Skip to main content

Quantum Key Distribution

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Algorithms
  • 224 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 1,599.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 1,999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Acín A et al (2007) Device-independent security of quantum cryptography against collective attacks. Phys Rev Lett 98:230501

    Article  Google Scholar 

  2. Ben-Or M, Horodecki M, Leung DW, Mayers D, Oppenheim J (2005) The universal composable security of quantum key distribution. In: Second theory of cryptography conference TCC. Lecture notes in computer science, vol 3378. Springer, Berlin, pp 386–406. Also available at http://arxiv.org/abs/quant-ph/0409078

  3. Bennett CH, Brassard G (1984) Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE international conference on computers, systems and signal processing. IEEE Computer Society, Los Alamitos, pp 175–179

    Google Scholar 

  4. Bennett CH, Brassard G, Crépeau C, Maurer U (1995) Generalized privacy amplification. IEEE Trans Inf Theory 41(6):1915–1923

    Article  MathSciNet  MATH  Google Scholar 

  5. Bennett CH, Brassard G, Popescu S, Schumacher B, Smolin J, Wootters W (1996) Purification of noisy entanglement and faithful teleportation via noisy channels. Phys Rev Lett 76:722–726

    Article  Google Scholar 

  6. Csiszár I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24:339–348

    Article  MathSciNet  MATH  Google Scholar 

  7. Devetak I, Winter A (2005) Distillation of secret key and entanglement from quantum states. Proc R Soc Lond A 461:207–235

    Article  MathSciNet  MATH  Google Scholar 

  8. Ekert AK (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663

    Article  MathSciNet  MATH  Google Scholar 

  9. Ekert A, Renner R (2014) The ultimate physical limits of privacy. Nature 507:443–447

    Article  Google Scholar 

  10. Fuchs CA, Gisin N, Griffiths RB, Niu C, Peres A (1997) Optimal eavesdropping in quantum cryptography, I. Information bound and optimal strategy. Phys Rev A 56:1163–1172

    Article  MathSciNet  Google Scholar 

  11. Gisin N, Ribordy G, Tittel W, Zbinden H (2002) Quantum cryptography. Rev Mod Phys 74:145–195

    Article  Google Scholar 

  12. Lo H-K, Chau HF (1999) Unconditional security of quantum key distribution over arbitrarily long distances. Science 283:2050–2056

    Article  Google Scholar 

  13. Mayers D (1996) Quantum key distribution and string oblivious transfer in noisy channels. In: Advances in cryptology – CRYPTO ’96. Lecture notes in computer science, vol 1109. Springer, Berlin, pp 343–357

    Google Scholar 

  14. Renner R (2005) Security of quantum key distribution. Ph.D. thesis, Swiss Federal Institute of Technology (ETH) Zurich. Also available at http://arxiv.org/abs/quant-ph/0512258

  15. Renner R (2007) Symmetry of large physical systems implies independence of subsystems. Nat Phys 3:645–649

    Article  Google Scholar 

  16. Renner R, König R (2005) Universally composable privacy amplification against quantum adversaries. In: Second theory of cryptography conference TCC. Lecture notes in computer science, vol 3378. Springer, Berlin, pp 407–425. Also available at http://arxiv.org/abs/quant-ph/0403133

  17. Renner R, Wolf S (2003) Unconditional authenticity and privacy from an arbitrarily weak secret. In: Proceedings of Crypto 2003. Lecture notes in computers science, vol 2729. Springer, Berlin, pp 78–95

    Google Scholar 

  18. Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441

    Article  Google Scholar 

  19. Wegman MN, Carter JL (1981) New hash functions and their use in authentication and set equality. J Comput Syst Sci 22:265–279

    Article  MathSciNet  MATH  Google Scholar 

  20. Wiesner S (1983) Conjugate coding. Sigact News 15(1):78–88

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Renato Renner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media New York

About this entry

Cite this entry

Renner, R. (2016). Quantum Key Distribution. In: Kao, MY. (eds) Encyclopedia of Algorithms. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2864-4_316

Download citation

Publish with us

Policies and ethics