Quantum Cryptography and Secret-Key Distillation

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Author(s): Gilles Van Assche
Edition: 1
Publisher: Cambridge University Press
Year: 2006

Language: English
Pages: 276
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;

Contents......Page 6
Foreword......Page 10
Preface......Page 12
Acknowledgments......Page 14
Introduction......Page 16
Classical cryptography......Page 30
Information theory......Page 50
Quantum information theory......Page 64
Cryptosystems based on quantum key distribution......Page 78
General results on secret-key distillation......Page 100
Privacy ampli cation using universal families of hash functions......Page 116
Reconciliation......Page 128
Non-binary reconciliation......Page 156
The BB84 protocol......Page 174
Protocols with continuous variables......Page 198
Security analysis of quantum key distribution......Page 220
Appendix Symbols and abbreviations......Page 260
Bibliography......Page 264
Index......Page 274