Mathematics of Next-Generation Cryptography for Secure Utilization of Quantum Information
Reference No. | 2022a015 |
---|---|
Type/Category | Grant for Project Research-Short-term Joint Research |
Title of Research Project | Mathematics of Next-Generation Cryptography for Secure Utilization of Quantum Information |
Principal Investigator | Yusuke Aikawa(Information Technology R&D Center, Mitsubishi Electric Corporation・Researcher) |
Research Period |
August 1,2022. ~
August 5,2022. |
Keyword(s) of Research Fields | Quantum Computing, Quantum Cryptographic Protocol, Post-Quantum Cryptography, Lattice-based Cryptography, Multivariate Polynomial Cryptography, Isogeny-based Cryptography |
Abstract for Research Report |
Post-quantum cryptography is cryptography that are expected to be resistant to cryptanalysis by both classical and quantum computers, and is attracting attention as next-generation public key cryptography for keeping communications secure after the realization of large-scale quantum computers. Furthermore, post-quantum cryptography not only realizes secret classical communication, but also has applications to quantum information processing, which were discovered by Mahadev et al. Since then, significant progress has been made in constructing quantum cryptographic protocols based on computational assumptions for classical communication between classical and quantum computers, such as BQP interactive arguments, verification of quantumness, QMA zero-knowledge arguments, and self-testing. However, the current state of the art is that only the construction based on the LWE assumption used in lattice cryptography is known. This study aims to find new applications of post-quantum cryptography to quantum cryptographic protocols by realizing a crossover between experts in lattice-based cryptography, multivariate polynomial cryptography, and isogeny-based cryptography and experts in quantum cryptography and quantum computing. There are two main expected outcomes of this research. The first is the sharing of state-of-the-art knowledge and technology. The second is to construct quantum cryptographic protocols from the isogeny computation assumption or the MQ assumption by applying previous studies of the organizing committee members. This has the potential to construct quantum cryptographic protocols with small data size flowing over classical transmission lines, which is an issue to be considered in applications. |
Organizing Committee Members (Workshop) Participants (Short-term Joint Usage) |
Yasuhiko Ikematsu(Institute of Mathematics for Industry, Kyushu University・Assistant Professor) Hiroshi Onuki(Graduate School of Information Science and Technology, the University of Tokyo・Project Research Associate) Atsushi Takayasu(Graduate School of Information Science and Technology, the University of Tokyo・Lecturer) Yuki Takeuchi(NTT Communication Science Laboratories・Researcher) Ryo Hiromasa(Information Technology R&D Center, Mitsubishi Electric Corporation・Researcher) Hiroki Furue(Graduate School of Information Science and Technology, the University of Tokyo・Ph.D Student) Akihiro Mizutani(Information Technology R&D Center, Mitsubishi Electric Corporation・Researcher) Tomoki Moriya(Graduate School of Information Science and Technology, the University of Tokyo・Ph.D Student) |