DEVELOPMENT OF POST-QUANTUM CRYPTOGRAPHY ACCOUNTING FOR THE POSSIBILITIES OF SIGNATURE ALGEBRA
DOI:
https://doi.org/10.32782/tnv-tech.2024.6.2Keywords:
post-quantum cryptography, signature algebra, error correction, quantum computing, modern intermediate-scale devices (NISQ)Abstract
It is known that the widespread implementation of quantum technologies is accompanied by significant challenges. The main issue lies in the fragility of quantum states, which can easily change due to noise, decoherence, or inaccuracies in performing quantum operations. This poses high risks to the reliability of quantum computations, especially in the context of modern intermediate-scale devices (NISQ), which have a limited number of qubits and a high level of noise. The article analyzed modern methods of quantum error correction, in particular, the use of signature algebra, its implementation in various protocols, systems, and development prospects. The key role of quantum error correction is identified. Error correction is a fundamental element for ensuring the stability of quantum computing, especially on noisy intermediate-scale (NISQ) devices. The existing error correction method – signature algebra – is analyzed as a universal tool. It is determined that signature algebra has demonstrated its effectiveness in identifying and correcting errors in real time; in checking the stability of quantum states and integrating with modern quantum protocols such as BB84, E91, DI-QKD, BQC, QSS, etc. The development prospects are: further standardization of signature algebra as a tool for testing and error correction; its integration with post-quantum cryptography to ensure data security in the quantum era; in developing new models for NISQ systems, topological codes and quantum networks. The work can be used as a teaching material for students and researchers involved in quantum computing. The code examples used in the work demonstrate how signature algebra is integrated into quantum computing, ensuring the reliability of calculations even in noisy environments. The proposed approaches can be used to create robust quantum systems and protocols for cryptography, communications, and machine learning.
References
Nielsen, M. A., & Chuang, I. L. Quantum Computation and Quantum Information. Cambridge University Press. 2010. 256 p.
Shor, P. W. "Scheme for reducing decoherence in quantum computer memory." Physical Review A, 1995. 52(4), R2493-R2496. 320 p.
Steane, A. M. "Error Correcting Codes in Quantum Theory." Physical Review Letters, 1996. 77(5), P. 793–797.
Bennett, C. H., & Brassard, G. "Quantum Cryptography: Public key distribution and coin tossing." Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984. 498 p.
Gottesman, D. "An Introduction to Quantum Error Correction and Fault-Tolerant Quantum Computation." arXiv preprint quant-ph/0904.2557. 2009. 420 p.
IBM Quantum Experience Documentation. https://docs.quantum.ibm.com/
Google Sycamore Research Papers. https://arxiv.org/abs/2103.03074
Post-Quantum Cryptography: NIST Round 3 Standardization. National Institute of Standards and Technology (NIST), 2022. 320 p.
Raussendorf, R., & Harrington, J. "Fault-tolerant quantum computation with high threshold in two dimensions." Physical Review Letters, 2007. 98(19), 190504, 2007.
Preskill, J. "Quantum Computing in the NISQ era and beyond." Quantum, 2018. No. 2, P.79–87.
Qiskit Textbook. IBM Quantum Team, 2023. https://www.ibm.com/quantum/qiskit
Broadbent, A., Fitzsimons, J., & Kashefi, E. "Universal blind quantum computation." Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2019. No. 3, 400 p.
Ekert, A. K. "Quantum cryptography based on Bell’s theorem." Physical Review Letters, 1991. 67(6), 661–663.
DiVincenzo, D. P. "The Physical Implementation of Quantum Computation." Fortschritte der Physik, 2020. 48(9-11), P. 771–783.