Quantum E-Commerce Glossary

QKD

Quantum Key Distribution (QKD) is a method used in cryptography to securely share encryption keys between two parties. The uniqueness of QKD lies in its foundation on the principles of quantum mechanics, which ensures a high level of security.

QDS

Quantum Digital Signatures (QDS) are a quantum analogue of classical digital signatures, used in cryptographic protocols to ensure the authenticity and integrity of a message. Unlike classical digital signatures, QDS leverages the principles of quantum mechanics, offering potentially higher security guarantees.

RSA

RSA, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman, is a widely-used algorithm for secure data transmission. Introduced in 1977, RSA is a cornerstone of public-key cryptography, which enables secure communication in an open digital environment.

MDI-QKD

Measurement-Device-Independent Quantum Key Distribution (MDI-QKD) is an advanced approach in the field of quantum cryptography. It was proposed to overcome specific vulnerabilities associated with conventional Quantum Key Distribution (QKD) systems.

NIST

The National Institute of Standards and Technology (NIST) is a non-regulatory federal agency within the U.S. Department of Commerce. Established in 1901 as the National Bureau of Standards and later renamed in 1988, NIST's primary mission is to promote innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve the quality of life.

Public Key Cryptography

Public Key Cryptography, also known as asymmetric cryptography, is a fundamental concept in the field of cryptography. It involves the use of two distinct but mathematically related keys — a public key, which is shared openly, and a private key, which is kept secret. This cryptographic method enables secure communication and data exchange over insecure channels, such as the internet.

OTUH

One-Time Universal Hashing (OTUH) refers to a cryptographic concept involving hash functions. It's a variant of universal hashing, tailored for cryptographic applications, particularly in scenarios where a hash function is used only once.

Author
Jonathan Liu
Published
January 15, 2024
Updated
January 15, 2024
Be first to comment
Leave a reply