Quantum Cryptography
耐量子暗号は、量子攻撃に耐性のあるアルゴリズムを開発し、古典的および量子的な脅威の両方に対して機密データの長期的なセキュリティを確保します。
耐量子暗号は、Shorのアルゴリズムのようなものを実行できる量子敵対者に対して安全なアルゴリズムとプロトコルを研究します。公開鍵暗号システム、デジタル署名、および暗号プロトコルをカバーしています。その目標は、大規模なフォールトトレラント量子コンピュータが実現可能になったとしても、機密性、完全性、および真正性を確保することです。一般的なファミリーには、格子ベース、符号ベース、多変数、およびハッシュベースの暗号が含まれます。
graph LR
Center["Quantum Cryptography"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Rel_cryptography["cryptography"]:::related -.-> Center
click Rel_cryptography "/terms/cryptography"
Rel_encryption["encryption"]:::related -.-> Center
click Rel_encryption "/terms/encryption"
Rel_antimatter_propulsion["antimatter-propulsion"]:::related -.-> Center
click Rel_antimatter_propulsion "/terms/antimatter-propulsion"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5歳でもわかるように説明
It's like sending a secret message using special invisible ink that changes if anyone tries to peek at it, so you know if someone read it.
🤓 Expert Deep Dive
Quantum cryptography primarily encompasses Quantum Key Distribution (QKD) and, more theoretically, quantum digital signatures and quantum secure direct communication. QKD protocols, like BB84, utilize properties of photons to establish a shared secret key between two parties (Alice and Bob). In BB84, Alice encodes bits onto photon polarization states (e.g., rectilinear basis $\{|0\rangle, |1\rangle\}$ and diagonal basis $\{|+\rangle, |- angle\}$), where $|+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle)$ and $|-\rangle = \frac{1}{\sqrt{2}}(|0\rangle - |1\rangle)$. Bob randomly chooses a basis to measure each incoming photon. After transmission, Alice and Bob publicly compare their basis choices. They discard measurements where bases didn't match and keep the rest, forming a raw key. Any eavesdropper (Eve) attempting to intercept and measure the photons will inevitably disturb their quantum state due to the no-cloning theorem and the probabilistic nature of quantum measurement. This disturbance introduces errors into the raw key, which Alice and Bob can detect through error rate analysis and privacy amplification techniques. Post-processing steps like error correction (e.g., Cascade protocol) and information reconciliation are crucial to distill a secure, shared secret key from the noisy quantum channel. Advanced protocols like E91 utilize entanglement to enhance security. The security of QKD is rooted in the fundamental laws of physics, not computational complexity, making it resistant to future advances in computing, including quantum computers.