Quantum-Secure Communication and Data Protection

The field of quantum-secure communication and data protection is moving towards the development of hybrid schemes that combine the benefits of post-quantum cryptography and quantum key distribution. This approach aims to establish a dual-layered security model, leveraging the strengths of both paradigms to provide enhanced security. Notably, researchers are exploring the integration of quantum key distribution with classical cryptographic protocols to create secure key exchange and digital signature schemes. Additionally, there is a growing interest in physically unclonable functions (PUFs) and certified deletion properties, which have the potential to revolutionize identity verification and secure key leasing. Furthermore, innovative methods for non-destructively testing coset states with classical communication are being developed, enabling the creation of proofs of no intrusion for remotely testing whether a quantum server has been hacked. Some noteworthy papers in this area include:

  • A study on hybrid schemes that integrate QKD with NIST standardized PQC algorithms, proposing a hybrid key exchange protocol and a hybrid digital signature scheme.
  • A paper presenting a new ReRAM PUF-based protocol for creating a physical ReRAM PUF with a large challenge space.
  • A construction of a computational Certified Deletion Property achievable with classical communication, derived from the compilation of the non-local Magic Square Game.
  • A introduction of Proofs of No Intrusion, enabling a classical client to remotely test whether a quantum server has been hacked and the client's data stolen.

Sources

Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature

Using Preformed Resistive Random Access Memory to Create a Strong Physically Unclonable Function

Computational Certified Deletion Property of Magic Square Game and its Application to Classical Secure Key Leasing

Proofs of No Intrusion

Built with on top of