Welcome to the web page dedicated to the book *Quantum Cryptography and Secret-Key Distillation*.

Quantum Cryptography and Secret-Key Distillation

Gilles Van Assche

Cambridge University Press

Foreword by Nicolas J. Cerf and Steven W. McLaughlin

Available from June 29, 2006

ISBN-13: 9780521864855

ISBN-10: 0521864852

## Synopsis

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, then privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

## Table of contents

- Introduction [XHTML+MathML] [PDF]
- A ﬁrst tour of quantum key distribution
- Notation and conventions
- Classical cryptography
- Conﬁdentiality and secret-key ciphers
- Secret-key authentication
- Public-key cryptography
- Information theory
- Source coding
- Joint and conditional entropies
- Channel coding
- Rényi entropies
- Continuous variables
- Perfect secrecy revisited
- Quantum information theory
- Fundamental deﬁnitions in quantum mechanics
- Qubits and qubit pairs
- Density matrices and quantum systems
- Entropies and coding
- Particularity of quantum information
- Quantum optics
- Cryptosystems based on quantum key distribution
- A key distribution scheme
- A secret-key encryption scheme
- Combining quantum and classical cryptography
- Implementation of a QKD-based cryptosystem
- General results on secret-key distillation
- A two-step approach
- Characteristics of distillation techniques
- Authenticated one-shot secret-key distillation
- Authenticated repetitive secret-key distillation
- Unauthenticated secret-key distillation
- Secret-key distillation with continuous variables
- Privacy ampliﬁcation using hash functions
- Requirements
- Universal families suitable for privacy ampliﬁcation
- Implementation aspects of hash functions
- Reconciliation
- Problem description
- Source coding with side information
- Binary interactive error correction protocols
- Turbo codes
- Low-density parity-check codes
- Non-binary reconciliation
- Sliced error correction
- Multistage soft decoding
- Reconciliation of Gaussian key elements
- The BB84 protocol
- Description
- Implementation of BB84
- Eavesdropping and secret key rate
- Protocols with continuous variables
- From discrete to continuous variables
- A protocol with squeezed states
- A protocol with coherent states: the GG02 protocol
- Implementation of GG02
- GG02 and secret-key distillation
- Security analysis of quantum key distribution
- Eavesdropping strategies and secret-key distillation
- Distillation derived from entanglement puriﬁcation
- Application to the GG02 protocol

## Errata and error reporting

A list of corrections (version 2007-02-22) is available in PDF, HTML and XHTML+MathML formats.

Do not hesitate to report errors or omissions you may find in the book.

Contact: `gilles`

*-dot-* `van`

*-dot-* `assche`

*-at-* `noekeon`

*-dot-* `org`