Skip to main content
Top
Published in: Quantum Information Processing 1/2014

01-01-2014 | Editorial

Introduction to Special Issue on quantum cryptography

Authors: Gerald Gilbert, Yaakov S. Weinstein

Published in: Quantum Information Processing | Issue 1/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Excerpt

The problem of private communication in the presence of an eavesdropper has been studied for centuries. While various techniques have been explored, a complete solution has been proven possible only 30 years ago. This solution has two basic components: the one-time pad and quantum key distribution (QKD). The one-time pad is an encoding method that can achieve unconditionally secret communications if the sender and receiver share a secret key, a random sequence of symbols with which a message can be encoded. A secret key can be generated (even in the presence of an eavesdropper) using QKD. Together, the one-time pad and QKD provide a completely secret end-to-end cryptosystem: key distribution via QKD followed by encryption of the desired message using the key material as a one-time pad. …

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shannon, C., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, Champaign, IL (1971)MATH Shannon, C., Weaver, W.: The Mathematical Theory of Communication. University of Illinois Press, Champaign, IL (1971)MATH
2.
go back to reference Bennett, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 175 (1984) Bennett, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, 175 (1984)
3.
go back to reference Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum cryptography with coherent states. Phys. Rev. A 51, 1863–1869 (1995)CrossRefADS Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum cryptography with coherent states. Phys. Rev. A 51, 1863–1869 (1995)CrossRefADS
5.
go back to reference Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Lecture Notes in Computer Science vol. 765, pp. 410–423 (1994) Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Lecture Notes in Computer Science vol. 765, pp. 410–423 (1994)
6.
go back to reference Wang, X.W., Xia, L.X., Wang, Z.Y., Zhang, D.Y.: Hierarchical quantum-information splitting. Opt. Commun. 283, 1196–1199 (2010)CrossRefADS Wang, X.W., Xia, L.X., Wang, Z.Y., Zhang, D.Y.: Hierarchical quantum-information splitting. Opt. Commun. 283, 1196–1199 (2010)CrossRefADS
7.
go back to reference Shimuzu, K., Imoto, N.: Communcation channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60, 157–166 (1999)CrossRefADS Shimuzu, K., Imoto, N.: Communcation channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60, 157–166 (1999)CrossRefADS
8.
go back to reference Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy states and two-photon entanglement. J. Phys. A 42, 055305 (2009)MathSciNetCrossRefADSMATH Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy states and two-photon entanglement. J. Phys. A 42, 055305 (2009)MathSciNetCrossRefADSMATH
9.
go back to reference Gottesman, D., Chuang, I.: Quantum digital signatures arXiv:quant-ph/0105032v2 (2001) Gottesman, D., Chuang, I.: Quantum digital signatures arXiv:quant-ph/0105032v2 (2001)
Metadata
Title
Introduction to Special Issue on quantum cryptography
Authors
Gerald Gilbert
Yaakov S. Weinstein
Publication date
01-01-2014
Publisher
Springer US
Published in
Quantum Information Processing / Issue 1/2014
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0719-1

Other articles of this Issue 1/2014

Quantum Information Processing 1/2014 Go to the issue