Author(s)
Yi-Kai Liu, Dustin Moody
Abstract
We review the current status of efforts to develop and deploy post-quantum cryptography on the Internet. Then we suggest specific ways in which quantum technologies might be used to enhance cybersecurity in the near future and beyond. We focus on two goals: protecting the secret keys that are used in classical cryptography, and ensuring the trustworthiness of quantum computations. These goals may soon be within reach, thanks to recent progress in both theory and experiment. This progress includes interactive protocols for testing quantumness as well as for performing uncloneable cryptographic computations; and experimental demonstrations of device-independent random number generators, device-independent quantum key distribution, quantum memories, and analog quantum simulators.
Citation
Physical Review Applied
Keywords
Post-quantum cryptography, quantum cryptography, hardware security modules, verification and validation, random number generators, quantum simulation
Citation
Liu, Y.
and Moody, D.
(2024),
Post-Quantum Cryptography, and the Quantum Future of Cybersecurity, Physical Review Applied, [online], https://doi.org/10.1103/PhysRevApplied.21.040501, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=936706 (Accessed May 4, 2026)
Additional citation formats
Issues
If you have any questions about this publication or are having problems accessing it, please contact [email protected].