Transitioning organizations to post-quantum cryptography

D Joseph, R Misoczki, M Manzano, J Tricot… - Nature, 2022 - nature.com
Quantum computers are expected to break modern public key cryptography owing to Shor's
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Faster packed homomorphic operations and efficient circuit bootstrap** for TFHE

I Chillotti, N Gama, M Georgieva… - … Conference on the Theory …, 2017 - Springer
In this paper, we present several methods to improve the evaluation of homomorphic
functions in TFHE, both for fully and for leveled homomorphic encryption. We propose two …

Breaking symmetric cryptosystems using quantum period finding

M Kaplan, G Leurent, A Leverrier… - Advances in Cryptology …, 2016 - Springer
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …

Post-quantum security of the Fujisaki-Okamoto and OAEP transforms

EE Targhi, D Unruh - … of Cryptography: 14th International Conference, TCC …, 2016 - Springer
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the
quantum random oracle model. Our scheme is a combination of an asymmetric and a …

Quantum homomorphic encryption for polynomial-sized circuits

Y Dulek, C Schaffner, F Speelman - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
We present a new scheme for quantum homomorphic encryption which is compact and
allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the …

Quantum permutation pad for universal quantum-safe cryptography

R Kuang, M Barbeau - Quantum Information Processing, 2022 - Springer
Classical cryptographic techniques are currently under the growing quantum computing
threat. New techniques that quantum computing algorithms cannot break are urgently …

Uncloneable quantum encryption via oracles

A Broadbent, S Lord - arxiv preprint arxiv:1903.00130, 2019 - arxiv.org
Quantum information is well-known to achieve cryptographic feats that are unattainable
using classical information alone. Here, we add to this repertoire by introducing a new …

Quantum encryption of superposition states with quantum permutation pad in IBM quantum computers

M Perepechaenko, R Kuang - EPJ Quantum Technology, 2023 - epjqt.epj.org
We present an implementation of Kuang and Bettenburg's Quantum Permutation Pad (QPP)
used to encrypt superposition states. The project was conducted on currently available IBM …

Will quantum computers be the end of public key encryption?

W Buchanan, A Woodward - Journal of Cyber Security Technology, 2017 - Taylor & Francis
The emergence of practical quantum computers poses a significant threat to the most
popular public key cryptographic schemes in current use. While we know that the well …