Quantum Private Communication (English)
曾贵华
- 出版商: 高等教育
- 出版日期: 2010-01-01
- 定價: $354
- 售價: 8.5 折 $301
- 語言: 英文
- 頁數: 368
- 裝訂: 精装
- ISBN: 7040254794
- ISBN-13: 9787040254792
-
相關分類:
英文 English、量子 Quantum
立即出貨 (庫存=1)
買這商品的人也買了...
-
$2,500$2,375 -
$980$931 -
$790$774 -
$680$537 -
$780$616 -
$380$300 -
$590$502 -
$399$315 -
$199$179 -
$500$395 -
$420$357 -
$390$304 -
$450$383 -
$380$300 -
$560$437 -
$350$315 -
$352Python 密碼學編程
-
$580$452 -
$580$493 -
$580$458 -
$380$300 -
$800$600 -
$800$600 -
$560$442 -
$380$323
相關主題
商品描述
<內容簡介>
Quantum Private Communication covers the fundamentals of the areas of secure communication, quantum cryptography, quantum communication, and their physical implementation with applications. The book appears in a timely manner for an emerging field at the crossroad of classic private communication and quantum physics. Graduate students and scientists alike in communication engineering,computer science, electronic engineering, physics and mathematics will benefit from the book.
<目錄>
1 Introduction
1.1 Security Requirements of Communication
1.2 Overview of Quantum Private Communication
1.3 Private Communication Models
1.3.1 Classic Secure Communication Model
1.3.2 Quantum Private Communication Model
1.4 History of Quantum Private Communication
1.5 Relationship with Other Subjects
1.6 Notations and Conventions
1.6.1 Random Variables
1.6.2 Cryptosystem and Cipher
References
2 Quantum Security Theory
2.1 Introduction
2.2 Mathematical Background
2.2.1 Hilbert Space
2.2.2 Properties of Hilbert Space
2.2.3 Operators
2.2.4 Several Important Operators
2.2.5 Matrices Decomposition
2.3 Introduction to Quantum Mechanics
2.3.1 Quantum Systems
2.3.2 Dynamic Characteristics of Quantum Systems
2.3.3 Information Retrieval of Quantum Systems
2.3.4 Fundament of Quantum Optics
2.4 Introduction to Information Theory
2.4.1 Entropy
2.4.2 Mutual Information
2.4.3 Quantum Fano Inequality
2.5 Introduction to Complexity Theory
2.5.1 Turing Machine
2.5.2 Classic Complexity
2.5.3 Quantum Complexity
2.6 Security Model
2.6.1 Information-theoretic Security
2.6.2 Computational Security
2.6.3 Attack Strategy Analysis
References
3 Quantum Bits
3.1 Classic Bits
3.2 Quantum Bit Definition
3.2.1 Binary Qubit
3.2.2 P-ary Qubit
3.2.3 Composite Qubit
3.3 Quantum Bit Transformation
3.3.1 Quantum Logic Gates
3.3.2 Quantum Circuits
3.4 Mathematical Property
3.4.1 Bloch Sphere
3.4.2 Orthogonality of Opposite Points
3.4.3 Rotations on Bloch Sphere
3.5 Physical Property
3.5.1 Superposition
3.5.2 Entanglement
3.5.3 Distinguishability
3.5.4 Quantum No-cloning
3.6 Information Property
3.6.1 Single Qubit Information
3.6.2 Nonorthogonal Qubits Information
References
4 Quantum Key Distribution
4.1 Intuition on QKD
4.2 Standard QKD Schemes
4.2.1 BB84 Protocol
4.2.2 B92 Protocol
4.3 Quantum Communication Model for QKD
4.3.1 Quantum Source
4.3.2 Quantum Channel
4.3.3 Quantum Sink
4.4 Reconciliation
4.4.1 Reconciliation Model
4.4.2 Binary Reconciliation Protocol
4.4.3 Non-Binary Reconciliation Protocol
4.5 Privacy Amplification
4.5.1 Privacy Amplification Principle
4.5.2 Privacy Amplification Techniques
4.6 Security Model for QKD
4.6.1 Security Theory
4.6.2 Typical Attack Strategies
References
5 Quantum Cryptosystem
5.1 Introduction
5.2 QKD-based Cryptosystem
5.3 Quantum Vernam Cipher
5.3.1 Classic Vernam Algorithm
5.3.2 Quantum Vernam Cipher
5.3.3 Private Quantum Channel
5.3.4 Security Model
5.4 Typical Quantum Vernam Ciphers
5.4.1 Classic-key-based Quantum Vernam Cipher
5.4.2 Bell-key-based Quantum Vernam Cipher
5.4.3 Teleportation as Quantum Vernam Cipher
5.5 Quantum Block Cipher
5.5.1 Theoretical Model
5.5.2 Quantum Block Algorithm for Binary Bits
5.6 Quantum Public Key Cryptosystem
5.7 Typical Quantum Public-key Algorithms
5.7.1 Algorithm based Subset-sum Problem
5.7.2 Algorithm based Quantum Coding
References
6 Quantum Authentication
6.1 Introduction
6.2 Authentication Theory
6.2.1 Authentication Categories
6.2.2 Security Model
6.3 Message Authentication Code
6.3.1 Encoding Approach
6.3.2 Hash Function Approach
6.4 Quantum Identity Authentication
6.4.1 Scheme Description
6.4.2 Security Analysis
6.4.3 In Imperfect Channel
6.5 Quantum Signature Principle
6.6 Arbitrated Quantum Signature
6.6.1 Algorithm Description
6.6.2 Security Analysis
6.7 True Quantum Signature
6.7.1 Algorithm Description
6.7.2 Security Analysis
……
Index
商品描述(中文翻譯)
《量子私密通訊》涵蓋了安全通訊、量子密碼學、量子通訊及其物理實現與應用的基礎知識。這本書及時出版,為一個處於經典私密通訊和量子物理交叉點的新興領域提供了重要資訊。無論是通訊工程、計算機科學、電子工程、物理學還是數學的研究生和科學家都會從這本書中受益。
目錄:
1. 引言
1.1 通訊的安全需求
1.2 量子私密通訊概述
1.3 私密通訊模型
1.3.1 經典安全通訊模型
1.3.2 量子私密通訊模型
1.4 量子私密通訊的歷史
1.5 與其他學科的關係
1.6 符號和慣例
1.6.1 隨機變量
1.6.2 密碼系統和密碼
參考文獻
2. 量子安全理論
2.1 引言
2.2 數學背景
2.2.1 希爾伯特空間
2.2.2 希爾伯特空間的性質
2.2.3 運算子
2.2.4 幾個重要的運算子
2.2.5 矩陣分解
2.3 量子力學簡介
2.3.1 量子系統
2.3.2 量子系統的動態特性
2.3.3 量子系統的信息檢索
2.3.4 量子光學基礎
2.4 信息理論簡介
2.4.1 熵
2.4.2 互信息
2.4.3 量子法諾不等式
2.5 複雜性理論簡介
2.5.1 圖靈機
2.5.2 經典複雜性
2.5.3 量子複雜性
2.6 安全模型
2.6.1 信息理論安全
2.6.2 計算安全
2.6.3 攻擊策略分析
參考文獻
3. 量子位元
3.1 經典位元
3.2 量子位元定義
3.2.1 二進位量子位元
3.2.2 P進位量子位元
3.2.3 複合量子位元
3.3