Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key cryptographic algorithms that have been developed that, while not currently in widespread use, are believed to be resistant to quantum computing based attacks and discuss some of the issues that protocol designers may need to consider if there is a need to deploy these algorithms at some point in the future.
Proceedings Title: IDtrust 2009
Conference Dates: April 14-16, 2009
Conference Location: Gaithersburg, MD
Conference Title: 8th Symposium on Identity and Trust on the Internet (IDtrust 2009)
Pub Type: Conferences
public key cryptography, quantum computing