Looking for an examination copy?
If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact firstname.lastname@example.org providing details of the course you are teaching.
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.Read more
- The author provides extensive coverage of secret-key distillation techniques, which is covered in less detail in other literature
- This self-contained and multi-disciplinary book brings together the physical aspects of the process with information and coding theory
- The book not only addresses the theory of quantum cryptography but also the practical issues of physical implementation
Reviews & endorsements
Review of the hardback: 'This is a self-contained book, which is accessible to newcomers to the field with a basic background in physical and computer sciences, as well as electrical engineering. Being up-to-date, this book will, at the same time, prove useful to the scientists already involved in quantum cryptography research.' Zentralblatt MATH
Not yet reviewed
Be the first to review
Review was not posted due to profanity×
- Date Published: July 2006
- format: Hardback
- isbn: 9780521864855
- length: 276 pages
- dimensions: 254 x 177 x 19 mm
- weight: 0.715kg
- availability: In stock
Table of Contents
2. Classical cryptography
3. Information theory
4. Quantum information theory
5. Cryptosystems based on quantum key distribution
6. General results on secret-key distillation
7. Privacy amplification using hash functions
9. Non-binary reconciliation
10. The BB84 protocol
11. Protocols with continuous variables
12. Security analysis of quantum key distribution
Appendix 1. Symbols and abbreviations.
Welcome to the resources site
Here you will find free-of-charge online materials to accompany this book. The range of materials we provide across our academic and higher education titles are an integral part of the book package whether you are a student, instructor, researcher or professional.
Find resources associated with this titleYour search for '' returned .
Type Name Unlocked * Format Size
*This title has one or more locked files and access is given only to instructors adopting the textbook for their class. We need to enforce this strictly so that solutions are not made available to students. To gain access to locked resources you either need first to sign in or register for an account.
These resources are provided free of charge by Cambridge University Press with permission of the author of the corresponding work, but are subject to copyright. You are permitted to view, print and download these resources for your own personal use only, provided any copyright lines on the resources are not removed or altered in any way. Any other use, including but not limited to distribution of the resources in modified form, or via electronic or other media, is strictly prohibited unless you have permission from the author of the corresponding work and provided you give appropriate acknowledgement of the source.
If you are having problems accessing these resources please email email@example.com
Sorry, this resource is locked
Please register or sign in to request access. If you are having problems accessing these resources please email firstname.lastname@example.orgRegister Sign in
You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.Continue ×