Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Student Research Guide: Winter 2022 - Securing data in a post-quantum era: Home

By Joshua Spagnole

Introduction to the Topic

The thesis behind my research was that research behind quantum computing has led to fear in the general population, but with the introduction of quantum encryption, their data would be more secure with quantum computers than without it. I wanted to research how the development behind quantum cryptography is being used to address the fear of quantum computers.

Some questions I wanted to (and successfully did) address:

  • How are the concerns of quantum computers bypassing encryption being addressed?
  • How will quantum computers affect the future of cyber security?
  • How do quantum computers bypass encryption?

 

Keywords for searching the topic

  • Quantum computing
  • Quantum encryption
  • Cryptography
  • Cybersecurity
  • Encryption
  • Computer Science

Best Databases/Search Engines

Start Your Research Here

Encyclopædia Britannica. (n.d.). Quantum computer. Britannica Academic. Retrieved February 16, 2022, from https://academic-eb-com.skagit.idm.oclc.org/levels/collegiate/article/quantum-computer/343823

This resource goes over the evolution of quantum computing, along with some recent advancements and future theoretical advancements. This is a good source to start with if you're unfamiliar with quantum computing terminology.

Bruss, D., Erdeélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum Cryptography: A Survey. ACM Computing Surveys, 39(2), 1–27. http://doi.acm.org/10.1145/1242471.1242474

This article includes fundamental ideas in the field of quantum computing (quantum key distribution, Hilbert spaces, qubits, etc..).  It’s a good resource to expand on the knowledge given by the previous entry. It explains quantum cryptography mathematically and through computer science terminology.

Chang, Y., Zhang, S.-B., Yan, L.-L., & Wan, G. (2020). A Quantum secure sharing protocol for Cloud data based on proxy re-encryption. Scientific Reports, 10(1), 1–8. https://doi.org/10.1038/s41598-020-65738-y

           This article goes over a way of encrypting classical computer data through the cloud quantum encryption proxies.  This article is important because cloud encryption is one of the most important factors when it comes to whether classical computers will become obsolete after quantum computers are introduced to the general population. It also shows one of the more interesting ways of utilizing quantum encryption.

Date, P., & Potok, T. (2021). Adiabatic quantum linear regression. Scientific Reports, 11(1), 1-10. https://doi.org/10.1038/s41598-021-01445-6

This article goes over adiabatic quantum computers which are one of the most commonly researched types of quantum computers. I included this article because it includes details about how quantum computers can bypass common encryption methods.

All Content CC-BY.