Post-Quantum Cryptography and Quantum Cloning

Post-Quantum Cryptography and Quantum Cloning

Amandeep Singh Bhatia, Shenggen Zheng
Copyright: © 2020 |Pages: 28
ISBN13: 9781799822530|ISBN10: 1799822532|ISBN13 Softcover: 9781799822547|EISBN13: 9781799822554
DOI: 10.4018/978-1-7998-2253-0.ch001
Cite Chapter Cite Chapter

MLA

Bhatia, Amandeep Singh, and Shenggen Zheng. "Post-Quantum Cryptography and Quantum Cloning." Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, IGI Global, 2020, pp. 1-28. https://doi.org/10.4018/978-1-7998-2253-0.ch001

APA

Bhatia, A. S. & Zheng, S. (2020). Post-Quantum Cryptography and Quantum Cloning. In N. Chaubey & B. Prajapati (Eds.), Quantum Cryptography and the Future of Cyber Security (pp. 1-28). IGI Global. https://doi.org/10.4018/978-1-7998-2253-0.ch001

Chicago

Bhatia, Amandeep Singh, and Shenggen Zheng. "Post-Quantum Cryptography and Quantum Cloning." In Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, 1-28. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2253-0.ch001

Export Reference

Mendeley
Favorite

Abstract

In the last two decades, the field of post-quantum cryptography has had an overwhelming response among research communities. The ability of quantum computers to factorize large numbers could break many of well-known RSA cryptosystem and discrete log-based cryptosystem. Thus, post-quantum cryptography offers secure alternatives which are implemented on classical computers and is secure against attacks by quantum computers. The significant benefits of post-quantum cryptosystems are that they can be executed quickly and efficiently on desktops, smartphones, and the Internet of Things (IoTs) after some minor software updates. The main objective of this chapter is to give an outline of major developments in privacy protectors to reply to the forthcoming threats caused by quantum systems. In this chapter, we have presented crucial classes of cryptographic systems to resist attacks by classical and quantum computers. Furthermore, a review of different classes of quantum cloning is presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.