量子保密通信
¥
26.33
4.5折
¥
59
九品
仅1件
作者曾贵华 著
出版社高等教育出版社
出版时间2010-01
版次1
装帧精装
货号A13
上书时间2024-10-31
商品详情
- 品相描述:九品
图书标准信息
-
作者
曾贵华 著
-
出版社
高等教育出版社
-
出版时间
2010-01
-
版次
1
-
ISBN
9787040254792
-
定价
59.00元
-
装帧
精装
-
开本
16开
-
纸张
胶版纸
-
页数
368页
-
字数
450千字
-
正文语种
英语
-
丛书
信息安全系列丛书
- 【内容简介】
-
QuantumPrivateCommunicationcoversthefundamentalsoftheareasofsecurecommunication,quantumcryptography,quantumcommunication,andtheirphysicalimplementationwithapplications.Thebookappearsinatimelymannerforanemergingfieldatthecrossroadofclassicprivatecommunicationandquantumphysics.
Graduatestudentsandscientistsalikeincommunicationengineering,computerscience,electronicengineering,physicsandmathematicswillbenefitfromthebook.
- 【作者简介】
-
ProfessorGuihuaZengteachesandconductsresearchattheDepartmentofElectronicEngineeringofShanghaiJiaoTongUniversityandspentanAlexandervonHumboldtFellowshipattheUniversityofFreiburg,Germany.
- 【目录】
-
1Introduction
1.1SecurityRequirementsofCommunication
1.2OverviewofQuantumPrivateCommunication
1.3PrivateCommunicationModels
1.3.1ClassicSecureCommunicationModel
1.3.2QuantumPrivateCommunicationModel
1.4HistoryofQuantumPrivateCommunication
1.5RelationshipwithOtherSubjects
1.6NotationsandConventions
1.6.1RandomVariables
1.6.2CryptosystemandCipher
References
2QuantumSecurityTheory
2.1Introduction
2.2MathematicalBackground
2.2.1HilbertSpace
2.2.2PropertiesofHilbertSpace
2.2.3Operators
2.2.4SeveralImportantOperators
2.2.5MatricesDecomposition
2.3IntroductiontoQuantumMechanics
2.3.1QuantumSystems
2.3.2DynamicCharacteristicsofQuantumSystems
2.3.3InformationRetrievalofQuantumSystems
2.3.4FundamentofQuantumOptics
2.4IntroductiontoInformationTheory
2.4.1Entropy
2.4.2MutualInformation
2.4.3QuantumFanoInequality
2.5IntroductiontoComplexityTheory
2.5.1TuringMachine
2.5.2ClassicComplexity
2.5.3QuantumComplexity
2.6SecurityModel
2.6.1Information-theoreticSecurity
2.6.2ComputationalSecurity
2.6.3AttackStrategyAnalysis
References
3QuantumBits
3.1ClassicBits
3.2QuantumBitDefinition
3.2.1BinaryQubit
3.2.2P-aryQubit
3.2.3CompositeQubit
3.3QuantumBitTransformation
3.3.1QuantumLogicGates
3.3.2QuantumCircuits
3.4MathematicalProperty
3.4.1BlochSphere
3.4.2OrthogonalityofOppositePoints
3.4.3RotationsonBlochSphere
3.5PhysicalProperty
3.5.1Superposition
3.5.2Entanglement
3.5.3Distinguishability
3.5.4QuantumNo-cloning
3.6InformationProperty
3.6.1SingleQubitInformation
3.6.2NonorthogonalQubitsInformation
References
4QuantumKeyDistribution
4.1IntuitiononQKD
4.2StandardQKDSchemes
4.2.1BB84Protocol
4.2.2B92Protocol
4.3QuantumCommunicationModelforQKD
4.3.1QuantumSource
4.3.2QuantumChannel
4.3.3QuantumSink
4.4Reconciliation
4.4.1ReconciliationModel
4.4.2BinaryReconciliationProtocol
4.4.3Non-BinaryReconciliationProtocol
4.5PrivacyAmplification
4.5.1PrivacyAmplificationPrinciple
4.5.2PrivacyAmplificationTechniques
4.6SecurityModelforQKD
4.6.1SecurityTheory
4.6.2TypicalAttackStrategies
References
5QuantumCryptosystem
5.1Introduction
5.2QKD-basedCryptosystem
5.3QuantumVernamCipher
5.3.1ClassicVernamAlgorithm
5.3.2QuantumVernamCipher
5.3.3PrivateQuantumChannel
5.3.4SecurityModel
5.4TypicalQuantumVernamCiphers
5.4.1Classic-key-basedQuantumVernamCipher
5.4.2Bell-key-basedQuantumVernamCipher
5.4.3TeleportationasQuantumVernamCipher
5.5QuantumBlockCipher
5.5.1TheoreticalModel
5.5.2QuantumBlockAlgorithmforBinaryBits
5.6QuantumPublicKeyCryptosystem
5.7TypicalQuantumPublic-keyAlgorithms
5.7.1AlgorithmbasedSubset-sumProblem
5.7.2AlgorithmbasedQuantumCoding
References
6QuantumAuthentication
6.1Introduction
6.2AuthenticationTheory
6.2.1AuthenticationCategories
6.2.2SecurityModel
6.3MessageAuthenticationCode
6.3.1EncodingApproach
6.3.2HashFunctionApproach
6.4QuantumIdentityAuthentication
6.4.1SchemeDescription
6.4.2SecurityAnalysis
6.4.3InImperfectChannel
6.5QuantumSignaturePrinciple
6.6ArbitratedQuantumSignature
6.6.1AlgorithmDescription
6.6.2SecurityAnalysis
6.7TrueQuantumSignature
6.7.1AlgorithmDescription
6.7.2SecurityAnalysis
……
Index
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价