Design and Analysis of Secure Quantum Communication Schemes - Ri-Gui Zhou

eTEXT

Design and Analysis of Secure Quantum Communication Schemes

By: Ri-Gui Zhou, Xiao-Xue Zhang, Lin-Tao Du

eText | 27 December 2024

At a Glance

eText


$249.00

or 4 interest-free payments of $62.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Read online on
Desktop
Tablet
Mobile

Not downloadable to your eReader or an app

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book provides a comprehensive guide to the design and analysis of quantum secure communication schemes. While quantum computers may provide a platform for arithmetic calculations which threaten classical cryptosystems, the development of quantum information has also brought a corresponding solution: quantum cryptography, which is the basis of quantum secure communication. Quantum secure communication (QSC) uses quantum states for key agreement and information transmission, and uses the basic principles of quantum mechanics to discover eavesdropping behavior, and to ensure the security of information. It can overcome the security risks of classical encryption technology and can securely distribute keys in real time via public channels. Beginning in 1984 with the first conception of quantum key distribution (QKD) based on single-photon polarization states, subsequent innovations include quantum identity authentication (QIA), quantum secret sharing (QSS), quantum direct communication (QDC), quantum key agreement (QKA), quantum private query (QPQ), and quantum network coding (QNC). Each of these schemes is explored in detail based on different environments and structures, along with specific security and feasibility analyses. This book is essential reading for academic researchers and graduate students in quantum science and technology, as well as professionals and engineers in quantum industries and cybersecurity.

Read online on
Desktop
Tablet
Mobile

More in Computer Science

Amazon.com : Get Big Fast - Robert Spector

eBOOK