Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/9788
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chamola, Vinay | - |
dc.date.accessioned | 2023-03-16T10:10:10Z | - |
dc.date.available | 2023-03-16T10:10:10Z | - |
dc.date.issued | 2021-08 | - |
dc.identifier.uri | https://www.sciencedirect.com/science/article/pii/S0140366421002036 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/9788 | - |
dc.description.abstract | Quantum computing is an emerging field that uses the concepts of quantum mechanics to outperform classical computers. Quantum computing finds plethora of applications in the 5G and Beyond networks. It can process data at an exponential rate, which can address numerous business and scientific challenges. In this paper, we provide a detailed review of the field, starting from the most important applications of quantum computers and then diving into the future of cryptography. The major applications of quantum computing include unstructured search, quantum simulation, and optimization. It can also provide improvements in terms of speed and accuracy for some existing technologies, such as machine learning. These technologies have numerous applications in 5G and beyond networks. However, due to such abilities of quantum computing, it can also pose a serious risk to many existing security systems, especially the asymmetric key cryptography schemes. The risk of quantum computing has also influenced the mobile broadband standards to move from a symmetric key cryptography techniques to PKI-based trust model. We also discuss in detail various alternate cryptosystems based on mathematical problems that are believed to be hard even for a quantum computer to solve. In parallel, we discuss the developments in the field of quantum key distribution that makes use of quantum phenomenon to develop a quantum-resistant crypto systems. Such quantum-resistant systems have a great potential in provisioning secure 5G and beyond networks | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.subject | EEE | en_US |
dc.subject | Quantum computing | en_US |
dc.subject | 5G and beyond networks | en_US |
dc.subject | Quantum algorithms | en_US |
dc.subject | Simulation | en_US |
dc.subject | Cryptography | en_US |
dc.title | Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography | en_US |
dc.type | Article | en_US |
Appears in Collections: | Department of Electrical and Electronics Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.