MEDEIROS, R. A. C.; http://lattes.cnpq.br/2840084735974670; MEDEIROS, Rex Antonio da Costa.
Resumo:
Nowadays, cryptography and authentication play a central role in applications that
manipulates confidential information, like financial transactions, e-commerce, military
applications and digital data protection. The explosive growth of cryptosystems is mostly due to the discovery of the so-called public-kcy cryptosystems. The security of such systcms is based on the intractability of some problems from number theory, like factorization and the discrete logarithm problem. After the formulation of the quantum mechanics, several protocols wcre described in order to solve these problems in time and resources polynomials in their argumente. So, one can conclude that public-key cryptosystems are not secure in a scenario where an eavesdropper makes use of quantum computers. In this work it is discussed the problem of quantum authenticating classical messages. It is proposed a non-interactive hybrid protocol reaching information-theoretical
security, even when an eavesdropper possesses both infinite quantum and classical computei- power. It is presented a mathematical proof that it is always possible to reach a
desirable levei of security. This security is due to the quantum mechanics proprieties
of non-orthogonal quantum states.