Quantum private communication:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2010
Beijing Higher Education Press |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIX, 368 S. Ill., graph. Darst. |
ISBN: | 9783642032950 9787040254792 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV036117237 | ||
003 | DE-604 | ||
005 | 20101115 | ||
007 | t | ||
008 | 100412s2010 ad|| |||| 00||| eng d | ||
015 | |a 09N280046 |2 dnb | ||
020 | |a 9783642032950 |c GB. : EUR 96.25 (freier Pr.), sfr 140.00 (freier Pr.) |9 978-3-642-03295-0 | ||
020 | |a 9787040254792 |9 978-7-04-025479-2 | ||
035 | |a (OCoLC)658338814 | ||
035 | |a (DE-599)DNB994909098 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-83 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a ST 152 |0 (DE-625)143596: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a UK 1200 |0 (DE-625)145792: |2 rvk | ||
100 | 1 | |a Zeng, Guihua |e Verfasser |4 aut | |
245 | 1 | 0 | |a Quantum private communication |c Guihua Zeng |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2010 | |
264 | 1 | |a Beijing |b Higher Education Press | |
300 | |a XIX, 368 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Quantenkommunikation |0 (DE-588)4596977-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Quantenkryptologie |0 (DE-588)4596917-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Quantenkommunikation |0 (DE-588)4596977-2 |D s |
689 | 0 | 1 | |a Quantenkryptologie |0 (DE-588)4596917-6 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019007315&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-019007315 |
Datensatz im Suchindex
_version_ | 1804141221300404224 |
---|---|
adam_text | Contents
1
Introduction
.......·............................... 1
1.1
Security Requirements of Communication
............... 1
1.2
Overview of Quantum Private Communication
............ 5
1.3
Private Communication Models
...................... 10
1.3.1
Classic Secure Communication Model
............. 10
1.3.2
Quantum Private Communication Model
........... 11
1.4
History of Quantum Private Communication
............. 13
1.5
Relationship with Other Subjects
..................... 15
1.6
Notations and Conventions
.......................... 17
1.6.1
Random Variables
........................... 17
1.6.2
Cryptosystem and Cipher
...................... 18
References
..............................·........... 19
2
Quantum Security Theory
........................... 23
2.1
Introduction
.................................... 23
2.2
Mathematical Background
........................· ■ 24
2.2.1
Hubert Space
............................... 25
2.2.2
Properties of Hubert Space
..................... 26
2.2.3
Operators
................................. 29
2.2.4
Several Important Operators
......·............. ,42
5.2.
S
Matrices Decomposition
....................· - - 36
2.3
Introduction to Quantum Mechanics
................... 37
2.3.1
Quantum Systems
.........·...............· ■ 37
2.3.2
Dynamic Characteristics of Quantum Systems
....... 40
2.3.3
Information Retrieval of Quantum Systems
......... 42
xiv Contents
2.3.4 Fundament
of
Quantum
Optics..................
