Quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem). This could be used to detect eavesdropping in quantum key distribution (QKD).
- Comment
- enQuantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem). This could be used to detect eavesdropping in quantum key distribution (QKD).
- Has abstract
- enQuantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem). This could be used to detect eavesdropping in quantum key distribution (QKD).
- Hypernym
- Science
- Is primary topic of
- Quantum cryptography
- Label
- enQuantum cryptography
- Link from a Wikipage to another Wikipage
- Aaron D. Wyner
- ACM SIGACT
- Andrew Yao
- Artur Ekert
- Asymptotic equipartition property
- Australia
- BB84
- Bell tests
- Boston
- Canberra
- Category:Cryptography
- Category:Emerging technologies
- Category:Quantum computing
- Category:Quantum cryptography
- Charles H. Bennett (computer scientist)
- Coherent state
- Commitment scheme
- Cryptographic
- DARPA
- Data security
- Device-independent quantum cryptography
- Discrete logarithms
- Dominic Mayers
- E. C. George Sudarshan
- Elliptic-curve cryptography
- Encrypted
- EPR pairs
- European Union Agency for Cybersecurity
- France
- Geneva
- Gilles Brassard
- ID Quantique
- IEEE Information Theory Society
- Information-theoretic security
- Integer factorization
- Japan
- Key distribution
- Key exchange
- Lattice-based cryptography
- MagiQ Technologies, Inc.
- Man-in-the-middle attack
- Massachusetts
- McEliece cryptosystem
- National Cyber Security Centre (United Kingdom)
- National Security Agency
- NIST
- No-cloning theorem
- Noisy-storage model
- Oblivious transfer
- Observable
- One-time pad
- Optical fiber
- Paris
- Photons
- Physical unclonable function
- Polarization (waves)
- Post-quantum cryptography
- QNu Labs
- Quantum coin flipping
- Quantum computers
- Quantum entanglement
- Quantum key distribution
- Quantum mechanics
- Quantum physics
- Quantum readout of PUFs
- Quantum state
- Quantum system
- Qubits
- QuintessenceLabs
- Roy J. Glauber
- RSA (cryptosystem)
- Secure communication
- Secure computation
- Secure multi-party computation
- Secure two-party computation
- Shor's algorithm
- Special relativity
- Stephen Wiesner
- Switzerland
- Symmetric cryptography
- Symmetric-key algorithm
- Thomas J. Watson Research Center
- Tokyo
- Toshiba
- Unconditional security (cryptography)
- United States
- Wave function collapse
- Zero-knowledge proof
- Zero trust security model
- Other
- enyes
- Quantum
- enyes
- SameAs
- 4NnBF
- Criptare cuantică
- Criptografía cuántica
- Criptografia quàntica
- Criptografia quântica
- Crittografia quantistega
- Crittografia quantistica
- Cryptographie quantique
- Kriptografia kuantiko
- Kryptologia kwantowa
- Kuantum kriptografi
- Kvantekryptografi
- Kvantinė kriptografija
- Kvantkrüptograafia
- Kvantkryptering
- Kvantna kriptografija
- Kvantna kriptografija
- Kvantová kryptografie
- Kvanttisalaus
- Kvantumkriptográfia
- Kwantumcryptografie
- m.0dnwx
- Mật mã lượng tử
- Q471906
- Quantenkryptographie
- Quantum cryptography
- Квантова криптографія
- Квантовая криптография
- הצפנה קוונטית
- تشفير كمومي
- رمزنگاری کوانتومی
- কোয়ান্টাম তথ্যগুপ্তিবিদ্যা
- ਕੁਆਂਟਮ ਕ੍ਰਿਪਟੋਗ੍ਰਾਫੀ
- துளிம மறைப்பியல்
- 量子密碼學
- 量子暗号
- 양자 암호
- Subject
- Category:Cryptography
- Category:Emerging technologies
- Category:Quantum computing
- Category:Quantum cryptography
- WasDerivedFrom
- Quantum cryptography?oldid=1113516616&ns=0
- WikiPageLength
- 77205
- Wikipage page ID
- 28676005
- Wikipage revision ID
- 1113516616
- WikiPageUsesTemplate
- Template:Authority control
- Template:Cryptography navbox
- Template:Emerging technologies
- Template:Main
- Template:Quantum information
- Template:Quantum mechanics topics
- Template:Reflist
- Template:Short description
- Template:Use dmy dates