To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Quantum information provides an advantage for cryptographic tasks in a wide variety of settings. In this chapter we focus on applications involving two parties and look beyond key distribution for other tasks where quantum information can play a role. This includes coin flipping, oblivious transfer, and other primitives in two-party cryptography.
“We revisit the quantum one-time pad and investigate the possibility of shortening the key used for quantum encryption. We first provide an impossibility result, and then show how it can be circumvented in two different ways: using approximate encryption, and by opening the door to the fascinating world of computational security. We also discuss a new possibility for quantum encryption, which is known as certified deletion: this is the possibility for the encrypter of a secret to request that the ciphertext is provably and irrevocably erased.”
Entanglement is one of the most fundamental, and intriguing, properties of quantum mechanics. It is also at the heart of quantum cryptography! In this chapter we start by giving a clear mathematical definition of entanglement. We give two classic applications, to superdense coding and to secret sharing. We then investigate two complementary properties of entanglement that we will use deeply in cryptographic applications. The first is nonlocality, which we investigate through the famous CHSH game. The second is the monogamy of entanglement, which we demonstrate using a three-player version of the CHSH game.
We study our first cryptographic tasks: secure encryption of a quantum state. We describe the classical one-time pad and present its quantum extension, the quantum one-time pad, which achieves perfectly secure quantum encryption. Before studying this task, we extend the mathematical formalism introduced in Chapter 1 by studying density matrices, general measurements on quantum states, and the partial trace operation.
How do we define knowledge, and, crucially for cryptography, ignorance? In this chapter we lay the basis for future security proofs by formalizing the notion of knowledge of a quantum party, such as the memory of an eavesdropper, about a classical piece of information, such as a secret key. For this we introduce an appropriate measure of conditional entropy, the min-entropy, and introduce important tools to bound it using guessing games.
Many physics textbooks take a traditional approach to the demonstration of mathematical relationships and derivations, presenting them in linear order. However, many physical derivations follow a tree-shaped structure with interconnected steps running in parallel, where numerous individual equations are manipulated and combined to reach a final result. Thus, conventional presentation often leads to derivations being spread over several book pages and linked by formula numbering. This title takes a novel and intuitive approach to introductory quantum mechanics by utilising concept maps to address non-linear structures in key mathematical relationships. Concept maps are structures in a form similar to flowcharts where derivations, concepts, and relations are visualised on one page, supported by concise accompanying text on the opposite page. Perfect as a supporting and guiding tool for undergraduates, this book is designed to aid in the understanding and memorisation of key derivations and mathematical concepts in quantum mechanics.
The composition of subsystems in quantum theory is defined in terms of a mathematical operation known as the tensor product. We proceed to explain this concept, and to show how it fits in the Hilbert space calculus.
The propagation method can be used to describe a particle with wave character moving in an arbitrary one-dimensional potential, . This is done by approximating the potential as a series of potential steps. For a particle of energy incident from the left, transmission and reflection at the first step is calculated along with phase accumulated propagating to the step and expressed as a matrix.
The introduction of the Hilbert space as the essential mathematical structure for the formulation of quantum theory was motivated by the following facts.
Given the description of a quantum state in terms of Hilbert space vectors, physical magnitudes (Heisenberg’s matrices) correspond to linear operators on the Hilbert space. A linear operator (or simply, operator) is a linear map of a Hilbert space to itself.