Quantum Cryptography and Secret-Key Distillation by Gilles van AsscheQuantum Cryptography and Secret-Key Distillation by Gilles van Assche

Quantum Cryptography and Secret-Key Distillation

byGilles van Assche

Paperback | October 4, 2012

Pricing and Purchase Info


Earn 359 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.
Title:Quantum Cryptography and Secret-Key DistillationFormat:PaperbackDimensions:276 pages, 9.61 × 6.69 × 0.59 inPublished:October 4, 2012Publisher:Cambridge University PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1107410630

ISBN - 13:9781107410633


Table of Contents

1. Introduction; 2. Classical cryptography; 3. Information theory; 4. Quantum information theory; 5. Cryptosystems based on quantum key distribution; 6. General results on secret-key distillation; 7. Privacy amplification using hash functions; 8. Reconciliation; 9. Non-binary reconciliation; 10. The BB84 protocol; 11. Protocols with continuous variables; 12. Security analysis of quantum key distribution; Appendix 1. Symbols and abbreviations.

Editorial Reviews

Review of the hardback: 'This is a self-contained book, which is accessible to newcomers to the field with a basic background in physical and computer sciences, as well as electrical engineering. Being up-to-date, this book will, at the same time, prove useful to the scientists already involved in quantum cryptography research.' Zentralblatt MATH