注册 登录 进入教材巡展 进入在线书城
#
  • #

出版时间:2010-01

出版社:高等教育出版社

获奖信息:中国图书对外推广计划  

以下为《量子保密通信(英文版)》的配套数字资源,这些资源在您购买图书后将免费附送给您:
  • 高等教育出版社
  • 9787040254792
  • 1版
  • 227395
  • 45246562-8
  • 精装
  • 特殊
  • 2010-01
  • 450
  • 368
  • 工学
  • 计算机科学与技术
  • TN918.6
  • 计算机、信息、电子类
  • 研究生(硕士、EMBA、MBA、MPA、博士)
内容简介

Quantum Private Communication covers the fundamentals of the areas of secure communication, quantum cryptography, quantum communication, and their physical implementation with applications. The book appears in a timely manner for an emerging field at the crossroad of classic private communication and quantum physics.

Graduate students and scientists alike in communication engineering,computer science, electronic engineering, physics and mathematics will benefit from the book.

目录

 Front Matter
 1 Introduction
  1.1 Security Requirements of Communication
  1.2 Overview of Quantum Private Communication
  1.3 Private Communication Models
   1.3.1 Classic Secure Communication Model
   1.3.2 Quantum Private Communication Model
  1.4 History of Quantum Private Communication
  1.5 Relationship with Other Subjects
  1.6 Notations and Conventions
   1.6.1 Random Variables
   1.6.2 Cryptosystem and Cipher
  References
 2 Quantum Security Theory
  2.1 Introduction
  2.2 Mathematical Background
   2.2.1 Hilbert Space
   2.2.2 Properties of Hilbert Space
   2.2.3 Operators
   2.2.4 Several Important Operators
   2.2.5 Matrices Decomposition
  2.3 Introduction to Quantum Mechanics
   2.3.1 Quantum Systems
   2.3.2 Dynamic Characteristics of Quantum Systems
   2.3.3 Information Retrieval of Quantum Systems
   2.3.4 Fundament of Quantum Optics
  2.4 Introduction to Information Theory
   2.4.1 Entropy
   2.4.2 Mutual Information
   2.4.3 Quantum Fano Inequality
  2.5 Introduction to Complexity Theory
   2.5.1 Turing Machine
   2.5.2 Classic Complexity
   2.5.3 Quantum Complexity
  2.6 Security Model
   2.6.1 Information-theoretic Security
   2.6.2 Computational Security
   2.6.3 Attack Strategy Analysis
  References
 3 Quantum Bits
  3.1 Classic Bits
  3.2 Quantum Bit Definition
   3.2.1 Binary Qubit
   3.2.2 $P$-ary Qubit
   3.2.3 Composite Qubit
  3.3 Quantum Bit Transformation
   3.3.1 Quantum Logic Gates
   3.3.2 Quantum Circuits
  3.4 Mathematical Property
   3.4.1 Bloch Sphere
   3.4.2 Orthogonality of Opposite Points
   3.4.3 Rotations on Bloch Sphere
  3.5 Physical Property
   3.5.1 Superposition
   3.5.2 Entanglement
   3.5.3 Distinguishability
   3.5.4 Quantum No-cloning
  3.6 Information Property
   3.6.1 Single Qubit Information
   3.6.2 Nonorthogonal Qubits Information
  References
 4 Quantum Key Distribution
  4.1 Intuition on QKD
  4.2 Standard QKD Schemes
   4.2.1 BB84 Protocol
   4.2.2 B92 Protocol
  4.3 Quantum Communication Model for QKD
   4.3.1 Quantum Source
   4.3.2 Quantum Channel
   4.3.3 Quantum Sink
  4.4 Reconciliation
   4.4.1 Reconciliation Model
   4.4.2 Binary Reconciliation Protocol
   4.4.3 Non-Binary Reconciliation Protocol
  4.5 Privacy Amplification
   4.5.1 Privacy Amplification Principle
   4.5.2 Privacy Amplification Techniques
  4.6 Security Model for QKD
   4.6.1 Security Theory
   4.6.2 Typical Attack Strategies
  References
 5 Quantum Cryptosystem
  5.1 Introduction
  5.2 QKD-based Cryptosystem
  5.3 Quantum Vernam Cipher
   5.3.1 Classic Vernam Algorithm
   5.3.2 Quantum Vernam Cipher
   5.3.3 Private Quantum Channel
   5.3.4 Security Model
  5.4 Typical Quantum Vernam Ciphers
   5.4.1 Classic-key-based Quantum Vernam Cipher
   5.4.2 Bell-key-based Quantum Vernam Cipher
   5.4.3 Teleportation as Quantum Vernam Cipher
