Zhandry, M. Secure signatures and chosen ciphertext security in a quantum computing world. Advances in Cryptology--CRYPTO 2013. Springer, 361--379.Google Scholar
- Brassard, G., Lütkenhaus, N., Mor, T. and Sanders, B.C. Limitations on practical quantum cryptography. Physical Review Letters 85, 6 (2000),Google ScholarCross Ref
- Braunstein, S.L. and Pirandola, S. Side-channel-free quantum key distribution. Physical Review Letters 108, 13 (2012), 130502.Google ScholarCross Ref
- Broadbent, A., Fitzsimons, J. and Kashefi, E. Universal blind quantum computation. In Proceedings of the 50<sup>th</sup> Annual Symp. Foundations of Computer Science. IEEE CS, 2009, 517--526. Google ScholarDigital Library
- Broadbent, A. and Schaffner, C. Quantum cryptography beyond quantum key distribution. Designs, Codes and Cryptography 78, 1 (2016), 351--382. Google ScholarDigital Library
- Buhrman, H. et al. Position-based quantum cryptography: Impossibility and constructions. SIAM J. Comput. 43, 1 (2014), 150--178.Google ScholarCross Ref
- Cojocaru, A., Colisson, L., Kashefi, E. and Wallden, P. On the possibility of classical client blind quantum computing, 2018; arXiv:1802.08759.Google Scholar
- Dowling, J.P. and Milburn, G.J. Quantum technology: The second quantum revolution. Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 361, 1809 (2003), 1655--1674.Google ScholarCross Ref
- Ekert, A. and Renner, R. The ultimate physical limits of privacy. Nature 507, 7493 (2014), 443.Google Scholar
- Faugere, J.C. et al. Fast Quantum Algorithm for Solving Multivariate Quadratic Equations, 2017; arXiv:1712.07211.Google Scholar
- Fitzsimons, J.F. Private quantum computation: An introduction to blind quantum computing and related protocols. NPJ Quantum Information 3, 1 (2017), 23.Google ScholarCross Ref
- Fitzsimons, J.F. and Kashefi, E. Unconditionally verifiable blind quantum computation. Physical Review A 96 (2017), 012303.Google ScholarCross Ref
- Gagliardoni, T., Hülsing, A. and Schaffner, C. Semantic security and indistinguishability in the quantum world. Advances in Cryptology---CRYPTO 2016. M. Robshaw and J. Katz, eds. Springer, 60--89. Google ScholarDigital Library
- Gheorghiu, A., Kapourniotis, T. and Kashefi, E. Verification of quantum computation: An overview of existing approaches. Theory of Computing Systems (Jul 6, 2018).Google Scholar
- Gheorghiu, A., Kashefi, E. and Wallden, P. Robustness and device independence of verifiable blind quantum computing. New J. Physics 17, 8 (2015), 083040.Google ScholarCross Ref
- Hanneke, D., Fogwell, S. and Gabrielse, G. New measurement of the electron magnetic moment and the fine structure constant. Physical Review Letters 100, 12 (2008), 120801.Google ScholarCross Ref
- Kaplan, M., Leurent, G., Leverrier, A. and Naya-Plasencia, M. Breaking symmetric cryptosystems using quantum period finding. Advances in Cryptology---CRYPTO 2016. M. Robshaw and J. Katz, eds. Springer, 207--237. Google ScholarDigital Library
- Kashefi, E., Music, L. and Wallden, P. The Quantum Cut-and-Choose Technique and Quantum Two-Party Computation, 2017; arXiv:1703.03754 (2017).Google Scholar
- Liao, S.K. et al. Satellite-relayed intercontinental quantum network. Physical Review Letters 120, 3 (2018), 030501.Google ScholarCross Ref
- Lindell. Y. How to simulate it---A tutorial on the simulation proof technique. Tutorials on the Foundations of Cryptography. Springer, 2017, 277--346.Google Scholar
- Lo, H.K., Curty, M. and Qi, B. Measurement-device-independent quantum key distribution. Physical Review Letters 108, 13 (2012), 130503.Google ScholarCross Ref
- Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics 4, 10 (2010), 686.Google ScholarCross Ref
- Mahadev, U. Classical homomorphic encryption for quantum circuits. In Proceedings of the IEEE 59<sup>th</sup> Annual Symposium on Foundations of Computer Science (Paris, France, 2018), 332--338.Google ScholarCross Ref
- Mahadev, U. Classical verification of quantum computations. In Proceedings of the IEEE 59<sup>th</sup> Annual Symposium on Foundations of Computer Science (Paris, France, 2018), 259--267.Google ScholarCross Ref
- Bohr, N. On the constitution of atoms and molecules. The London, Edinburgh, and Dublin Philosophical Magazine and J. Science 26, 151 (1913), 1--25.Google Scholar
- Reichardt, B.W., Unger, F. and Vazirani, U. Classical command of quantum systems. Nature 496, 7446 (2013), 456.Google Scholar
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review 41, 2 (1999), 303--332. Google ScholarDigital Library
- Unruh, D. Quantum proofs of knowledge. Advances in Cryptology---EUROCRYPT 2012. D. Pointcheval and T. Johansson, eds. Springer, 135--152. Google ScholarDigital Library
- van de Graaf, J. Towards a Formal Definition of Security for Quantum Protocols. Ph.D. Dissertation, 1998. Montreal, Canada. Google ScholarDigital Library
- Von Neumann, J. Mathematical Foundations of Quantum Mechanics. Number 2. Princeton University Press, 1955.Google Scholar
- Watrous, J. Zero-knowledge against quantum attacks. SIAM J. Comput. 39, 1 (2009), 25--58. Google ScholarDigital Library
- Xu, F. et al. Experimental quantum fingerprinting with weak coherent pulses. Nature Communications, (2015), 8735.Google Scholar
Index Terms
- Cyber security in the quantum era
Recommendations
Government regulations in cyber security: Framework, standards and recommendations
AbstractCyber security refers to the protection of Internet-connected systems, such as hardware, software as well as data (information) from cyber attacks (adversaries). A cyber security regulation is needed in order to protect information ...
Highlights- We list and discuss the cyber attacks, security requirements and measures. We then discuss the cyber security incident management framework and its various ...
From information security to cyber security
The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. ...
Comments