2021
DOI: 10.1007/s11432-021-3354-7
|View full text |Cite
|
Sign up to set email alerts
|

Quantum-safe cryptography: crossroads of coding theory and cryptography

Abstract: We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a cryptographic point of view, lattice and code-based schemes are among the most promising PQC solutions. Both approaches are based on the hardness of decoding problems of linear codes with different metrics. From an information-theoretic point of view, lattices and linear codes can be constructed to achieve certain secrecy quantities for wiretap channels as is intr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 76 publications
0
2
0
Order By: Relevance
“…According to [194], privacy-preserving protocols are designed to enable secure communication and data exchange while minimizing the exposure of sensitive information. These protocols typically employ cryptographic techniques to protect the confidentiality, integrity, and authenticity of data transmitted over networks [195]- [199]. One example is Secure Multi-Party Computation (SMPC), which allows multiple parties to jointly compute a function over their inputs while keeping those inputs private.…”
Section: Privacy-preserving Protocolsmentioning
confidence: 99%
“…According to [194], privacy-preserving protocols are designed to enable secure communication and data exchange while minimizing the exposure of sensitive information. These protocols typically employ cryptographic techniques to protect the confidentiality, integrity, and authenticity of data transmitted over networks [195]- [199]. One example is Secure Multi-Party Computation (SMPC), which allows multiple parties to jointly compute a function over their inputs while keeping those inputs private.…”
Section: Privacy-preserving Protocolsmentioning
confidence: 99%
“…Even though Quantum computing emerged with different innovations, the research is still in progress to investigate quantum-safe cryptographic algorithms [148]. Quantum-safe blockchain systems incorporate cryptographic algorithms [149] which are safe from quantum attacks.…”
Section: ) Evolution Of the Quantum Computingmentioning
confidence: 99%
“…The exploration of cyclic codes has captured the interest of many researchers, especially with the rise of cryptography [1][2][3][4] [5]. Cyclic codes are particularly significant in coding theory, notably for error correction purposes [6] [7][8] [9][10] [11].…”
Section: Introductionmentioning
confidence: 99%