Applied Quantum Cryptography

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cryptography  or better: quantum key distribution  was the domain of basic research laboratories at u...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kollmitzer, Christian. (Editor), Pivk, Mario. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Lecture Notes in Physics, 797
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-04831-9
Table of Contents:
  • Introduction
  • Preliminaries
  • Quantum Key Distribution
  • Real-life QKD Systems
  • Attack Strategies on QKD Protocols
  • Access to QKD Networks with PDAs
  • Security Requirements for Future Medical Information Systems
  • Adaptive Cascade
  • Statistical Analysis of QKD Networks in Real-life Environment
  • QKD Networks Based on Q3P
  • Ring of Trust.