Cantitate/Preț
Produs

Device-Independent Quantum Information Processing

Autor Rotem Arnon-Friedman
en Limba Engleză Hardback – noi 2020
Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the communication partners, such as photon sources and detectors, deviate from their theoretical specifications. This is of high practical relevance, for attacks to current implementations of quantum cryptography exploit exactly such deviations. Device-independent cryptography is however technologically so demanding that it looked as if experimental realizations are out of reach.

In her thesis, Rotem Arnon-Friedman presents powerful information-theoretic methods to prove the security of device-independent quantum cryptography. Based on them, she is able to establish security in a parameter regime that may be experimentally achievable in the near future. Rotem Arnon-Friedman's thesis thus provides the theoretical foundations for an  experimental demonstration of device-independent quantum cryptography. 

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 95842 lei  6-8 săpt.
  Springer – 2 noi 2021 95842 lei  6-8 săpt.
Hardback (1) 96372 lei  6-8 săpt.
  Springer – noi 2020 96372 lei  6-8 săpt.

Preț: 96372 lei

Preț vechi: 117528 lei
-18% Nou

Puncte Express: 1446

Preț estimativ în valută:
17054 19997$ 14976£

Carte tipărită la comandă

Livrare economică 06-20 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030602307
ISBN-10: 3030602303
Pagini: 236
Ilustrații: XVI, 217 p. 13 illus., 6 illus. in color.
Dimensiuni: 160 x 241 x 19 mm
Greutate: 0.52 kg
Ediția:1st ed. 2020
Editura: Springer
Locul publicării:Cham, Switzerland

Cuprins

Introduction.- Preliminaries: Basics and Notation.- Preliminaries: Device-independent Concepts.- Introduction to the Showcases.- Single-round Box.- Multi-round Box.- Working Under the IID Assumption.- Reductions to IID: Parallel Interaction.- Reductions to IID: Sequential Interaction.- Showcase: Non-signalling Parallel Repetition.- Showcase: Device-independent Quantum Cryptography.- Outlook.- Appendix.

Notă biografică

Rotem Arnon-Friedman is a postdoctoral researcher at the Electrical Engineering and Computer Science department of University of California Berkeley, USA. She received her PhD at the Institute for Theoretical Physics, ETH Zurich, Switzerland, under the supervision of Prof. Renato Renner. Prior to that, she completed her MSc at the Computer Science department of Tel-Aviv University, Israel, under the supervision of Prof. Amnon Ta-Shma.

Textul de pe ultima copertă

Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the devices used by the communication partners, such as photon sources and detectors, deviate from their theoretical specifications. This is of high practical relevance, for attacks to current implementations of quantum cryptography exploit exactly such deviations. Device-independent cryptography is however technologically so demanding that it looked as if experimental realizations are out of reach.

In her thesis, Rotem Arnon-Friedman presents powerful information-theoretic methods to prove the security of device-independent quantum cryptography. Based on them, she is able to establish security in a parameter regime that may be experimentally achievable in the near future. Rotem Arnon-Friedman's thesis thus provides the theoretical foundations for an  experimental demonstration of device-independent quantum cryptography. 


Caracteristici

Nominated as an outstanding Ph.D. thesis by the ETH Zurich, Zürich, Switzerland Serves as an ideal starting point for those entering the field of device-independent information processing Presents powerful information-theoretic methods to prove security claims