  5.5 Quantum Block Cipher
   5.5.1 Theoretical Model
   5.5.2 Quantum Block Algorithm for Binary Bits
  5.6 Quantum Public Key Cryptosystem
  5.7 Typical Quantum Public-key Algorithms
   5.7.1 Algorithm based Subset-sum Problem
   5.7.2 Algorithm based Quantum Coding
  References
 6 Quantum Authentication
  6.1 Introduction
  6.2 Authentication Theory
   6.2.1 Authentication Categories
   6.2.2 Security Model
  6.3 Message Authentication Code
   6.3.1 Encoding Approach
   6.3.2 Hash Function Approach
  6.4 Quantum Identity Authentication
   6.4.1 Scheme Description
   6.4.2 Security Analysis
   6.4.3 In Imperfect Channel
  6.5 Quantum Signature Principle
  6.6 Arbitrated Quantum Signature
   6.6.1 Algorithm Description
   6.6.2 Security Analysis
  6.7 True Quantum Signature
   6.7.1 Algorithm Description
   6.7.2 Security Analysis
  6.8 Quantum Channel Authentication
  References
 7 Private Communication Using Single Photon Signal
  7.1 Single Photon Source
   7.1.1 Basic Principle
   7.1.2 Faint Laser Pulses
   7.1.3 Single Photon Source with Quantum Dots
   7.1.4 Other Single Photon Sources
   7.1.5 Entangled Photon Pairs
  7.2 Transmission of Single Photon Signal
   7.2.1 Transmission Mechanism
   7.2.2 Quantum Repeater
  7.3 Single Photon Detection
   7.3.1 Photomultiplier Tubes
   7.3.2 Single Photon Avalanche Diode
   7.3.3 Frequency Up-conversion
   7.3.4 Quantum Dots Single Photon Detector
   7.3.5 Superconducting Single Photon Detector
  7.4 Encoding with Discrete Variable Qubits
   7.4.1 Polarization Modulation
   7.4.2 Phase Modulation
   7.4.3 Frequency Modulation
  7.5 QKD with Single Photon Signal
   7.5.1 QKD in Optical Fiber
   7.5.2 QKD in Free Space
  7.6 QKD with Entangled Photon Pairs
  7.7 Secret Sharing with Single Photon Signal
  References
 8 Private Communication Using Continuous Variable Signal
  8.1 Continuous Variable Signal
   8.1.1 Coherent State Signal
   8.1.2 Squeezed State Signal
  8.2 Continuous Variable Signal Transmission
  8.3 Continuous Variable Signal Detection
   8.3.1 Direct Intensity Measurement
   8.3.2 Coherent Detection
   8.3.3 Homodyne Detection
   8.3.4 Imperfect Homodyne Detection
  8.4 Encoding with Continuous Variable Qubits
   8.4.1 Continuous Variable Qubits
   8.4.2 Amplitude-Phase Encoding Rule
   8.4.3 PSK Encoding Rule
   8.4.4 Polarization Encoding Rule
  8.5 QKD with Continuous Variable Signal
   8.5.1 QKD with Squeezed State
   8.5.2 QKD with Coherent State
   8.5.3 Private Communication with EPR Correlations
  8.6 Quantum Encryption with Coherent States
   8.6.1 Algorithm Descriptions
   8.6.2 Polarization Encoding Implementation
   8.6.3 Phase Encoding Implementation
  8.7 Quantum Identification with Coherent States
  References
 9 Practical Private Communication Systems
  9.1 Introduction
  9.2 Transmission Loss
   9.2.1 In Single Mode Fiber
   9.2.2 In Free Space
  9.3 Private Communication Over Fiber
   9.3.1 Point-to-point Private Communication
   9.3.2 Private Communication Network
  9.4 Private Communication Over Free-Space
   9.4.1 Transmitter, Receiver, and Relay
   9.4.2 Link Attenuations
   9.4.3 Atmosphere-based Private Communication
   9.4.4 Stratosphere-based Private Communication
   9.4.5 Satellite-based Private Communication
  9.5 Private Communication over IP Networks
   9.5.1 IPsec Extensions with QKD Protocols
   9.5.2 Quantum Virtual Private Network
  9.6 Applications in Mobile Communication
  9.7 Limitations on Availabilities
   9.7.1 Limitations on Communication Systems
   9.7.2 Limitations on Security
  References
 Index