14 Facts About Quantum cryptography

1.

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.

FactSnippet No. 1,626,501
2.

The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem.

FactSnippet No. 1,626,502
3.

Companies that manufacture quantum cryptography systems include MagiQ Technologies, Inc, ID Quantique, QuintessenceLabs, Toshiba, QNu Labs and SeQureNet.

FactSnippet No. 1,626,503
4.

Quantum cryptography has the potential to encrypt data for longer periods than classical cryptography.

FactSnippet No. 1,626,504
5.

Also, quantum cryptography has useful applications for governments and militaries as, historically, governments have kept military data secret for periods of over 60 years.

FactSnippet No. 1,626,505

Related searches

Toshiba Eve
6.

Quantum cryptography repeaters have the ability to resolve quantum communication errors in an efficient way.

FactSnippet No. 1,626,506
7.

Quantum cryptography repeaters do this by purifying the segments of the channel before connecting them creating a secure line of communication.

FactSnippet No. 1,626,507
8.

Quantum cryptography is a general subject that covers a broad range of cryptographic practices and protocols.

FactSnippet No. 1,626,508
9.

Best-known and developed application of quantum cryptography is QKD, which is the process of using quantum communication to establish a shared key between two parties without a third party learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob.

FactSnippet No. 1,626,509
10.

Examples of tasks in mistrustful Quantum cryptography are commitment schemes and secure computations, the latter including the further examples of coin flipping and oblivious transfer.

FactSnippet No. 1,626,510
11.

In contrast to quantum key distribution where unconditional security can be achieved based only on the laws of quantum physics, in the case of various tasks in mistrustful cryptography there are no-go theorems showing that it is impossible to achieve unconditionally secure protocols based only on the laws of quantum physics.

FactSnippet No. 1,626,511
12.

Goal of position-based quantum cryptography is to use the geographical location of a player as its credential.

FactSnippet No. 1,626,512
13.

The need for post-quantum cryptography arises from the fact that many popular encryption and signature schemes can be broken using Shor's algorithm for factoring and computing discrete logarithms on a quantum computer.

FactSnippet No. 1,626,513
14.

In practice, quantum cryptography is only conditionally secure, dependent on a key set of assumptions.

FactSnippet No. 1,626,514