Quantum cryptography beyond key distribution: theory and experiment

Mathieu Bozzio,Claude Crépeau,Petros Wallden,Philip Walther
2024-11-14
Abstract:Due to its fundamental principles, quantum theory holds the promise to enhance the security of modern cryptography, from message encryption to anonymous communication, digital signatures, online banking, leader election, one-time passwords and delegated computation. While quantum key distribution (QKD) has already enabled secure key exchange over hundreds of kilometers, a myriad of other quantum-cryptographic primitives are being developed to secure future applications against quantum adversaries. This article surveys the theoretical and experimental developments in quantum cryptography beyond QKD over the past decades, along with advances in secure quantum computation. It provides an intuitive classification of the main quantum primitives and their security levels, summarizes their possibilities and limits, and discusses their implementation with current photonic technology.
Quantum Physics
What problem does this paper attempt to address?
### Problems the paper attempts to solve The paper "Quantum Cryptography Beyond Key Distribution: Theory and Experiment" aims to explore the applications of quantum cryptography beyond key distribution (QKD) as well as its theoretical and experimental progress. Specifically, the paper attempts to solve the following core problems: 1. **Expand the application scope of quantum cryptography**: - **Problem description**: Although quantum key distribution (QKD) has made remarkable progress in secure key exchange, other application areas of quantum cryptography still need further exploration and development. - **Solution**: The paper reviews the theoretical and experimental progress of quantum cryptography in fields such as message encryption, anonymous communication, digital signature, online banking, leader election, one - time password, and delegated computation. 2. **Enhance the security of future applications**: - **Problem description**: With the development of quantum computers, traditional encryption methods may no longer be secure. Therefore, new quantum cryptography primitives need to be developed to protect future applications from quantum attacks. - **Solution**: The paper discusses various quantum cryptography primitives, such as unforgeable tokens, unclonable encryption, location verification, covert communication, and fingerprint identification, and analyzes their security and implementation techniques. 3. **Classify and evaluate quantum cryptography primitives**: - **Problem description**: There are a large variety of quantum cryptography primitives, and an intuitive classification system is required to help researchers and practitioners understand the characteristics and applicable scenarios of these primitives. - **Solution**: The paper provides an intuitive classification system, dividing the main quantum cryptography primitives into two major categories: trust - based and non - trust - based, and details the security level, possibility, and limitations of each primitive. 4. **Technical challenges in experimental implementation**: - **Problem description**: Although theoretically many quantum cryptography primitives have high security, in actual implementation they face numerous technical challenges, such as the efficiency of single - photon sources, tolerance to channel loss, etc. - **Solution**: The paper discusses the progress and challenges of current photon technologies in implementing these primitives and proposes directions for future research. ### Overview of specific content - **Introduction**: - Introduces the basic concepts of cryptography and the importance of quantum cryptography. - Emphasizes the advantages of quantum cryptography in providing information - theoretic security (i.t. - security). - **Tools and techniques**: - Introduces the basic principles and mathematical tools in quantum cryptography, such as conjugate coding, the no - cloning theorem, quantum teleportation, etc. - Discusses the derivation methods of optimal cheating strategies and how to use numerical tools such as semi - definite programming (SDP) to solve these problems. - **Trust - based quantum cryptography**: - Covers primitives such as unforgeable tokens, unclonable encryption, location verification, covert communication, and fingerprint identification. - Analyzes the security and implementation techniques of these primitives. - **Non - trust - based quantum cryptography**: - Covers primitives such as digital signature, bit commitment, oblivious transfer, strong coin flipping, weak coin flipping, and one - time programs. - Discusses the security and implementation challenges of these primitives in the quantum world. - **Security based on other physical assumptions**: - Explores how to bypass certain impossibility theorems through assumptions such as special relativity, bounded storage, and physical unclonable functions. - **Computational security**: - Discusses the security of quantum adversaries under computational limitations, such as public - key quantum money, one - time signature, public - key encryption, and zero - knowledge proof primitives. - **Multi - party quantum cryptography**: - Covers primitives such as secret sharing, data hiding, Byzantine agreement, random leader election, and electronic voting. - Discusses the applications of these primitives in distributed computing and cryptocurrencies. - **Quantum information protection**: - Covers primitives such as private channels, authentication, and anonymous communication for protecting the secure transmission of quantum information. - **Secure quantum computing**: - Discusses primitives such as blind computing, verifiable computing, quantum computing for classical clients, fully homomorphic encryption, and multi - party computing. - Analyzes the importance of these primitives in quantum networks. - **Outlook and challenges**: - Summarizes the current challenges in theoretical and experimental research, such as composability, quantum