The Fascinating Evolution of Quantum Cryptography: The Modern Information Maginot Line
Download PDF
$currentUrl="http://$_SERVER[HTTP_HOST]$_SERVER[REQUEST_URI]"

Keywords

Cryptography
Quantum physics
BB84 scheme
Bell’s theorem

DOI

10.26689/ssr.v6i11.8782

Submitted : 2024-11-03
Accepted : 2024-11-18
Published : 2024-12-03

Abstract

During the Cold War, a revolutionary cryptographic method, quantum cryptography, emerged. Grounded in the laws of quantum physics, quantum cryptography ensures absolute security using quantum principles. Stephen Wiesner introduced the concept in 1983, but initially received little attention, as technology at the time did not allow the encryption method to be put into practice. The field of quantum cryptography began to take shape with the arrival of two more researchers, Giles Brassard and Charles Bennett. The development of quantum cryptography accelerated dramatically after Artur Ekert proposed the application of Bell’s theorem in this field. Afterwards, more researchers got involved and new theorems and applications were developed, leading the field to become a major subject at the forefront of physics research. This paper explores why quantum cryptography is exceptionally secure and the steps that brought this idea to practice. The paper looks into the intriguing concept of quantum cryptography and the stimulating stories surrounding its progress. From Stephen Wiesner’s original proposal through Brassard and Bennett’s persistent efforts to the exciting debates between Ekert and Brassard and Bennett. This paper highlights the significant milestones and achievements that have positioned quantum cryptography at the forefront of physics research.

References

Kaiser D, 2011, How the Hippies Saved Physics: Science, Counterculture, and the Quantum Revival. W.W. Norton & Company, New York.

Churchhouse RF, 2002, Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge University Press, Cambridge.

Bennett CH, Brassard G, 1984, An Update on Quantum Cryptography, in Workshop on the Theory and Application of Cryptographic Techniques. Springer Berlin Heidelberg, Berlin, 475–477.

Wiesner S, 1983, Conjugate Coding. ACM Sigact News, 15(1): 78–88.

Bennett CH, Brassard G, 1984, Public Key Distribution and Coin Tossing. IEEE International Conference on Computer System and Application, Bangalore, India, 175–179.

Brassard G, 1988, Quantum Cryptography, in Modern Cryptography: A Tutorial. Springer, Heidelberg, 79–90.

Wiedemann D, 1986, Quantum Cryptography, ACM Sigact News, 18(2): 48–51.

Brassard G, 2005, Brief History of Quantum Cryptography: A Personal Perspective, in IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 19–23.

Ekert AK, 1991, Quantum Cryptography Based on Bell’s Theorem. Physical Review Letters, 67(6): 661–663.

Bennett CH, Brassard G, Mermin ND, 1992, Quantum Cryptography without Bell’s Theorem. Physical Review Letters, 68(5): 557–559.

Bennett CH, Brassard G, Crepeau C, et al., 1993, Teleporting an Unknown Quantum State via Dual Classical and Einstein-Podolsky-Rosen Channels. Physical Review Letters, 70(13): 1895–1899.

Deutsch D, Ekert A, Jozsa R, et al., 1996, Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. Physical Review Letters, 77(13): 2818–2821.

Bennett CH, Brassard G, Popescu S, et al., 1996, Purification of Noisy Entanglement and Faithful Teleportation via Noisy Channels. Physical Review Letters, 76(5): 722–725.

Brassard G, 2005, Brief History of Quantum Cryptography: A Personal Perspective, in IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 19–23.

Brassard G, Crepeau C, 1996, 25 Years of Quantum Cryptography. ACM Sigact News, 27(3): 13–24.

Ekert AK, Huttner B, Palma GM, et al., 1994, Eavesdropping on Quantum-Cryptographical Systems. Physical Review A, 50(2): 1047–1056.

Lutkenhaus N, 1996, Security against Eavesdropping in Quantum Cryptography. Physical Review A, 54(1): 97–111.

Dominic M, 1996, Quantum Key Distribution and String Oblivious Transfer in Noisy Channels, in Annual International Cryptology Conference. Springer, Berlin, 343–357.

Dominic M, Salvail L, 1994, Quantum Oblivious Transfer is Secure against All Individual Measurements, in Proceedings Workshop on Physics and Computation. PhysComp’94 IEEE, 69–77.

Yao ACC, 1995, Security of Quantum Protocols against Coherent Measurements, in Proceedings of the Twenty-seventh Annual ACM Symposium on Theory of Computing, 67–75.

Wiesner S, 1993, Quantum Cryptography with Bright Light, manuscript.

Matsueda H, 1995, Quantum Cryptography by Modulating Spontaneous Photon Emissions. Conference on Lasers and Electro-Optics, Pacific Rim.

Bennett CH, Bessette F, Brassard G, et al., 1992, Experimental Quantum Cryptography. Journal of Cryptology, 1992(5): 3–28.

Ribordy G, Brendel J, Gautier JD, et al., 2000, Long-distance Entanglement-based Quantum Key Distribution. Physical Review A, 63(1): 012309.

Hruby J, 1995, Smart-card with Interferometric Quantum Cryptography Device, in International Conference on Cryptography: Policy and Algorithms. Springer Berlin Heidelberg, Berlin, 282–289.

Townsend PD, Marand C, Phoenix SJD, et al., 1996, Secure Optical Communications Systems Using Quantum Cryptography, in Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences, 354(1708): 805–817.

Hughes RJ, Buttler WT, Kwiat PG, et al., 1998, Practical Free-space Quantum Cryptography, in NASA International Conference on Quantum Computing and Quantum Communications. Springer Berlin Heidelberg, Berlin, 200–213.