45
2.4
Introduction to Information Theory
................... 48
2.4.1
Entropy
................................... 49
2.4.2
Mutual Information
.......................... 50
2.4.3
Quantum
Fano
Inequality
...................... 53
2.5
Introduction to Complexity Theory
.................... 54
2.5.1
Turing Machine
............................. 54
2.5.2
Classic Complexity
........................... 56
2.5.3
Quantum Complexity
......................... 58
2.6
Security Model
................................... 60
2.6.1
Information-theoretic Security
................... 60
2.6.2
Computational Security
....................... 62
2.6.3
Attack Strategy Analysis
...................... 63
References
.......................................... 65
3
Quantum Bits
..................................... 67
3.1
Classic Bits
..................................... 68
3.2
Quantum Bit Definition
............................ 69
3.2.1
Binary Qubit
............................... 70
3.2.2
P-ary Qubit
................................ 70
3.2.3
Composite Qubit
............................ 71
3.3
Quantum Bit Transformation
........·............... 72
3.3.1
Quantum Logic Gates
......................... 73
3.3.2
Quantum Circuits
........................... 82
3.4
Mathematical Property
............................. 83
3.4.1
Bloch Sphere
-----·.......................... 84
3.4.2
Orthogonality of Opposite Points
................ 85
3.4.3
Rotations on Bloch Sphere
..................... 85
3.5
Physical Property
................................ 87
3.5.1
Superposition
............................... 87
3.5.2
Entanglement
· ■ · ·.......................... 89
3.5.3
Distinguishability
............................ 92
3.5.4
Quantum No-cloning
......................... 96
Contente
xv
3.6 Information
Property
.............................. 99
3.6.1
Single Qubit Information
...................... 99
3.6.2 Nonorthogonal Qubits
Information
............... 100
References
.......................................... 100
4
Quantum. Key Distribution
.......................... 103
4.1
Intuition on QKD
................................ 103
4.2
Standard QKD Schemes
............................ 106
4.2.1
BB84 Protocol
.............................. 107
4.2.2
B92 Protocol
............................... 110
4.3
Quantum Communication Model for QKD
............... 112
4.3.1
Quantum Source
............................ 112
4.3.2
Quantum Channel
........................... 114
4.3.3
Quantum Sink
.............................. 117
4.4
Reconciliation
................................... 117
4.4.1
Reconciliation Model
......................... 117
4.4.2
Binary Reconciliation Protocol
.................. 119
4.4.3
Non-Binary Reconciliation Protocol
............... 120
4.5
Privacy Amplification
..............................
12S
4.5.1
Privacy Amplification Principle
.................. 126
4.5.2
Privacy Amplification Techniques
................ 127
4.6
Security Model for QKD
............................ 128
4.6.1
Security Theory
............................. 128
4.6.2
Typical Attack Strategies
..........·........... 131
References
.......................................... 133
5
Quantum Cryptosystem
............................. 135
5.1
Introduction
................·........-.......· · · 136
5.2
QKD-based Cryptosystem
........■................. 137
5.3
Quantum
Vernam
Cipher
......·.................... 139
5.3.1
Classic
Vernam
Algorithm
.....................
ą
5.3.2
Quantum
Vernam
Cipher
.........·............ 141
5.3.3
Private Quantum Channel
..................... 143
xvi Contents
5.3.4
Security
Model.............................. 144
5.4
Typical
Quantum
Vernam
Ciphers
.................... 144
5.4.1
Classic-key-based Quantum
Vernam
Cipher
......... 145
5.4.2
Bell-key-based Quantum
Vernam
Cipher
........... 146
5.4.3
Teleportation
as Quantum
Vernam
Cipher
.......... 151
5.5
Quantum Block Cipher
............................. 152
5.5.1
Theoretical Model
........................... 153
5.5.2
Quantum Block Algorithm for Binary Bits
......... 155
5.6
Quantum Public Key Cryptosystem
................... 158
5.7
Typical Quantum Public-key Algorithms
................ 160
5.7.1
Algorithm based Subset-sum Problem
............. 160
5.7.2
Algorithm based Quantum Coding
............... 162
References
.......................................... 164
6
Quantum Authentication
............................ 167
6.1
Introduction
.................................... 167
6.2
Authentication Theory
............................. 169
6.2.1
Authentication Categories
...................... 169
6.2.2
Security Model
.............................. 172
6.3
Message Authentication Code
........................ 173
6.3.1
Encoding Approach
.......................... 174
6.3.2
Hash Function Approach
...................... 174
6.4
Quantum Identity Authentication
..................... 175
6.4.1
Scheme Description
.......................... 175
6.4.2
Security Analysis
............................ 177
6.4.3
In Imperfect Channel
......................... 183
6.5
Quantum Signature Principle
........................ 186
6.6
Arbitrated Quantum Signature
....................... 189
6.6.1
Algorithm Description
........................ 189
6.6.2
Security Analysis
...................·........ 195
6.7
True Quantum Signature
........................... 196
6.7.1
Algorithm Description
....................· - · ■ 196
6.7.2
Security Analysis
.......................... ■ · 202
Contents xvii
6.8 Quantum Channel
Authentication
..................... 210
References..........................................
