Quantum Cryptography
نویسنده
چکیده
References: Scarani = Valerio Scarani et al. Rev. Mod. Phys. 81 (2009) 1301-1350. Lengthy review with much valuable material. QCQI = Quantum Computation and Quantum Information by Nielsen and Chuang (Cambridge, 2000), Sec. 12.6 through 12.6.3. The material becomes more and more difficult as Sec. 12.6 advances Stinson = D. R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995). Contains considerable material on classical cryptography H. K. Lo and N. Lutkenhaus, ”Quantum cryptography: from theory to practice,” (2007). arXiv:quant-ph/0702202. A short and very readable introduction. H. K. Lo, Y. Zhao, ”Quantum cryptography,” (2009). arXiv:0803.2507v4. A longer review article
منابع مشابه
Design of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملDesign of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملEnhancement of Network Security Techniques using Quantum Cryptography
Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography, which in theory can effic...
متن کاملThe Impact of Quantum Computing on Present Cryptography
The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...
متن کاملSecret Key Generation and Eavesdropping detection using Quantum Cryptography
Quantum Cryptography is based upon the use of quantum effects and extends those effects for conventional cryptographic methods. The two major advantages of quantum cryptography over conventional cryptography are true random secret key generation and eavesdropping detection. Quantum cryptography has been developed which promises more secure communication than any existing technique and cannot be...
متن کاملQuantum Cryptography: Pitfalls and Assets
Secure transmission of messages has been a major goal since ages, for which cryptography is used. Cryptography is a mathematical techniques used for secure communication. Classical cryptography is traditional means that comprises mathematical functions to restrict eavesdropping problem in communication. Quantum cryptography is a new approach towards secure communication which uses phenomenon of...
متن کامل