Affiliation:
1. School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
Abstract
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses the principles of quantum mechanics to distribute keys. Post-quantum encryption algorithms are encryption methods that rely on mathematical challenges that quantum computers cannot solve quickly to ensure security. In this study, an integrated review of post-quantum encryption algorithms is conducted from the perspective of traditional cryptography. First, the concept and development background of post-quantum encryption are introduced. Then, the post-quantum encryption algorithm Kyber is studied. Finally, the achievements, difficulties and outstanding problems in this emerging field are summarized, and some predictions for the future are made.
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference105 articles.
1. Secure quantum key distribution with realistic devices;Xu;Rev. Mod. Phys.,2020
2. Ryan, P., Naccache, D., and Quisquater, J.J. (2016). The New Codebreakers, Springer. Lecture Notes in Computer Science.
3. Cai, J., Liang, W., Li, X., Li, K., Gui, Z., and Khan, M.K. (2023). GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network. IEEE Internet Things J.
4. Dataset distillation via factorization;Liu;Adv. Neural Inf. Process. Syst.,2022
5. CTDM: Cryptocurrency abnormal transaction detection method with spatio-temporal and global representation;Xiao;Soft Comput.,2023
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献