{"id":29070,"date":"2015-02-06T14:50:10","date_gmt":"2015-02-06T19:50:10","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/quantum-cryptography-wikipedia-the-free-encyclopedia.php"},"modified":"2015-02-06T14:50:10","modified_gmt":"2015-02-06T19:50:10","slug":"quantum-cryptography-wikipedia-the-free-encyclopedia","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/quantum-cryptography-wikipedia-the-free-encyclopedia.php","title":{"rendered":"Quantum cryptography &#8211; Wikipedia, the free encyclopedia"},"content":{"rendered":"<p><p>    Quantum cryptography describes the use of quantum mechanical effects (in particular    quantum    communication and quantum    computation) to perform cryptographic    tasks or to break cryptographic systems.  <\/p>\n<p>    Well-known examples of quantum cryptography are the use of    quantum communication to exchange a key securely (quantum key distribution) and    the hypothetical use of quantum computers that would allow the    breaking of various popular public-key encryption and signature schemes (e.g., RSA and ElGamal).  <\/p>\n<p>    The advantage of quantum cryptography lies in the fact that it    allows the completion of various cryptographic tasks that are    proven or conjectured to be impossible using only classical    (i.e. non-quantum) communication (see below for examples). For    example, quantum mechanics guarantees that measuring quantum    data disturbs that data; this can be used to detect    eavesdropping in quantum key distribution.  <\/p>\n<p>    Quantum cryptography was proposed first by Stephen    Wiesner, then at Columbia University in New York, who, in    the early 1970s, introduced the concept of quantum conjugate    coding. His seminal paper titled \"Conjugate Coding\" was    rejected by IEEE Information Theory but was eventually    published in 1983 in SIGACT News (15:1 pp.7888, 1983).    In this paper he showed how to store or transmit two messages    by encoding them in two \"conjugate observables\", such as linear    and circular polarization of light, so that either, but not    both, of which may be received and decoded. He illustrated his    idea with a design of unforgeable bank notes. In 1984, building    upon this work, Charles H.    Bennett, of the IBM Thomas J. Watson Research    Center, and Gilles Brassard, of the Universit de    Montral, proposed a method for secure communication based on    Wiesners \"conjugate observables\", which is now called BB84.[1] In 1990    Artur Ekert    developed a different approach to quantum key distribution    based on peculiar quantum correlations known as quantum    entanglement.[2]  <\/p>\n<p>    Random rotations of the polarization by both parties (usually    called Alice and Bob) have been proposed in Kak's    three-stage quantum cryptography protocol.[3] In    principle, this method can be used for continuous, unbreakable    encryption of data if single photons are used.[4] The    basic polarization rotation scheme has been    implemented.[5]  <\/p>\n<p>    The BB84 method is at the basis of quantum key distribution    methods. Companies that manufacture quantum cryptography    systems include MagiQ Technologies, Inc. of    Boston, ID    Quantique of Geneva, Switzerland, QuintessenceLabs    (Canberra, Australia) and SeQureNet    (Paris).  <\/p>\n<p>    The most well known and developed application of quantum    cryptography is quantum key distribution (QKD),    which is the process of using quantum communication to    establish a shared key between two parties without a third    party (Eve) learning anything about that key, even if Eve can    eavesdrop on all communication between Alice and Bob. This is    achieved by Alice encoding the bits of the key as quantum data    and sending them to Bob; if Eve tries to learn these bits, the    messages will be disturbed and Alice and Bob will notice. The    key is then typically used for encrypted communication    using classical techniques. For instance, the exchanged key    could be used as the seed of the same random number generator    both by Alice and Bob.  <\/p>\n<p>    The security of QKD can be proven mathematically without    imposing any restrictions on the abilities of an eavesdropper,    something not possible with classical key distribution. This is    usually described as \"unconditional security\", although there    are some minimal assumptions required including that the laws    of quantum mechanics apply and that Alice and Bob are able to    authenticate each other, i.e. Eve should not be able to    impersonate Alice or Bob as otherwise a man-in-the-middle attack would    be possible.  <\/p>\n<p>    Following the discovery of quantum key distribution and its    unconditional security, researchers tried to achieve other    cryptographic tasks with unconditional security. One such task    was commitment. A commitment scheme allows    a party Alice to fix a certain value (to \"commit\") in such a    way that Alice cannot change that value while at the same time    ensuring that the recipient Bob cannot learn anything about    that value until Alice decides to reveal it. Such commitment    schemes are commonly used in cryptographic protocols. In the    quantum setting, they would be particularly useful: Crpeau and    Kilian showed that from a commitment and a quantum channel, one    can construct an unconditionally secure protocol for performing    so-called oblivious transfer.[6]Oblivious transfer, on the other    hand, had been shown by Kilian to allow implementation of    almost any distributed computation in a secure way (so-called    secure multi-party    computation).[7]    (Notice that here we are a bit imprecise: The results by    Crpeau and Kilian[6]    and Kilian[7]    together do not directly imply that given a commitment and a    quantum channel one can perform secure multi-party computation.    This is because the results do not guarantee \"composability\",    that is, when plugging them together, one might lose security.    Later works showed, however, how composability can be ensured    in this setting.)  <\/p>\n<p>    Unfortunately, early quantum commitment protocols[8]    were shown to be flawed. In fact, Mayers showed that    (unconditionally secure) quantum commitment is impossible: a    computationally unlimited attacker can break any quantum    commitment protocol.[9]  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography\" title=\"Quantum cryptography - Wikipedia, the free encyclopedia\">Quantum cryptography - Wikipedia, the free encyclopedia<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. Well-known examples of quantum cryptography are the use of quantum communication to exchange a key securely (quantum key distribution) and the hypothetical use of quantum computers that would allow the breaking of various popular public-key encryption and signature schemes (e.g., RSA and ElGamal). The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-29070","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29070"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29070"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29070\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}