DocumentCode
2227658
Title
Private key and public key quantum cryptography
Author
Gottesman, Daniel
Author_Institution
California Univ., Berkeley, CA, USA
fYear
2002
fDate
19-24 May 2002
Firstpage
189
Abstract
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks. The author gives an overview of the changes, including Shor´s algorithm to break classical codes with a quantum computer and protocols for quantum key distribution using single photons to perform unbreakable encryption. One useful classical technique is the idea of a public key, which can be safely handed out even to an adversary. The author shows how to create quantum protocols with similar properties, and how they can be used to create unbreakable digital signatures.
Keywords
message authentication; protocols; public key cryptography; quantum cryptography; quantum optics; Shor algorithm; classical code breaking; coherent quantum state manipulation; private key quantum cryptography; protocols; public key quantum cryptography; quantum computer; quantum key distribution; quantum protocols; single photons; unbreakable digital signatures; unbreakable encryption; Data security; Protocols; Public key cryptography;
fLanguage
English
Publisher
ieee
Conference_Titel
Quantum Electronics and Laser Science Conference, 2002. QELS '02. Technical Digest. Summaries of Papers Presented at the
Conference_Location
Long Beach, CA, USA
Print_ISBN
1-55752-708-3
Type
conf
DOI
10.1109/QELS.2002.1031293
Filename
1031293
Link To Document