
Quantum Communication and Cryptography
- 1st Edition - October 1, 2025
- Imprint: Morgan Kaufmann
- Author: Walter Krawec
- Language: English
- Paperback ISBN:9 7 8 - 0 - 4 4 3 - 2 1 5 3 2 - 2
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 2 1 5 3 3 - 9
Quantum Communication and Cryptography introduces readers to the theory of quantum cryptography, with a focus will on quantum key distribution (QKD) and more advanced quantum c… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteQuantum Communication and Cryptography introduces readers to the theory of quantum cryptography, with a focus will on quantum key distribution (QKD) and more advanced quantum cryptographic protocols beyond QKD. It contains a brief introduction to the field of modern cryptography that is needed to fully appreciate and understand how quantum cryptographic systems are proven secure, and how they can be safely used in combination with current day classical systems. Readers are then introduced to quantum key distribution (QKD) - perhaps the most celebrated, and currently the most practical, of quantum cryptographic techniques.
Basic protocols are described, and security proofs are given, providing readers with the knowledge needed to understand how QKD protocols are proven secure using modern, state- of-the-art definitions of security. Following this, more advanced QKD protocols are discussed, along with alternative quantum and classical methods to improve QKD performance. Finally, alternative quantum cryptographic protocols are covered, along with a discussion on some of the practical considerations of quantum secure communication technology. Throughout, protocols are described in a clear and consistent manner that still provides comprehensive, theoretical proofs and methods.
- Offers an in-depth explanation of quantum communication and quantum key distribution
- Discusses state-of-the-art security definitions and methodologies, thus allowing readers to become knowledgeable in how to prove the security of quantum cryptographic protocols
- Provides real-life examples and problems, with discussions on the practical issues surrounding the implementation of cryptographic protocols
Information security and Quantum technology professionals, Computer Science analysts, consultants, and researchers in academia and industry, Graduate students and senior undergraduate students in Computer Science, information security, and Quantum technology
2: Background
2.1 Basic Linear Algebra
2.2 Quantum States, Dirac Notation
2.3 Quantum Measurement and Evolution
2.4 Entanglement
3: Quantum Information Theory
3.1 Density Operators
3.2 Shannon and von Neumann entropy
3.3 Quantum min entropy and entropic uncertainty
3.4 Modelling Quantum Protocols
4: Modern Cryptography
4.1 Historical cryptography versus modern cryptography
4.2 Defining (and proving) security
4.3 Encryption and Authentication
4.4 Key Distribution and Public Key Cryptography
5: Quantum Key Distribution (QKD) Protocols
5.1 Goal of QKD and the BB84 protocol
5.2 Stages of a QKD protocol
5.3 Basic QKD protocols: E91, B92, SARG04
5.4 Basic post processing techniques
5.5 Strengths and limitations of QKD
6: Security of QKD
6.1 Security goal and composable security
6.2 Asymptotic Security Proof of BB84
6.3 Finite Key Security
6.4 Alternative Security Proof Techniques: Quantum sampling
7: Advanced QKD
7.1 Two-way QKD: LM04 and the SDC protocol
7.2 Semi-quantum cryptography
7.3 Improving noise tolerance through classical post processing
7.4 Large scale QKD Networks
8: Random Number Generation and Device Independence*
8.1 Quantum Random Number Generation
8.2 Source Independence
8.3 Measurement Device Independence
8.4 Device Independence
9: High-Dimensional Quantum Cryptography
9.1 High dimensional BB84 - protocol and security proof
9.2 High dimensional random number generation *
9.3 Round Robin protocol
9.4 Group-key protocols
9.5 Creating high-dimensional states
10: Alternative Security Models and Cryptographic Primitives
10.1 Certified Deletion *
10.2 Bounded and Noisy Storage Model
10.3 Game Theoretic Security
10.4 Quantum public keys
10.5 Quantum Direct Communication
11: Practical Quantum Cryptography and Communication
11.1 Practical QKD Implementation
11.2 Practical device limitations
11.3 Decoy-state BB84
11.4 Side channel attacks and mitigation strategies
11.5 Hybrid quantum/post-quantum solutions
- Edition: 1
- Published: October 1, 2025
- No. of pages (Paperback): 250
- No. of pages (eBook): 250
- Imprint: Morgan Kaufmann
- Language: English
- Paperback ISBN: 9780443215322
- eBook ISBN: 9780443215339
WK