图书介绍

量子保密通信 英文版PDF|Epub|txt|kindle电子书版本下载

量子保密通信 英文版
  • GuihuaZeng著 著
  • 出版社: 北京:高等教育出版社
  • ISBN:9787040254792
  • 出版时间:2010
  • 标注页数:368页
  • 文件大小:25MB
  • 文件页数:383页
  • 主题词:量子力学-保密通信-研究-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

量子保密通信 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

1 Introduction1

1.1 Security Requirements of Communication1

1.2 Overview of Quantum Private Communicatio5

1.3 Private Communication Models10

1.3.1 Classic Secure Communication Model10

1.3.2 Quantum Private Communication Model11

1.4 History of Quantum Private Communication13

1.5 Relationship with Other Subjects15

1.6 Notations and Conventions17

1.6.1 Random Variables17

1.6.2 CryptosystemandCipher18

References19

2 Quantum Security Theory23

2.1 Introduction23

2.2 Mathematical Background24

2.2.1 Hilbert Space25

2.2.2 Properties of Hilbert Space26

2.2.3 Operators29

2.2.4 Several Important Operator32

2.2.5 Matrices Decomposition36

2.3 Introduction to Quantum Mechanics37

2.3.1 Quantum Systems37

2.3.2 Dynamic Characteristics of Quantum Systems40

2.3.3 Information Retrieval of Quantum Systems42

2.3.4 Fundament of Quantum Optics45

2.4 Introduction to Information Theory48

2.4.1 Entropy49

2.4.2 Mutual Information50

2.4.3 Quantum Fano Inequality53

2.5 Introduction to Complexity Theory54

2.5.1 Turing Machine54

2.5.2 Classic Complexit56

2.5.3 Quantum Complexity58

2.6 Security Model60

2.6.1 Information-theoretic Securit60

2.6.2 Computational Security62

2.6.3 Attack Strategy Analysis63

References65

3 Quantum Bits67

3.1 Classic Bits68

3.2 Quantum Bit Definition69

3.2.1 Binary Qubit70

3.2.2 P-ary Qubit70

3.2.3 Composite Qubit71

3.3 Quantum Bit Transformation72

3.3.1 Quantum Logic Gates73

3.3.2 Quantum Circuits82

3.4 Mathematical Property83

3.4.1 BlochSphere84

3.4.2 Orthogonality of Opposite Points85

3.4.3 Rotations onBlochSphere85

3.5 Physical Property87

3.5.1 Superposition87

3.5.2 Entanglement89

3.5.3 Distinguishability92

3.5.4 Quantum No-cloning96

3.6 Information Property99

3.6.1 Single Qubit Information99

3.6.2 Nonorthogonal Qubits Information100

References100

4 Quantum Key Distribution103

4.1 Intuition on QKD103

4.2 Standard QKDSchemes106

4.2.1 BB84Protocol107

4.2.2 B92Protocol110

4.3 Quantum Communication Model for QKD112

4.3.1 Quantum Source112

4.3.2 Quantum Channel114

4.3.3 Quantum Sink117

4.4 Reconciliation117

4.4.1 Reconciliation Model117

4.4.2 Binary Reconciliation Protocol119

4.4.3 Non-Binary Reconciliation Protoco120

4.5 Privacy Amplification125

4.5.1 Privacy Amplification Principle126

4.5.2 Privacy Amplification Techniques127

4.6 Security Model for QKD128

4.6.1 Security Theory128

4.6.2 Typical Attack Strategies131

References133

5 Quantum Cryptosystem135

5.1 Introduction136

5.2 QKD-based Cryptosystem137

5.3 Quantum VernamCipher139

5.3.1 Classic Vernam Algorithm141

5.3.2 Quantum VernamCipher141

5.3.3 Private Quantum Channel143

5.3.4 Security Model144

5.4 Typical Quantum Vernam Ciphers144

5.4.1 Classic-key-based Quantum Vernam Cipher145

5.4.2 Bell-key-based Quantum Vernam Cipher146

5.4.3 Teleportation as Quantum Vernam Cipher151

5.5 Quantum Block Cipher152

5.5.1 Theoretical Model153

5.5.2 Quantum Block Algorithm for Binary Bits155

5.6 Quantum Public Key Cryptosystem158

5.7 Typical Quantum Public-key Algorithms160

5.7.1 Algorithm based Subset-sum Problem160

5.7.2 Algorithm based Quantum Coding162

References164

6 Quantum Authentication167

6.1 Introduction167

6.2 Authentication Theory169

6.2.1 Authentication Categories169

6.2.2 Security Model172

6.3 Message Authentication Code173

6.3.1 Encoding Approach174

6.3.2 Hash Function Approach174

6.4 Quantum Identity Authentication175

6.4.1 Scheme Description175

6.4.2 Security Analysis177

6.4.3 In Imperfect Channel183

6.5 Quantum Signature Principle186

6.6 Arbitrated Quantum Signature189

6.6.1 Algorithm Description189

6.6.2 Security Analysis195

6.7 True Quantum Signature196

6.7.1 Algorithm Description196

6.7.2 Security Analysis202

6.8 Quantum Channel Authenticatio210

References213

7 Private Communication Using Single Photon Signal217

7.1 Single Photon Source217

7.1.1 Basic Principle218

7.1.2 Faint Laser Pulses219

7.1.3 Single Photon Source with Quantum Dots220

7.1.4 Other Single Photon Source222

7.1.5 Entangled Photon Pairs223

7.2 Transmission of Single Photon Signal224

7.2.1 Transmission Mechanism224

7.2.2 Quantum Repeater226

7.3 Single Photon Detection230

7.3.1 Photomultiplier Tubes230

7.3.2 Single Photon Avalanche Diod232

7.3.3 Frequency Up-conversion237

7.3.4 Quantum Dots Single Photon Detector239

7.3.5 Superconducting Single Photon Detector240

7.4 Encoding with Discrete Variable Qubits243

7.4.1 Polarization Modulation243

7.4.2 Phase Modulation244

7.4.3 Frequency Modulation246

7.5 QKDwith Single Photon Signal246

7.5.1 QKDinOptical Fiber247

7.5.2 QKD in Free Space250

7.6 QKDwith Entangled Photon Pairs252

7.7 Secret Sharing with Single Photon Signal254

References257

8 Private Communication Using Continuous Variable Signal259

8.1 Continuous Variable Signal260

8.1.1 Coherent State Signal260

8.1.2 Squeezed State Signal264

8.2 Continuous Variable Signal Transmission268

8.3 Continuous Variable Signal Detection271

8.3.1 Direct Intensity Measurement271

8.3.2 Coherent Detection273

8.3.3 HomodyneDetection274

8.3.4 Imperfect Homodyne Detection277

8.4 Encoding with Continuous Variable Qubits279

8.4.1 Continuous Variable Qubits279

8.4.2 Amplitude-Phase Encoding Rule281

8.4.3 PSK Encoding Rule283

8.4.4 Polarization Encoding Rul285

8.5 QKD with Continuous Variable Signa289

8.5.1 QKD with Squeezed State290

8.5.2 QKD with Coherent State293

8.5.3 Private Communication with EPR Correlations297

8.6 Quantum Encryption with Coherent States299

8.6.1 Algorithm Descriptions299

8.6.2 Polarization Encoding Implementation304

8.6.3 Phase Encoding Implementation306

8.7 Quantum Identification with Coherent State307

References309

9 Practical Private Communication Systems313

9.1 Introduction313

9.2 Transmission Loss316

9.2.1 In Single Mode Fiber316

9.2.2 In Free Space321

9.3 Private Communication Over Fiber324

9.3.1 Point-to-point Private Communication325

9.3.2 Private Communication Networ329

9.4 Private Communication Over Free-Space334

9.4.1 Transmitter,Receiver,and Relay335

9.4.2 Link Attenuations337

9.4.3 Atmosphere-based Private Communication340

9.4.4 Stratosphere-based Private Communication343

9.4.5 Satellite-based Private Communication348

9.5 Private Communication over IP Networks350

9.5.1 IPsec Extensions with QKD Protocols350

9.5.2 Quantum Virtual Private Network353

9.6 Applications in Mobile Communication354

9.7 Limitations onAvailabilities357

9.7.1 Limitations on Communication Systems357

9.7.2 Limitations on Security359

References360

Index365

热门推荐