skip to main content
10.1145/3610251.3610559acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Public Access

Key Generation and Identity Verification using Quantum Teleportation

Published: 10 September 2023 Publication History

Abstract

The advent of quantum computers introduces new challenges to the fields of encryption and authentication. Traditional cryptographic systems, such as RSA and ECC, rely on mathematical problems that are computationally hard for classical computers to solve. However, quantum computers have the potential to render these algorithms ineffective by leveraging Shor's algorithm, which can efficiently factor large numbers and solve the discrete logarithm problem. This capability threatens the security of many widely deployed encryption and authentication schemes. There have been a number of post-quantum cryptography methods proposed in the past. However, they are either relatively difficult to implement in current small-scale quantum computers or they do not take noise and error mitigation into account. In this paper, we propose a new framework of post-quantum key generation and identity verification mechanisms which are relatively easy to implement and adapt. Our approaches take the noisy nature of current quantum devices into consideration. As a result, our proposed approach can resist attacks from malicious quantum computers and the successful attack rate could quickly decay to zero as the number of qubits increases.

References

[1]
2021. Size considerations for public and private keys. https://www.ibm.com/docs/en/zos/2.3.0?topic=certificates-size-considerations-public-private-keys. (2021).
[2]
2023. No-cloning theorem. https://en.wikipedia.org/wiki/No-cloning_theorem. (2023).
[3]
Johannes Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier, and Evangelos Karatsiolis. 2013. Introduction to public key infrastructures. Vol. 36. Springer.
[4]
Poulami Das, Swamit Tannu, and Moinuddin Qureshi. 2021. JigSaw: Boosting Fidelity of NISQ Programs via Measurement Subsetting. In MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture. Association for Computing Machinery, New York, NY, USA, 937--949.
[5]
Neal Koblitz. 1987. Elliptic Curve Cryptosystems. Math. Comp. 48, 177 (Jan. 1987), 203--209.
[6]
Michael A. Nielsen and Isaac L. Chuang. 2011. Quantum Computation and Quantum Information: 10th Anniversary Edition. USA.
[7]
Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, and Yevgeni Koucheryavy. 2018. Multi-factor authentication: A survey. Cryptography 2, 1 (2018), 1.
[8]
Tirthak Patel and Devesh Tiwari. 2021. Qraft: Reverse Your Quantum Circuit and Know the Correct Program Output. In ASPLOS. Association for Computing Machinery, New York, NY, USA, 443--455.
[9]
John Preskill. 2018. Quantum computing in the NISQ era and beyond. Quantum 2 (2018), 79.
[10]
Qiskit contributors. 2023. Qiskit: An Open-source Framework for Quantum Computing. (2023).
[11]
R. L. Rivest, A. Shamir, and L. Adleman. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21, 2 (feb 1978), 120--126.
[12]
P.W. Shor. 1994. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science. 124--134.
[13]
Swamit S. Tannu and Moinuddin Qureshi. 2019. Ensemble of Diverse Mappings: Improving Reliability of Quantum Computers by Orchestrating Dissimilar Mistakes. In Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture. Association for Computing Machinery, New York, NY, USA, 253--265.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
QuNet '23: Proceedings of the 1st Workshop on Quantum Networks and Distributed Quantum Computing
September 2023
76 pages
ISBN:9798400703065
DOI:10.1145/3610251
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 September 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. quantum computing
  2. quantum teleportation
  3. key generation
  4. identity verification
  5. network security

Qualifiers

  • Research-article

Funding Sources

Conference

QuNet '23
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 117
    Total Downloads
  • Downloads (Last 12 months)61
  • Downloads (Last 6 weeks)15
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media