Skip to main content

Quantum Cryptography and Computation

  • Chapter
Advances in Quantum Phenomena

Part of the book series: NATO ASI Series ((NSSB,volume 347))

  • 222 Accesses

  • 1 Citations

Abstract

Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology1 remain unknown [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. D. Kahn, The Codebreakers: The Story of Secret Writing, Macmillan, New York (1967).

    Google Scholar 

  2. There are several good textbooks on cryptology where the modern techniques are explained, my favourite titles include: D. Welsh, Codes and Cryptography, Clarendon Press, Oxford (1988).

    MATH  Google Scholar 

  3. B. Schneier, Applied cryptography: protocols, algorithms, and source code in C., John Wiley & Sons, New York (1994).

    Google Scholar 

  4. G. Brassard, Modern Cryptology: A Tutorial, Springer-Verlag, Berlin (1988).

    MATH  Google Scholar 

  5. D.E. Denning, Cryptography and Data Security, Addison-Wesley (1982).

    MATH  Google Scholar 

  6. W. Diffie and M.E. Hellman, IEEE Trans. Inf. Theory IT-22, 644 (1977).

    MathSciNet  Google Scholar 

  7. R. Rivest, A. Shamir, and L. Adleman, On Digital Signatures and Public-Key Cryptosystems, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212 (January 1979).

    Google Scholar 

  8. P.W. Shor, Algorithms for quantum computation draft of April 18, 1994 manuscript, AT&T Bell Laboratories.

    Google Scholar 

  9. S. Wiesner, SIGACT News, 15, 78 (1983); original manuscript written circa 1970.

    Article  Google Scholar 

  10. C. H. Bennett and G. Brassard, in “Proc. IEEE Int. Conference on Computers, Systems and Signal Processing”, IEEE, New York, (1984).

    Google Scholar 

  11. A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).

    Article  ADS  MathSciNet  MATH  Google Scholar 

  12. A. K. Ekert, J. G. Rarity, P. R. Tapster, and G. M. Palma, Phys. Rev. Lett. 69, 1293 (1992).

    Article  ADS  Google Scholar 

  13. C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).

    Article  ADS  MathSciNet  MATH  Google Scholar 

  14. A.K. Ekert, Nature 358, 14 (1992).

    Article  ADS  Google Scholar 

  15. A.K. Ekert, B. Huttner, G.M. Palma, and A.Peres, Phys. Rev. A (in press).

    Google Scholar 

  16. I. D. Ivanovic, Phys. Lett. A 123, 257 (1987).

    Article  ADS  MathSciNet  Google Scholar 

  17. A. Peres, Phys. Lett. A 128, 19 (1988).

    Article  ADS  MathSciNet  Google Scholar 

  18. P. Busch, P. J. Lahti, and P. Mittelstaedt, The Quantum Theory of Measurement, Springer, Berlin (1991).

    Google Scholar 

  19. A. Peres, Quantum Theory: Concepts and Methods, Kluwer, Dordrecht (1993), Chapt. 9.

    MATH  Google Scholar 

  20. P. Grangier and A. Aspect, Phys. Rev. Lett. 54, 418 (1985).

    Article  ADS  Google Scholar 

  21. C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, J. Crypt. 5, 3 (1992).

    Article  MATH  Google Scholar 

  22. P. D. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29, 634 ibid. 1291 (1993).

    Article  Google Scholar 

  23. A. Muller, J. Breguet, and N. Gisin, Europhys. Lett., 23, 383 (1993); R. Hughes (Los Alamos, Progress Report).

    Article  ADS  Google Scholar 

  24. D. Deutsch, Proc. R. Soc. London A 400, 97 (1985).

    Article  ADS  MathSciNet  MATH  Google Scholar 

  25. C.H. Bennett, IBM J. Res. Dev. 17, 525 (1973).

    Article  MATH  Google Scholar 

  26. R. Feynman, Int. J. Theor. Phys. 21, 467 (1982).

    Article  MathSciNet  Google Scholar 

  27. D. Deutsch and R. Jozsa, Proc. R. Soc. London A 439, 553 (1992).

    Article  ADS  MathSciNet  MATH  Google Scholar 

  28. A. Berthiaume and G. Brassard, in Proc. 7th IEEE Conference on Structure in Complexity Theory. (1992).

    Google Scholar 

  29. E. Bernstein and U. Vazirani, in Proc. 25th ACMSymp. on Theory of Computation. (1993); D.R. Simon (private communication).

    Google Scholar 

  30. R.D. Silverman, Math. Comp. 48, 329 (1987).

    Article  MathSciNet  MATH  Google Scholar 

  31. A.K. Lenstra, H.W. Lenstra Jr., M.S. Manasse, and J.M. Pollard, in Proc. 22nd ACM Symposium on the Theory of Computing, pp.564–572 (1990).

    Google Scholar 

  32. D. Knuth, The Art of Computer Programming: Volume 2, Seminumerical Algorithms. Addison-Wesley (1981).

    Google Scholar 

  33. M.R. Schroeder, NumberTheory in Science and Communication. Springer-Verlag (1984).

    Google Scholar 

  34. D. Deutsch, Proc. R. Soc. London A 425, 73 (1989).

    Article  ADS  MathSciNet  MATH  Google Scholar 

  35. A.Yao,Proc. 34th IEEE Symp. on Foundation of Computer Science pp.352–360, IEEE Computer Society Press, Los Alamitos, (1993).

    Google Scholar 

  36. D. Deutsch, A.K. Ekert, and A. Barenco (in preparation)

    Google Scholar 

  37. D.S. Chemla and D.A.B. Miller in Heterojuction band discountinuities, physics and device applications, eds. F. Capasso and G. Margaritondo, North-Holland, Elsevier Science Publishing Co., New York, (1987).

    Google Scholar 

  38. K. Obermayer, W.G. Teich, and G. Mahler, Phys.Rev. B 37, 8096 (1988).

    Article  ADS  Google Scholar 

  39. W.G. Teich and G. Mahler, Phys.Rev. A 45, 3300 (1992).

    Article  ADS  Google Scholar 

  40. S. Lloyd, Science 261, 1569 (1993).

    Article  ADS  Google Scholar 

  41. S. Haroche and J.M. Raimond, Advances in Atomic, Molecular and Optical Physics; Supplement 2 123 (1994).

    Google Scholar 

  42. W.S. Warren, Science 242, 878 (1988).

    Article  ADS  Google Scholar 

  43. J. Hecht, The Laser Guidebook. McGraw-Hill, Inc. (1992).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer Science+Business Media New York

About this chapter

Cite this chapter

Ekert, A.K. (1995). Quantum Cryptography and Computation. In: Beltrametti, E.G., Lévy-Leblond, JM. (eds) Advances in Quantum Phenomena. NATO ASI Series, vol 347. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-1975-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-1975-1_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-5813-8

  • Online ISBN: 978-1-4615-1975-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics