High-Rate, High-Dimensional Quantum Key Distribution Systems: Springer Theses
Autor Nurul T. Islamen Limba Engleză Hardback – 11 oct 2018
Din seria Springer Theses
- 18%
Preț: 960.54 lei - 15%
Preț: 617.28 lei -
Preț: 373.68 lei - 18%
Preț: 749.08 lei -
Preț: 372.05 lei - 18%
Preț: 1336.71 lei - 15%
Preț: 618.91 lei - 18%
Preț: 962.00 lei -
Preț: 379.10 lei -
Preț: 375.86 lei - 18%
Preț: 909.08 lei -
Preț: 384.20 lei - 18%
Preț: 1060.72 lei - 18%
Preț: 1064.50 lei - 18%
Preț: 1067.54 lei - 15%
Preț: 618.91 lei - 18%
Preț: 908.31 lei - 15%
Preț: 621.42 lei - 18%
Preț: 1061.89 lei -
Preț: 373.40 lei - 15%
Preț: 623.27 lei -
Preț: 374.23 lei - 15%
Preț: 614.78 lei - 15%
Preț: 619.58 lei - 15%
Preț: 620.03 lei - 18%
Preț: 1065.27 lei - 15%
Preț: 619.14 lei - 18%
Preț: 961.40 lei - 18%
Preț: 1067.54 lei - 18%
Preț: 1329.13 lei - 18%
Preț: 964.49 lei - 18%
Preț: 1172.17 lei - 18%
Preț: 1068.71 lei - 18%
Preț: 966.67 lei - 18%
Preț: 1172.94 lei - 18%
Preț: 906.80 lei - 18%
Preț: 959.13 lei - 15%
Preț: 617.77 lei - 15%
Preț: 620.73 lei - 18%
Preț: 1169.91 lei - 15%
Preț: 615.93 lei - 18%
Preț: 853.71 lei -
Preț: 375.86 lei - 18%
Preț: 1063.77 lei -
Preț: 407.71 lei - 15%
Preț: 614.32 lei - 15%
Preț: 618.21 lei - 15%
Preț: 615.02 lei - 15%
Preț: 615.68 lei
Preț: 617.28 lei
Preț vechi: 726.22 lei
-15%
Puncte Express: 926
Carte tipărită la comandă
Livrare economică 29 mai-12 iunie
Specificații
ISBN-13: 9783319989280
ISBN-10: 3319989286
Pagini: 148
Ilustrații: XIII, 132 p. 50 illus., 49 illus. in color.
Dimensiuni: 160 x 241 x 14 mm
Greutate: 0.4 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Springer Theses
Seria Springer Theses
Locul publicării:Cham, Switzerland
ISBN-10: 3319989286
Pagini: 148
Ilustrații: XIII, 132 p. 50 illus., 49 illus. in color.
Dimensiuni: 160 x 241 x 14 mm
Greutate: 0.4 kg
Ediția:1st ed. 2018
Editura: Springer
Colecția Springer Theses
Seria Springer Theses
Locul publicării:Cham, Switzerland
Cuprins
Chapter1. Introduction.- Chapter2. Building blocks of Quantum Key Distribution.- Chapter3. High-Dimensional Time-Phase QKD.- Chapter4. Unstructured high-dimensional Time-Phase QKD.- Chapter5. Scalable High-Dimensional Time-bin QKD.- Chapter6. Cloning of high-dimensional quantum states.- Chapter7. Conclusions and Future Experiments.
Notă biografică
Nurul T. Islam received his PhD from Duke University in 2017. He currently holds a postdoctoral research position at The Ohio State University.
Textul de pe ultima copertă
This book describes a broad research program on quantum communication. Here, a cryptographic key is exchanged by two parties using quantum states of light and the security of the system arises from the fundamental properties of quantum mechanics. The author developed new communication protocols using high-dimensional quantum states so that more than one classical bit is transferred by each photon. This approach helps circumvent some of the non-ideal properties of the experimental system, enabling record key rates on metropolitan distance scales. Another important aspect of the work is the encoding of the key on high-dimensional phase-randomized weak coherent states, combined with so-called decoy states to thwart a class of possible attacks on the system. The experiments are backed up by a rigorous security analysis of the system, which accounts for all known device non-idealities. The author goes on to demonstrate a scalable approach for increasing the dimension of the quantum states, and considers attacks on the system that use optimal quantum cloning techniques. This thesis captures the current state-of-the-art of the field of quantum communication in laboratory systems, and demonstrates that phase-randomized weak coherent states have application beyond quantum communication.
Caracteristici
Nominated as an outstanding PhD thesis by Duke University, USA Develops new communication protocols using high-dimensional quantum states that achieve record key rates on metropolitan distance scales Demonstrates encoding of the key on high-dimensional phase-randomized weak coherent states combined with decoy states to thwart possible attacks Backs up all experimental results by rigorous security analysis accounting for all known device non-idealities