Freshly Printed - allow 6 days lead
Quantum Cryptography and Secret-Key Distillation
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key distillation.
Gilles van Assche (Author)
9781107410633, Cambridge University Press
Paperback / softback, published 4 October 2012
276 pages
24.4 x 17 x 1.5 cm, 0.44 kg
Review of the hardback: 'This is a self-contained book, which is accessible to newcomers to the field with a basic background in physical and computer sciences, as well as electrical engineering. Being up-to-date, this book will, at the same time, prove useful to the scientists already involved in quantum cryptography research.' Zentralblatt MATH
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.
1. Introduction
2. Classical cryptography
3. Information theory
4. Quantum information theory
5. Cryptosystems based on quantum key distribution
6. General results on secret-key distillation
7. Privacy amplification using hash functions
8. Reconciliation
9. Non-binary reconciliation
10. The BB84 protocol
11. Protocols with continuous variables
12. Security analysis of quantum key distribution
Appendix 1. Symbols and abbreviations.
Subject Areas: Electronics & communications engineering [TJ], Electrical engineering [THR], Applied physics [PHV], Coding theory & cryptology [GPJ]