Paper 2025/2280

Security Models and Cryptographic Protocols in a Quantum World

Céline Chevalier, CRED, Université Panthéon-Assas Paris II, Paris, France, DIENS, École normale supérieure, PSL University, CNRS, INRIA, Paris, France
Paul Hermouet, Inria, COSMIQ team, France
Quoc-Huy Vu, DVRC, De Vinci Higher Education, Paris, France
Abstract

The emergence of quantum computing has provided new paradigms for cryptography. On the one hand, it poses significant new threats to existing classically cryptographic systems, requiring the community to define new security models that capture what a quantum adversary can do. On the other hand, it gives us new tools to design cryptographic protocols, with weaker assumptions than in the classical world, or even protocols that are impossible classically. In this survey, we first give an overview of new security definitions for classical cryptography, considering quantum adversaries who can either only use local quantum computation (post-quantum security), or even send quantum messages and in particular have access to oracle in superposition (quantum security). We explore these new notions through the examples of commitments, zero-knowledge proofs, encryption, and signatures. Then, we present what is arguably the most famous application of quantum cryptography: quantum key distribution (QKD) protocols that take advantage of unique properties of quantum mechanics to provide secure communication unconditionally. We also explore cryptography beyond QKD, focusing on unclonable cryptography: a family of cryptographic functionalities, built with quantum states, and designed to be resistant to counterfeit by leveraging the “no-cloning” theorem. We examine in particular quantum money, but also the recent notions of unclonable encryption and copy-protection, including related variants. By presenting a comprehensive survey of these topics, this paper aims to provide a thorough understanding of the current landscape and future potential of quantum cryptography.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. Foundations and Trends® in Theoretical Computer Science: Vol. 17, No. 1-2, pp 1–140.
DOI
10.1561/0400000122
Keywords
SurveyQuantum CryptographySecurity ModelsQKDUnclonable Cryptography
Contact author(s)
celine chevalier @ ens fr
paul hermouet @ inria fr
quoc huy vu @ ens fr
History
2025-12-22: approved
2025-12-18: received
See all versions
Short URL
https://ia.cr/2025/2280
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/2280,
      author = {Céline Chevalier and Paul Hermouet and Quoc-Huy Vu},
      title = {Security Models and Cryptographic Protocols in a Quantum World},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/2280},
      year = {2025},
      doi = {10.1561/0400000122},
      url = {https://eprint.iacr.org/2025/2280}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.