Share Email Print
cover

Proceedings Paper

Secure quantum signatures: a practical quantum technology (Conference Presentation)
Author(s): Erika Andersson
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Modern cryptography encompasses much more than encryption of secret messages. Signature schemes are widely used to guarantee that messages cannot be forged or tampered with, for example in e-mail, software updates and electronic commerce. Messages are also transferrable, which distinguishes digital signatures from message authentication. Transferability means that messages can be forwarded; in other words, that a sender is unlikely to be able to make one recipient accept a message which is subsequently rejected by another recipient if the message is forwarded. Similar to public-key encryption, the security of commonly used signature schemes relies on the assumed computational difficulty of problems such as finding discrete logarithms or factoring large primes. With quantum computers, such assumptions would no longer be valid. Partly for this reason, it is desirable to develop signature schemes with unconditional or information-theoretic security. Quantum signature schemes are one possible solution. Similar to quantum key distribution (QKD), their unconditional security relies only on the laws of quantum mechanics. Quantum signatures can be realized with the same system components as QKD, but are so far less investigated. This talk aims to provide an introduction to quantum signatures and to review theoretical and experimental progress so far.

Paper Details

Date Published: 7 December 2016
PDF: 1 pages
Proc. SPIE 9996, Quantum Information Science and Technology II, 999603 (7 December 2016); doi: 10.1117/12.2244674
Show Author Affiliations
Erika Andersson, Heriot-Watt Univ. (United Kingdom)


Published in SPIE Proceedings Vol. 9996:
Quantum Information Science and Technology II
Mark T. Gruneisen; Miloslav Dusek; John G. Rarity, Editor(s)

© SPIE. Terms of Use
Back to Top