Security in Quantum Computing

Authors

  • Ana Lavinia Petrache BEIA Consult International
  • George Suciu BEIA Consult International

DOI:

https://doi.org/10.51381/adrs.v3i1.40

Keywords:

qubit, encryption, superposition, entanglement, photon polarization

Abstract

Quantum key distribution will bring more confidentiality and privacy of communication in the future ICT world and will solve the eavesdropping issue. Domains regarded are e-government, e-commerce, e-health, transmission of biometric data, intelligent transport systems and more. So far, quantum researches focus on using properties of the qubit to bring improvements in technologies from our days.  The purpose of this paper is to describe the quantum encryption methods. These methods can bring more efficiency of security in existing communications. In this matter, many encryption architectures have been proposed. As an example, the QKD architecture is presented in this paper.

References

Bloch, Felix. (1946). Nuclear Induction. Physical Review, 70(7–8), 460–474., https://doi.org/10.1103/PhysRev.70.460

Bruss, D., Erdélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum cryptography. ACM Computing Surveys, 39(2), 6. https://doi.org/10.1145/1242471.1242474

Takahashi, Dean. (2020). Intel and QuTech unveil Horse Ridge cryogenic control chip for quantum computing. Retrieved on 18.02.2020 from https://venturebeat.com/2020/02/18/intel-and-qutech-unveil-horse-ridge-cryogenic-control-chip-for-quantum-computing/

ETSI GS QKD 002. (2010). Quantum Key Distribution Use Cases. Retrieved on June 2010 from https://www.etsi.org/deliver/etsi_gs/qkd/001_099/002/01.01.01_60/gs_qkd002v010101p.pdf

ETSI World Class Standards.2008.Quantum Key Distribution Architecture.Retrieved on 2008 from https://www.etsi.org/technologies/quantum-key-distribution

ETSI Quantum Key Distribution. Retrieved from https://www.etsi.org/technologies/quantum-key-distribution

Information Technology and Information Foundation. (2019). TIF Technology Explainer: What Is Quantum Computing?. Retrieved on January 29, 2019 from https://www.technologyreview.com/s/612844/what-is-quantum-computing/

Giles, M. (2019). Explainer: What is a quantum computer? Retrieved December 22, 2020, from https://www.technologyreview.com/2019/01/29/66141/what-is-quantum-computing/

Haitjema, Mart. (2007). A Survey of the Prominent Quantum Key Distribution Protocols. Retrieved on 2007 from https:/www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/

Lu, Y., Bengtsson, A., Burnett, J. J., Wiegand, E., Suri, B., Krantz, P., … Delsing, P. (2019). Characterizing decoherence rates of a superconducting qubit by direct microwave scattering. Retrieved from http://arxiv.org/abs/1912.02124

Logan O. Mailloux, Dr. Michael R. Grimaila, Douglas D. Hodson, Colin V. McLaughlin and G.B. Baumgartner. 2016. Quantum Key Distribution: Boon or Bust? Published in Journal of Cyber Security and Information Systems, Volume: 4 Number: 2 - Basic Complexity

Shukla, M., & Patel, S. (2018). Prominent Security of the Quantum Key Distribution Protocol. International Journal of Science and Research, 8. https://doi.org/10.21275/ART20199396

Quantum-Safe Security Working Group.(2018). What is Quantum Key Distribution?. Retrieved on 2018 from https://www.etsi.org/images/files/ETSITechnologyLeaflets/QuantumKeyDistribution.pdf

Shor, P. W., & Preskill, J. (2000). Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85(2), 441–444. https://doi.org/10.1103/PhysRevLett.85.441

Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., … Wallden, P. (2019). Advances in Quantum Cryptography. https://doi.org/10.1364/AOP.361502

RIKEN Center for Emergent Matter Science. (2020). Scientists measure electron spin qubit without demolishing it. Retrieved on 2.03.2020 from https://phys.org/news/2020-03-scientists-electron-qubit-demolishing.html

Dai, H., and Xu, H. (2010). Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE SENSORS JOURNAL, 10(8), 1399. https://doi.org/10.1109/JSEN.2009.2039130

Downloads

Published

2020-11-17

How to Cite

Petrache, A. L., & Suciu, G. (2020). Security in Quantum Computing. Annals of Disaster Risk Sciences, 3(1). https://doi.org/10.51381/adrs.v3i1.40