213
7 Private
Communication Using
Single Photon Signal...... 217
7.1 Single Photon
Source
..........................· · ■ · 217
7.1.1 Basic
Principle
.............................. 218
7.1.2
Faint
Laser Pulses........................... 219
7.1.3 Single Photon
Source with
Quantum
Dots..........
220
7.1.4
Other
Single Photon
Sources....................
222
7.1.5
Entangled
Photon
Pairs
....................... 223
7.2 Transmission
of Single
Photon Signal.................. 224
7.2.1 Transmission
Mechanism
...................... 224
7.2.2 Quantum
Repeater
........................... 226
7.3 Single Photon
Detection
............................ 230
7.3.1 Photomultiplier
Tubes
........................ 230
7.3.2 Single Photon
Avalanche
Diode.................. 232
7.3.3
Frequency Up-conversion
...................... 237
7.3.4 Quantum
Dots
Single Photon
Detector
............ 239
7.3.5
Superconducting
Single Photon
Detector
........... 240
7.4
Encoding with Discrete Variable Qubits
................ 243
7.4.1
Polarization Modulation
....................... 243
7.4.2
Phase Modulation
........................· · · 244
7.4.3
Frequency Modulation
........................ 246
7.5
QKD with Single Photon Signal
...................... 246
7.5.1
QKD in Optical Fiber
........................ 247
7.5.2
QKD in Free Space
.......................... 250
7.6
QKD with Entangled Photon Pairs
■ -...............- · ■
2S2
7.7
Secret Sharing with Single Photon Signal
............... 254
References
...........·.............................. 257
8
Private Communication Using Continuous Variable Signal
259
8.1
Continuous Variable Signal-
· ·......................· 260
8.1.1
Coherent State Signal-
.··■■·...........■.....· 260
xviii Contents
8.1.2
Squeezed State
Signal.........................264
8.2
Continuous
Variable Signal Transmission................268
8.3
Continuous
Variable Signal
Detection
..................271
8.3.1
Direct Intensity Measurement
...................271
8.3.2
Coherent Detection
..........................273
8.3.3
Homodyne
Detection
.........................274
8.3.4
Imperfect
Homodyne
Detection
..................277
8.4
Encoding with Continuous Variable Qubits
..............279
8.4.1
Continuous Variable Qubits
.................... 279
8.4.2
Amplitude-Phase Encoding Rule
................. 281
8.4.3
PSK Encoding Rule
.......................... 283
8.4.4
Polarization Encoding Rule
..................... 285
8.5
QKD with Continuous Variable Signal
.................. 289
8.5.1
QKD with Squeezed State
..................... 290
8.5.2
QKD with Coherent State
..................... 293
8.5.3
Private Communication with EPR Correlations
...... 297
8.6
Quantum Encryption with Coherent States
.............. 299
8.6.1
Algorithm Descriptions
........................ 299
8.6.2
Polarization Encoding Implementation
............ 304
8.6.3
Phase Encoding Implementation
................. 306
8.7
Quantum Identification with Coherent States
............. 307
References
.......................................... 309
9
Practical Private Communication Systems
.............. 313
9.1
Introduction
.................................... 313
9.2
Transmission Loss
................................ 316
9.2.1
In Single Mode Fiber
......................... 316
9.2.2
In Free Space
......·........................ 321
9.3
Private Communication Over Fiber
.................... 324
9.3.1
Point-to-point Private Communication
............ 325
9.3.2
Private Communication Network
.......·......... 329
9.4
Private Communication Over Free-Space
................ 334
9.4.1
Transmitter, Receiver, and Relay
................ 335
Contents xix
9.4.2 Link
Attenuations...........................
