2023
DOI: 10.3389/frqst.2023.1164428
|View full text |Cite
|
Sign up to set email alerts
|

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

Abstract: Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing. One existing option to counter this potential threat is quantum key distribution, whose security is based on the laws of quantum physics. Quantum key distribution is secure against unforeseen technological developments. A second approach is post-quantum cryptography, which is a set of crypto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 136 publications
0
2
0
Order By: Relevance
“…Here, we take a look at various current blockchain models and compare them to the proposed quantum blockchain. Table 6 displays the pertinent comparisons among the references [39][40][41].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we take a look at various current blockchain models and compare them to the proposed quantum blockchain. Table 6 displays the pertinent comparisons among the references [39][40][41].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
“…An overview of recent advances in the construction of quantum-safe systems, an examination of the vulnerabilities of existing cryptographic methods to computational and innovations in technology, and possible remedies to these vulnerabilities are the primary takeaways from the article [40].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
“…Here, we take a look at various current blockchain models and compare them to the proposed quantum blockchain. Tables 7 and 8 display the qualitative and quantitative comparisons among the references [38][39][40].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
“…An overview of recent advances in the construction of quantum-safe systems, an examination of the vulnerabilities of existing cryptographic methods to computational and technological innovations, and possible remedies to these vulnerabilities are the primary takeaways from [39].…”
Section: A Review Of Accomplishmentmentioning
confidence: 99%
See 1 more Smart Citation