您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。[量子经济发展联盟]:量子技术在金融消息传递中的应用 - 发现报告

量子技术在金融消息传递中的应用

AI智能总结
查看更多
量子技术在金融消息传递中的应用

July 2024 QED-C Member ProprietaryQED-C Member Proprietary Acknowledgments Thank you to the Quantum Economic Development Consortium (QED-C®) Use CasesTechnical Advisory Committee. Additionally, this report would not have been possiblewithout the leadership and contributions of the members of the workshop organizingcommittee. Peter Bordow, Wells FargoScott Buchholz, DeloitteJohn Buselli, IBMTerry Cronin, ToshibaCarl Dukatz, AccentureMehdi Namazi, QunnectSimon Patkovic, ID Quantique Bruno Huttner, ID QuantiqueJohn Prisco, Safe QuantumTahereh Rezaei, Wells FargoKeeper Sharkey, ODE, L3CCatherine Simondi, ID QuantiqueColin Soutar, DeloitteJeff Stapleton,Wells Fargo Thank you to Accenture for providing workshop facilities. The National Institute of Standards and Technology (NIST)provided financial support for thisstudy. About QED-C QED-C is an industry-driven consortium managed by SRI International. With a diversemembership representing industry, academia, government, and other stakeholders, theconsortium seeks to enable and grow the quantum industry and associated supply chain.For more about QED-C, visit our website at quantumconsortium.org. Suggested Citation Quantum Economic Development Consortium (QED-C®).Quantum Technology for SecuringFinancial Messaging. Arlington, VA. May 2024. https://quantumconsortium.org/financial24. Government Purpose Rights Agreement No.: OTA-2019-0001Contractor Name: SRI InternationalContractor Address: 333 Ravenswood Avenue, Menlo Park, CA 94025Expiration Date: PerpetualUse, duplication, or disclosure is subject to the restrictions as stated in the Agreementbetween NIST and SRI. Non-US Government Notice Copyright © 2024 SRIInternational. All rights reserved. DisclaimerThis publication of the Quantum Economic Development Consortium, which is managed by SRI International, does not necessarily represent the views of SRI International, any individualmember of QED-C, or any government agency. Table of Contents Executive Summary .........................................................................................................................................................iiIntroduction............................................................................................................................................................................ 3Quantum-Resistant Security Approaches ......................................................................................................6Current Cryptography Tools.................................................................................................................................6Post-Quantum Cryptography ............................................................................................................................. 7Quantum Key Distribution...................................................................................................................................... 9Combined Methods...................................................................................................................................................11Current and Emergent Technologies.......................................................................................................... 12Key Themes of Use Cases........................................................................................................................................14Theme 1: Current Threat .......................................................................................................................................14Theme 2: Combined Systems...........................................................................................................................15Theme 3: Quantum-Resistant Security as a Service .......................................................................16Impact and Feasibility of Selected Use Cases .......................................................................................... 17Classification..................................................................................................................................................................19Implementation Details of Selected Use Cases ..................................................................................... 20Cross-Border Transactions................................................................................................................................. 20Physical Infrastructure............................................................................................................................................ 21Quantum Security as a Service........................................................................................................................22Post-Quantum TLS: Connecting Customers .........................................................................................23Quantum Communications Service Provider ......................................................