LEADER 04139nam 22007575 450 001 9910919816003321 005 20241227115230.0 010 $a9783031784286 010 $a3031784286 024 7 $a10.1007/978-3-031-78428-6 035 $a(MiAaPQ)EBC31862458 035 $a(Au-PeEL)EBL31862458 035 $a(CKB)37093687200041 035 $a(DE-He213)978-3-031-78428-6 035 $a(OCoLC)1482816619 035 $a(EXLCZ)9937093687200041 100 $a20241227d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDesign and Analysis of Secure Quantum Communication Schemes /$fby Ri-Gui Zhou, Xiao-Xue Zhang, Lin-Tao Du 205 $a1st ed. 2024. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2024. 215 $a1 online resource (295 pages) 311 08$a9783031784279 311 08$a3031784278 327 $aChapter 1: Introduction -- Chapter 2: Fundamentals of Quantum Information Theory -- Chapter 3: Quantum Key Distribution -- Chapter 4: Quantum Secret Sharing -- Chapter 5: Quantum Direct Communication -- Chapter 6: Quantum Key Agreement -- Chapter 7: Quantum Private Query -- Chapter 8: Quantum Network Coding. 330 $aThis book provides a comprehensive guide to the design and analysis of quantum secure communication schemes. While quantum computers may provide a platform for arithmetic calculations which threaten classical cryptosystems, the development of quantum information has also brought a corresponding solution: quantum cryptography, which is the basis of quantum secure communication. Quantum secure communication (QSC) uses quantum states for key agreement and information transmission, and uses the basic principles of quantum mechanics to discover eavesdropping behavior, and to ensure the security of information. It can overcome the security risks of classical encryption technology and can securely distribute keys in real time via public channels. Beginning in 1984 with the first conception of quantum key distribution (QKD) based on single-photon polarization states, subsequent innovations include quantum identity authentication (QIA), quantum secret sharing (QSS), quantum direct communication (QDC), quantum key agreement (QKA), quantum private query (QPQ), and quantum network coding (QNC). Each of these schemes is explored in detail based on different environments and structures, along with specific security and feasibility analyses. This book is essential reading for academic researchers and graduate students in quantum science and technology, as well as professionals and engineers in quantum industries and cybersecurity. 606 $aQuantum communication 606 $aQuantum computers 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aTelecommunication 606 $aQuantum Communications and Cryptography 606 $aQuantum Computing 606 $aCoding and Information Theory 606 $aDesign and Analysis of Algorithms 606 $aMicrowaves, RF Engineering and Optical Communications 606 $aCommunications Engineering, Networks 615 0$aQuantum communication. 615 0$aQuantum computers. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 0$aTelecommunication. 615 14$aQuantum Communications and Cryptography. 615 24$aQuantum Computing. 615 24$aCoding and Information Theory. 615 24$aDesign and Analysis of Algorithms. 615 24$aMicrowaves, RF Engineering and Optical Communications. 615 24$aCommunications Engineering, Networks. 676 $a530.12 676 $a652.8 700 $aZhou$b Ri-Gui$01781610 701 $aZhang$b Xiao-Xue$01781611 701 $aDu$b Lin-Tao$01781612 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910919816003321 996 $aDesign and Analysis of Secure Quantum Communication Schemes$94306452 997 $aUNINA