Title :
Private key and public key quantum cryptography
Author :
Gottesman, Daniel
Author_Institution :
California Univ., Berkeley, CA, USA
Abstract :
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks. The author gives an overview of the changes, including Shor´s algorithm to break classical codes with a quantum computer and protocols for quantum key distribution using single photons to perform unbreakable encryption. One useful classical technique is the idea of a public key, which can be safely handed out even to an adversary. The author shows how to create quantum protocols with similar properties, and how they can be used to create unbreakable digital signatures.
Keywords :
message authentication; protocols; public key cryptography; quantum cryptography; quantum optics; Shor algorithm; classical code breaking; coherent quantum state manipulation; private key quantum cryptography; protocols; public key quantum cryptography; quantum computer; quantum key distribution; quantum protocols; single photons; unbreakable digital signatures; unbreakable encryption; Data security; Protocols; Public key cryptography;
Conference_Titel :
Quantum Electronics and Laser Science Conference, 2002. QELS '02. Technical Digest. Summaries of Papers Presented at the
Conference_Location :
Long Beach, CA, USA
Print_ISBN :
1-55752-708-3
DOI :
10.1109/QELS.2002.1031293