Quantum Cryptography and Secret-Key Distillation

Quantum Cryptography and Secret-Key Distillation
Author: Gilles van Assche
Publisher: Cambridge University Press
Total Pages: 275
Release: 2006-06-29
Genre: Computers
ISBN: 0521864852

This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus on secret-key distillation. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Quantum Cryptography

Quantum Cryptography
Author: Federico Grasselli
Publisher: Springer Nature
Total Pages: 163
Release: 2021-01-04
Genre: Science
ISBN: 3030643603

Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn’t disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography.

Theory and Practice of Cryptography and Network Security Protocols and Technologies

Theory and Practice of Cryptography and Network Security Protocols and Technologies
Author: Jaydip Sen
Publisher: BoD – Books on Demand
Total Pages: 160
Release: 2013-07-17
Genre: Computers
ISBN: 9535111760

In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities.

Error-Correcting Codes, Finite Geometries and Cryptography

Error-Correcting Codes, Finite Geometries and Cryptography
Author: Aiden A. Bruen
Publisher: American Mathematical Soc.
Total Pages: 255
Release: 2010-09-03
Genre: Mathematics
ISBN: 0821849565

This interdisciplinary volume contains papers from both a conference and special session on Error-Control Codes, Information Theory and Applied Cryptography. The conference was held at the Fields Institute in Toronto, On, Canada from December 5-6, 2007, and the special session was held at the Canadian Mathematical Society's winter meeting in London, ON, Canada from December 8-10, 2007. The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are new contributions on privacy reconciliation, resilient functions, cryptographic hash functions, and new work on quantum coins. Related original work in finite geometries concerns two-weight codes coming from partial spreads, (0, 1) matrices with forbidden configurations, Andre embeddings, and representations of projective spaces in affine planes. Great care has been taken to ensure that high expository standards are met by the papers in this volume. Accordingly, the papers are written in a user-friendly format. The hope is that this volume will be of interst and of benefit both to the experienced and to newcomers alike.

Advanced Technologies of Quantum Key Distribution

Advanced Technologies of Quantum Key Distribution
Author: Sergiy Gnatyuk
Publisher: BoD – Books on Demand
Total Pages: 214
Release: 2018-05-30
Genre: Computers
ISBN: 1789231965

This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail their results of scientific research, which is divided into two sections - Modern QKD Technologies and Quantum Channel Construction. It will be useful for researchers, engineers, graduates, and doctoral students working in quantum cryptography and information security-related areas.

Quantum Information Theory

Quantum Information Theory
Author: Mark Wilde
Publisher: Cambridge University Press
Total Pages: 673
Release: 2013-04-18
Genre: Computers
ISBN: 1107034256

A self-contained, graduate-level textbook that develops from scratch classical results as well as advances of the past decade.

Classical and Quantum Information Theory

Classical and Quantum Information Theory
Author: Emmanuel Desurvire
Publisher: Cambridge University Press
Total Pages: 714
Release: 2009-02-19
Genre: Computers
ISBN: 0521881714

This complete overview of classical and quantum information theory employs an informal yet accurate approach, for students, researchers and practitioners.

Applied Quantum Cryptography

Applied Quantum Cryptography
Author: Christian Kollmitzer
Publisher: Springer Science & Business Media
Total Pages: 220
Release: 2010-02-28
Genre: Computers
ISBN: 3642048293

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography – or better Quantum Key Distribution – was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone toward a QKD technology was a large research and dev- opment project funded by the European Commission that aimed at combining qu- tum physics with complementary technologies that are necessary to create a tech- cal solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future cryptography.

Physical-Layer Security

Physical-Layer Security
Author: Matthieu Bloch
Publisher: Cambridge University Press
Total Pages: 347
Release: 2011-09-22
Genre: Technology & Engineering
ISBN: 1139496298

This complete guide to physical-layer security presents the theoretical foundations, practical implementation, challenges and benefits of a groundbreaking new model for secure communication. Using a bottom-up approach from the link level all the way to end-to-end architectures, it provides essential practical tools that enable graduate students, industry professionals and researchers to build more secure systems by exploiting the noise inherent to communications channels. The book begins with a self-contained explanation of the information-theoretic limits of secure communications at the physical layer. It then goes on to develop practical coding schemes, building on the theoretical insights and enabling readers to understand the challenges and opportunities related to the design of physical layer security schemes. Finally, applications to multi-user communications and network coding are also included.