337
9.4.3
Atmosphere-based
Private
Communication
......... 340
9.4.4
Stratosphere-based Private Communication
......... 343
9.4.5
Satellite-based Private Communication
............ 348
9.5
Private Communication over IP Networks
............... 350
9.5.1
IPsec
Extensions with QKD Protocols
............. 350
9.5.2
Quantum Virtual Private Network
............... 353
9.6
Applications in Mobile Communication
................. 354
9.7
Limitations on Availabilities
......................... 357
9.7.1
Limitations on Communication Systems
........... 357
9.7.2
Limitations on Security
....................... 359
References
.......................................... 360
Index
............................................... 365
|
any_adam_object | 1 |
author | Zeng, Guihua |
author_facet | Zeng, Guihua |
author_role | aut |
author_sort | Zeng, Guihua |
author_variant | g z gz |
building | Verbundindex |
bvnumber | BV036117237 |
classification_rvk | ST 152 ST 276 UK 1200 |
ctrlnum | (OCoLC)658338814 (DE-599)DNB994909098 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Physik Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01599nam a22004098c 4500</leader><controlfield tag="001">BV036117237</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101115 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100412s2010 ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09N280046</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642032950</subfield><subfield code="c">GB. : EUR 96.25 (freier Pr.), sfr 140.00 (freier Pr.)</subfield><subfield code="9">978-3-642-03295-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9787040254792</subfield><subfield code="9">978-7-04-025479-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)658338814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB994909098</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 152</subfield><subfield code="0">(DE-625)143596:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">UK 1200</subfield><subfield code="0">(DE-625)145792:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zeng, Guihua</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Quantum private communication</subfield><subfield code="c">Guihua Zeng</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing</subfield><subfield code="b">Higher Education Press</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 368 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Quantenkommunikation</subfield><subfield code="0">(DE-588)4596977-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Quantenkryptologie</subfield><subfield code="0">(DE-588)4596917-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Quantenkommunikation</subfield><subfield code="0">(DE-588)4596977-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Quantenkryptologie</subfield><subfield code="0">(DE-588)4596917-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019007315&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-019007315</subfield></datafield></record></collection> |
id | DE-604.BV036117237 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:12:25Z |
institution | BVB |
isbn | 9783642032950 9787040254792 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-019007315 |
oclc_num | 658338814 |
open_access_boolean | |
owner | DE-29T DE-83 |
owner_facet | DE-29T DE-83 |
physical | XIX, 368 S. Ill., graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer Higher Education Press |
record_format | marc |
spelling | Zeng, Guihua Verfasser aut Quantum private communication Guihua Zeng Heidelberg [u.a.] Springer 2010 Beijing Higher Education Press XIX, 368 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Quantenkommunikation (DE-588)4596977-2 gnd rswk-swf Quantenkryptologie (DE-588)4596917-6 gnd rswk-swf Quantenkommunikation (DE-588)4596977-2 s Quantenkryptologie (DE-588)4596917-6 s DE-604 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019007315&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Zeng, Guihua Quantum private communication Quantenkommunikation (DE-588)4596977-2 gnd Quantenkryptologie (DE-588)4596917-6 gnd |
subject_GND | (DE-588)4596977-2 (DE-588)4596917-6 |
title | Quantum private communication |
title_auth | Quantum private communication |
title_exact_search | Quantum private communication |
title_full | Quantum private communication Guihua Zeng |
title_fullStr | Quantum private communication Guihua Zeng |
title_full_unstemmed | Quantum private communication Guihua Zeng |
title_short | Quantum private communication |
title_sort | quantum private communication |
topic | Quantenkommunikation (DE-588)4596977-2 gnd Quantenkryptologie (DE-588)4596917-6 gnd |
topic_facet | Quantenkommunikation Quantenkryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=019007315&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT zengguihua quantumprivatecommunication |