Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
mNo edit summary |
||
Line 26: | Line 26: | ||
==Properties== | ==Properties== | ||
All QDS protocols are divided into two phases, distribution and messaging. Distribution phase enables sender to generate private keys (kept secret with sender) and public keys (information distributed to recipients) while messaging phase enables exchange of messages using the above keys. For | All QDS protocols are divided into two phases, distribution and messaging. Distribution phase enables sender to generate private keys (kept secret with sender) and public keys (information distributed to recipients) while messaging phase enables exchange of messages using the above keys. For simplicity, most protocols use the case of three parties, one sender (Seller) and two recipients (Buyer and Verifier) exchanging one-bit classical messages signed by Quantum Digital Signatures (QDS). | ||
*A QDS scheme is correct if a message signed by a genuine sender is accepted by a recipient with unit probability. | *A QDS scheme is correct if a message signed by a genuine sender is accepted by a recipient with unit probability. | ||
Line 35: | Line 35: | ||
==Further Information== | ==Further Information== | ||
Quantum Digital Signatures provide unconditional security, not relying on any computational assumption which is its basic advantage over the classical schemes. However, over time classical unconditionally secure digital signature schemes have been | Quantum Digital Signatures provide unconditional security, not relying on any computational assumption which is its basic advantage over the classical schemes. However, over time classical unconditionally secure digital signature schemes have been realised. These classical protocols take some assumptions like trusted omnipotent (one who distributes everyone signatures) thus giving one party extra power, or authenticated message broadcast. QDS does not require any such assumption. Yet, the low key rate could render QDS impractical over classical digital signature schemes. At the same time, there exist post quantum secure Digital signature schemes based on hash-key cryptography which cannot be broken by quantum computers. Still, if someone requires a lifetime security without the above mentioned assumptions, QDS is the answer. Areas to improve QDS could be addressing the key rate and scalability of key length with length of message. | ||
===Review Papers=== | ===Review Papers=== |