Skip to product information
1 of 1
Regular price £89.39 GBP
Regular price £94.00 GBP Sale price £89.39 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 4 days lead

Quantum Cryptography and Secret-Key Distillation

This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key distillation.

Gilles van Assche (Author)

9780521864855, Cambridge University Press

Hardback, published 29 June 2006

276 pages
25.4 x 17.7 x 1.9 cm, 0.715 kg

Review of the hardback: 'This is a self-contained book, which is accessible to newcomers to the field with a basic background in physical and computer sciences, as well as electrical engineering. Being up-to-date, this book will, at the same time, prove useful to the scientists already involved in quantum cryptography research.' Zentralblatt MATH

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

1. Introduction
2. Classical cryptography
3. Information theory
4. Quantum information theory
5. Cryptosystems based on quantum key distribution
6. General results on secret-key distillation
7. Privacy amplification using hash functions
8. Reconciliation
9. Non-binary reconciliation
10. The BB84 protocol
11. Protocols with continuous variables
12. Security analysis of quantum key distribution
Appendix 1. Symbols and abbreviations.

Subject Areas: Electronics & communications engineering [TJ], Electrical engineering [THR], Applied physics [PHV], Coding theory & cryptology [GPJ]

View full details