Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Quantum cryptography: a survey
Bruss D., Erdélyi G., Meyer T., Riege T., Rothe J. ACM Computing Surveys39 (2):6-es,2007.Type:Article
Date Reviewed: Aug 10 2007

Despite its title, this survey develops only two applications of cryptographic protocols in quantum computing: key distribution and bit commitment protocol, both of which relate to the BB84 protocol proposed in 1984 by Bennett and Brassard [1].

The first section is an introduction. Section 2 describes the fundamentals of classical cryptography, including easy examples. Section 3 provides some background on quantum mechanics. In section 4, the BB84 quantum key distribution protocol is presented and its security is discussed; in particular, the authors describe an entanglement-based version of BB84 (akin to Ekert’s protocol), providing a proof of its security (devised by Shor and Preskill) and showing that it is equivalent to the prepare-and-measure version of the classical BB84 protocol. Section 5 presents the BB84 quantum bit commitment protocol, based on the ideas of Bennett and Brassard, and shows that the security of unconditional quantum bit commitment is impossible. A brief outlook and some conclusions are provided in section 6.

The first two sections have many unnecessary details like the scytale encryption method and a definition of cryptosystems, and ignore some notions related to coding theory that are used later in the paper. However, the two main sections of the paper, 4 and 5, are interesting and offer fine information about some of the stages of such quantum cryptographic protocols.

Reviewer:  Adrian Atanasiu Review #: CR134632 (0807-0695)
1) Bennett, C.H.; Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Proc. of the IEEE Intern. Conf. on Computers, Systems, and Signal Processing IEEE Computer Society Press, 1984, 175–179.
Bookmark and Share
  Reviewer Selected
 
 
Code Breaking (E.3 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Error Control Codes (E.4 ... )
 
 
Physics (J.2 ... )
 
 
Coding And Information Theory (E.4 )
 
 
Computation By Abstract Devices (F.1 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Code Breaking": Date
Correlation properties of an improved summation generator with 2-bit memory
Chan C., Cheng L. Signal Processing 82(6): 907-909, 2002. Type: Article
Feb 14 2003
Strength of two data encryption standard implementations under timing attacks
Hevia A., Kiwi M. ACM Transactions on Information and System Security 2(4): 416-437, 1999. Type: Article
Jul 1 2000
An information-theoretic model for steganography
Cachin C. Information and Computation 192(1): 41-56, 2004. Type: Article
Oct 5 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy