Listing 1 - 10 of 29 | << page >> |
Sort by
|
Choose an application
This thesis by Alvaro Alarcón Cuevas explores advancements in quantum communication through the development of a fiber-optic platform. The work addresses the challenges of data security in optical networks by implementing quantum key distribution (QKD) methods, which utilize natural properties rather than mathematical constructs for data encryption. The thesis introduces a novel approach that combines phase-coded systems with time-bin schemes, effectively reducing losses and demonstrating compatibility with existing optical networks. The study successfully transmits phase-coded single-photon states over a 500-meter few-mode fiber and supports orbital angular momentum (OAM) modes, paving the way for more efficient quantum communication systems. This research is intended for professionals and academics in the fields of quantum mechanics and optical engineering.
Choose an application
This dissertation by Aysajan Abidin explores Quantum Key Distribution (QKD), focusing on its security proof and the role of universal hash functions. The work examines the challenges associated with maintaining unconditional security in QKD, especially given the impracticality of immutable public communication channels. The text delves into the Wegman-Carter authentication scheme, analyzing its application in QKD with almost strongly universal hash functions to enhance security. Further, it addresses the necessity of using a one-time pad encryption to maintain the secrecy of hash functions. The dissertation is intended for researchers and professionals in the field of quantum cryptography and information security, offering new constructions and security proofs to advance QKD methods. The author's goal is to improve the efficiency and security of cryptographic key distribution systems.
Choose an application
Jonathan Jogenfors' dissertation, 'Breaking the Unbreakable: Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography,' explores the vulnerabilities in quantum key distribution systems. By examining energy-time entangled systems, the work identifies loopholes that could be exploited by attackers. The thesis discusses the no-cloning theorem and the potential of quantum money, proposing a novel concept of Quantum Bitcoin, which integrates blockchain technology. The study aims to enhance the security of quantum cryptography and is intended for researchers and professionals in quantum physics and cryptography.
Choose an application
This thesis explores vulnerabilities in energy-time entangled quantum key distribution (QKD) systems, particularly those using Franson-based setups. The author demonstrates how security proofs relying on Bell inequality violations can be faked, potentially compromising the system's integrity. Utilizing pulsed and classical light, an attacker can mimic secure conditions, highlighting significant risks. The work offers solutions to strengthen QKD systems against such attacks. This research is aimed at advancing secure quantum communication methods, suitable for academic and professional audiences in quantum physics and cryptography.
Choose an application
This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual.
Quantum cryptography --- Quantum computing --- Mathematics. --- Security measures.
Choose an application
"This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography, also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution, position-based quantum cryptography, quantum teleportation, quantum e-commerce, quantum cloning, cyber security techniques architectures and design, cyber security techniques management, software defined networks, and cyber security techniques for 5G communication. The text also discusses the security of practical quantum key distribution systems, applications and algorithms developed for quantum cryptography, as well as cyber security through quantum computing and quantum cryptography. The text will be beneficial for graduate students, academic researchers, and professionals working in the fields of electrical engineering, electronics and communications engineering, computer science, and information technology"--
Data encryption (Computer science) --- Computer networks --- Quantum cryptography. --- Security measures.
Choose an application
The main emphasis of this work is the mathematical theory of quantum channels and their entropic and information characteristics. Quantum information theory is one of the key research areas, since it leads the way to vastly increased computing speeds by using quantum systems to store and process information. Quantum cryptography allows for secure communication of classified information. Research in the field of quantum informatics, including quantum information theory, is in progress in leading scientific centers throughout the world. The past years were marked with impressive progress made by several researchers in solution of some difficult problems, in particular, the additivity of the entropy characteristics of quantum channels. This suggests a need for a book that not only introduces the basic concepts of quantum information theory, but also presents in detail some of the latest achievements.
Information theory in physics. --- Quantum entropy. --- Quantum Computing. --- Quantum Cryptography. --- Quantum Information. --- Quantum Systems. --- Quantum Theory.
Choose an application
Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all the cross-disciplinary developments in cybersecurity that are being generated by the advancements in quantum computing.
Quantum cryptography. --- Artificial Neural Networks. --- Information security. --- Quantum Computing. --- Quantum-safe Cryptography.
Choose an application
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Post-Quantum Cryptography --- Gauss Lattice --- Reduction --- Learning With Errors --- FHE --- Fourier transform --- Ideal lattice --- NTRU --- Smoothing parameters --- Discrete Gaussian measure
Choose an application
Quantum communication --- Quantum communication. --- Quantum communications --- Optical communications --- quantum cryptography --- optical fibre networks --- quantum optics --- quantum computing --- quantum wireless communication --- Teoria quàntica --- Teoria quàntica.
Listing 1 - 10 of 29 | << page >> |
Sort by
|