Quantum Cryptography

نویسنده

  • Robert B. Griffiths
چکیده

References: Scarani = Valerio Scarani et al. Rev. Mod. Phys. 81 (2009) 1301-1350. Lengthy review with much valuable material. QCQI = Quantum Computation and Quantum Information by Nielsen and Chuang (Cambridge, 2000), Sec. 12.6 through 12.6.3. The material becomes more and more difficult as Sec. 12.6 advances Stinson = D. R. Stinson, Cryptography: Theory and Practice (CRC Press, 1995). Contains considerable material on classical cryptography H. K. Lo and N. Lutkenhaus, ”Quantum cryptography: from theory to practice,” (2007). arXiv:quant-ph/0702202. A short and very readable introduction. H. K. Lo, Y. Zhao, ”Quantum cryptography,” (2009). arXiv:0803.2507v4. A longer review article

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of low power random number generators for quantum-dot cellular automata

Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA.  Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...

متن کامل

Design of low power random number generators for quantum-dot cellular automata

Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA.  Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...

متن کامل

Enhancement of Network Security Techniques using Quantum Cryptography

Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography, which in theory can effic...

متن کامل

The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor’s ...

متن کامل

Secret Key Generation and Eavesdropping detection using Quantum Cryptography

Quantum Cryptography is based upon the use of quantum effects and extends those effects for conventional cryptographic methods. The two major advantages of quantum cryptography over conventional cryptography are true random secret key generation and eavesdropping detection. Quantum cryptography has been developed which promises more secure communication than any existing technique and cannot be...

متن کامل

Quantum Cryptography: Pitfalls and Assets

Secure transmission of messages has been a major goal since ages, for which cryptography is used. Cryptography is a mathematical techniques used for secure communication. Classical cryptography is traditional means that comprises mathematical functions to restrict eavesdropping problem in communication. Quantum cryptography is a new approach towards secure communication which uses phenomenon of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003