Abstract
Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology1 remain unknown [1].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
D. Kahn, The Codebreakers: The Story of Secret Writing, Macmillan, New York (1967).
There are several good textbooks on cryptology where the modern techniques are explained, my favourite titles include: D. Welsh, Codes and Cryptography, Clarendon Press, Oxford (1988).
B. Schneier, Applied cryptography: protocols, algorithms, and source code in C., John Wiley & Sons, New York (1994).
G. Brassard, Modern Cryptology: A Tutorial, Springer-Verlag, Berlin (1988).
D.E. Denning, Cryptography and Data Security, Addison-Wesley (1982).
W. Diffie and M.E. Hellman, IEEE Trans. Inf. Theory IT-22, 644 (1977).
R. Rivest, A. Shamir, and L. Adleman, On Digital Signatures and Public-Key Cryptosystems, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212 (January 1979).
P.W. Shor, Algorithms for quantum computation draft of April 18, 1994 manuscript, AT&T Bell Laboratories.
S. Wiesner, SIGACT News, 15, 78 (1983); original manuscript written circa 1970.
C. H. Bennett and G. Brassard, in “Proc. IEEE Int. Conference on Computers, Systems and Signal Processing”, IEEE, New York, (1984).
A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).
A. K. Ekert, J. G. Rarity, P. R. Tapster, and G. M. Palma, Phys. Rev. Lett. 69, 1293 (1992).
C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).
A.K. Ekert, Nature 358, 14 (1992).
A.K. Ekert, B. Huttner, G.M. Palma, and A.Peres, Phys. Rev. A (in press).
I. D. Ivanovic, Phys. Lett. A 123, 257 (1987).
A. Peres, Phys. Lett. A 128, 19 (1988).
P. Busch, P. J. Lahti, and P. Mittelstaedt, The Quantum Theory of Measurement, Springer, Berlin (1991).
A. Peres, Quantum Theory: Concepts and Methods, Kluwer, Dordrecht (1993), Chapt. 9.
P. Grangier and A. Aspect, Phys. Rev. Lett. 54, 418 (1985).
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, J. Crypt. 5, 3 (1992).
P. D. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29, 634 ibid. 1291 (1993).
A. Muller, J. Breguet, and N. Gisin, Europhys. Lett., 23, 383 (1993); R. Hughes (Los Alamos, Progress Report).
D. Deutsch, Proc. R. Soc. London A 400, 97 (1985).
C.H. Bennett, IBM J. Res. Dev. 17, 525 (1973).
R. Feynman, Int. J. Theor. Phys. 21, 467 (1982).
D. Deutsch and R. Jozsa, Proc. R. Soc. London A 439, 553 (1992).
A. Berthiaume and G. Brassard, in Proc. 7th IEEE Conference on Structure in Complexity Theory. (1992).
E. Bernstein and U. Vazirani, in Proc. 25th ACMSymp. on Theory of Computation. (1993); D.R. Simon (private communication).
R.D. Silverman, Math. Comp. 48, 329 (1987).
A.K. Lenstra, H.W. Lenstra Jr., M.S. Manasse, and J.M. Pollard, in Proc. 22nd ACM Symposium on the Theory of Computing, pp.564–572 (1990).
D. Knuth, The Art of Computer Programming: Volume 2, Seminumerical Algorithms. Addison-Wesley (1981).
M.R. Schroeder, NumberTheory in Science and Communication. Springer-Verlag (1984).
D. Deutsch, Proc. R. Soc. London A 425, 73 (1989).
A.Yao,Proc. 34th IEEE Symp. on Foundation of Computer Science pp.352–360, IEEE Computer Society Press, Los Alamitos, (1993).
D. Deutsch, A.K. Ekert, and A. Barenco (in preparation)
D.S. Chemla and D.A.B. Miller in Heterojuction band discountinuities, physics and device applications, eds. F. Capasso and G. Margaritondo, North-Holland, Elsevier Science Publishing Co., New York, (1987).
K. Obermayer, W.G. Teich, and G. Mahler, Phys.Rev. B 37, 8096 (1988).
W.G. Teich and G. Mahler, Phys.Rev. A 45, 3300 (1992).
S. Lloyd, Science 261, 1569 (1993).
S. Haroche and J.M. Raimond, Advances in Atomic, Molecular and Optical Physics; Supplement 2 123 (1994).
W.S. Warren, Science 242, 878 (1988).
J. Hecht, The Laser Guidebook. McGraw-Hill, Inc. (1992).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 Springer Science+Business Media New York
About this chapter
Cite this chapter
Ekert, A.K. (1995). Quantum Cryptography and Computation. In: Beltrametti, E.G., Lévy-Leblond, JM. (eds) Advances in Quantum Phenomena. NATO ASI Series, vol 347. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1975-1_15
Download citation
DOI: https://doi.org/10.1007/978-1-4615-1975-1_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4613-5813-8
Online ISBN: 978-1-4615-1975-1
eBook Packages: Springer Book Archive