Abstract
Although written aboutfifteen years ago, Wiesner’s seminal paper, to which the origin of quantum cryptography must be traced back, did not appear in print until the spring of 1983 [W83]. The first published account of these ideas thus appeard in the proceedings of the second annual CRYPTO conference [BBBW83]. However, the concepts presented there were mostly of theoretical interest, because the technology involved in implementing them wouldhave been far beyond the reach of our current knowledge. In particular, single polarized photons had to be trapped, bounding back and forth between perfectly reflecting mirrors, and perfect efficiency in photon detection was required. To make up for this inconvenience, we could prove that no technology whatsoever, as well as no amount of computing power, could break some of our schemes, as long as some of the most fundamental principles of quantum physics hold true.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Aspect, A., P. Grangier and G. Roger, “Experimental Realization of the Einstein-Podolsky-Rosen-Bohm Gedankenexperiment: a New Violation of Bell’s Inequalities”, Physical Review Letters, Vol. 49, pp. 91–94 (1982).
Bennett, C. H. and G. Brassard, “Quantum Cryptography, and its Application to Provably Secure Key Expansion, Public-Key Distribution, and Coin Tossing”, IEEE International Symposium on Information Theory, St-Jovite, Quebec (1983).
Bennett, C. H. and G. Brassard, “Quantum Cryptography: Public-Key Distribution and Coin Tossing”, Proceedings of the International Conference on Computers, Systems and Signal Processing, Bangalore, India (1984).
Bennett, C. H., G. Brassard, S. Breidbart and S. Wiesner, “Quantum Cryptography, or Unforgeable Subway Tokens”, Advances in Cryptography: Proceedings of CRYPTO 82, Plenum Press, pp. 267–275 (1983).
Blum, M., “How to Exchange (Secret) Keys”, ACM Transactions on Computer Systems, Vol. 1, no 2, pp. 175–193 (1983).
Blum, M., “Coin Flipping by Telephone-A Protocol for Solving Impossible Problems”, SIGACT NEWS, Vol.15, no 1, pp. 23–27 (1983).
Bohm, D., Quantum Theory, Prentice Hall, Englewood Cliffs, NJ (1951).
Brassard, G., “A Note on the Complexity of Cryptography”, IEEE Transactions on Information Theory, Vol. IT-25, no 2, pp. 232–233 (1979).
Brickell, E. F. and G. J. Simmons, “A Status Report on Knapsack Based Public Key Cryptosystems”, Congressum Numerantium, Vol. 37, pp. 3–72 (1983).
Diffie, W. and M. E. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. IT-22, pp. 644–654
Diffie, W. and M. E. Hellman, “Privacy and Authentication: an Introduction to Cryptography”, Proceedings of the IEEE, Vol. 27, no 3, pp. 397–427 (1979).
Einstein, A., B. Podolsky and N. Rosen, Physical Review, Vol. 47, p. 777 (1935).
Garlinski, J., The Enigma War, Charles Scribner’s Sons, New York, NY (1979).
Garey, M. R. and D. S. Johnson, Computers and Intractability, a Guide to NP-Completeness, W. H. Freeman and Co., San Francisco, CA (1979).
Goldwasser, S. and S. Micali, “Probabilistic Encryption”, Journal of Computer and System Sciences, Vol. 28, pp. 270–299 (1984).
Mermin, N. D., “Bringing Home the Atomic World: Quantum Mysteries for Anybody”, American Journal of Physics, Vol. 49, no 10, pp. 940–943 (1981).
Merkle, R. C. and M. E. Hellman, “Hiding Information and Signatures in Trapdoor Knapsacks”, IEEE Transactions on Information Theory, Vol. IT-24, no 5, pp. 525–530 (1978).
—, “Data Encryption Standard”, National Bureau of Standards, FIPS PUB 46, Washington, DC (1977).
Rivest, R. L., A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, Vol. 21, no 2, pp. 120–126 (1978).
Shamir, A., “A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem”, Proceedings of the 23rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 145–152 (1982).
Shannon, C. E., “A Mathematical Theory of Communication”, Bell System Technical Journal, Vol. 27, pp. 379–423, 623–656 (1948).
Shannon, C. E., “Communication Theory of Secrecy Systems”, Bell System Technical Journal, Vol. 28, pp. 656–715 (1949).
Wiesner, S., “Conjugate Coding”, unpublished manuscript written ca 1970, subsequently made available in SIGACT NEWS, Vol. 15, no 1, pp. 78–88 (1983).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bennett, C.H., Brassard, G. (1985). An Update on Quantum Cryptography. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39568-7_39
Download citation
DOI: https://doi.org/10.1007/3-540-39568-7_39
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15658-1
Online ISBN: 978-3-540-39568-3
eBook Packages: Springer Book Archive