Quantum Cryptography and Computation

  • Artur K. Ekert
Part of the NATO ASI Series book series (NSSB, volume 347)

Abstract

Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology1 remain unknown [1].

Keywords

Hydroxyl Europe Peris Stein Gallium 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    D. Kahn, The Codebreakers: The Story of Secret Writing, Macmillan, New York (1967).Google Scholar
  2. [2]
    There are several good textbooks on cryptology where the modern techniques are explained, my favourite titles include: D. Welsh, Codes and Cryptography, Clarendon Press, Oxford (1988).MATHGoogle Scholar
  3. [2a]
    B. Schneier, Applied cryptography: protocols, algorithms, and source code in C., John Wiley & Sons, New York (1994).Google Scholar
  4. [2b]
    G. Brassard, Modern Cryptology: A Tutorial, Springer-Verlag, Berlin (1988).MATHGoogle Scholar
  5. [2c]
    D.E. Denning, Cryptography and Data Security, Addison-Wesley (1982).MATHGoogle Scholar
  6. [3]
    W. Diffie and M.E. Hellman, IEEE Trans. Inf. Theory IT-22, 644 (1977).MathSciNetGoogle Scholar
  7. [4]
    R. Rivest, A. Shamir, and L. Adleman, On Digital Signatures and Public-Key Cryptosystems, MIT Laboratory for Computer Science, Technical Report, MIT/LCS/TR-212 (January 1979).Google Scholar
  8. [5]
    P.W. Shor, Algorithms for quantum computation draft of April 18, 1994 manuscript, AT&T Bell Laboratories.Google Scholar
  9. [6]
    S. Wiesner, SIGACT News, 15, 78 (1983); original manuscript written circa 1970.CrossRefGoogle Scholar
  10. [7]
    C. H. Bennett and G. Brassard, in “Proc. IEEE Int. Conference on Computers, Systems and Signal Processing”, IEEE, New York, (1984).Google Scholar
  11. [8]
    A. K. Ekert, Phys. Rev. Lett. 67, 661 (1991).ADSCrossRefMathSciNetMATHGoogle Scholar
  12. [9]
    A. K. Ekert, J. G. Rarity, P. R. Tapster, and G. M. Palma, Phys. Rev. Lett. 69, 1293 (1992).ADSCrossRefGoogle Scholar
  13. [10]
    C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).ADSCrossRefMathSciNetMATHGoogle Scholar
  14. [11]
    A.K. Ekert, Nature 358, 14 (1992).ADSCrossRefGoogle Scholar
  15. [12]
    A.K. Ekert, B. Huttner, G.M. Palma, and A.Peres, Phys. Rev. A (in press).Google Scholar
  16. [13]
    I. D. Ivanovic, Phys. Lett. A 123, 257 (1987).ADSCrossRefMathSciNetGoogle Scholar
  17. [14]
    A. Peres, Phys. Lett. A 128, 19 (1988).ADSCrossRefMathSciNetGoogle Scholar
  18. [15]
    P. Busch, P. J. Lahti, and P. Mittelstaedt, The Quantum Theory of Measurement, Springer, Berlin (1991).Google Scholar
  19. [16]
    A. Peres, Quantum Theory: Concepts and Methods, Kluwer, Dordrecht (1993), Chapt. 9.MATHGoogle Scholar
  20. [17]
    P. Grangier and A. Aspect, Phys. Rev. Lett. 54, 418 (1985).ADSCrossRefGoogle Scholar
  21. [18]
    C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, J. Crypt. 5, 3 (1992).CrossRefMATHGoogle Scholar
  22. [19]
    P. D. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29, 634 ibid. 1291 (1993).CrossRefGoogle Scholar
  23. [20]
    A. Muller, J. Breguet, and N. Gisin, Europhys. Lett., 23, 383 (1993); R. Hughes (Los Alamos, Progress Report).ADSCrossRefGoogle Scholar
  24. [21]
    D. Deutsch, Proc. R. Soc. London A 400, 97 (1985).ADSCrossRefMathSciNetMATHGoogle Scholar
  25. [22]
    C.H. Bennett, IBM J. Res. Dev. 17, 525 (1973).CrossRefMATHGoogle Scholar
  26. [23]
    R. Feynman, Int. J. Theor. Phys. 21, 467 (1982).CrossRefMathSciNetGoogle Scholar
  27. [23a]
    D. Deutsch and R. Jozsa, Proc. R. Soc. London A 439, 553 (1992).ADSCrossRefMathSciNetMATHGoogle Scholar
  28. [23b]
    A. Berthiaume and G. Brassard, in Proc. 7th IEEE Conference on Structure in Complexity Theory. (1992).Google Scholar
  29. [23c]
    E. Bernstein and U. Vazirani, in Proc. 25th ACMSymp. on Theory of Computation. (1993); D.R. Simon (private communication).Google Scholar
  30. [24]
    R.D. Silverman, Math. Comp. 48, 329 (1987).CrossRefMathSciNetMATHGoogle Scholar
  31. [25]
    A.K. Lenstra, H.W. Lenstra Jr., M.S. Manasse, and J.M. Pollard, in Proc. 22nd ACM Symposium on the Theory of Computing, pp.564–572 (1990).Google Scholar
  32. [26]
    D. Knuth, The Art of Computer Programming: Volume 2, Seminumerical Algorithms. Addison-Wesley (1981).Google Scholar
  33. [27]
    M.R. Schroeder, NumberTheory in Science and Communication. Springer-Verlag (1984).Google Scholar
  34. [28]
    D. Deutsch, Proc. R. Soc. London A 425, 73 (1989).ADSCrossRefMathSciNetMATHGoogle Scholar
  35. [29]
    A.Yao,Proc. 34th IEEE Symp. on Foundation of Computer Science pp.352–360, IEEE Computer Society Press, Los Alamitos, (1993).Google Scholar
  36. [30]
    D. Deutsch, A.K. Ekert, and A. Barenco (in preparation)Google Scholar
  37. [31]
    D.S. Chemla and D.A.B. Miller in Heterojuction band discountinuities, physics and device applications, eds. F. Capasso and G. Margaritondo, North-Holland, Elsevier Science Publishing Co., New York, (1987).Google Scholar
  38. [32]
    K. Obermayer, W.G. Teich, and G. Mahler, Phys.Rev. B 37, 8096 (1988).ADSCrossRefGoogle Scholar
  39. [32a]
    W.G. Teich and G. Mahler, Phys.Rev. A 45, 3300 (1992).ADSCrossRefGoogle Scholar
  40. [33]
    S. Lloyd, Science 261, 1569 (1993).ADSCrossRefGoogle Scholar
  41. [34]
    S. Haroche and J.M. Raimond, Advances in Atomic, Molecular and Optical Physics; Supplement 2 123 (1994).Google Scholar
  42. [35]
    W.S. Warren, Science 242, 878 (1988).ADSCrossRefGoogle Scholar
  43. [36]
    J. Hecht, The Laser Guidebook. McGraw-Hill, Inc. (1992).Google Scholar

Copyright information

© Springer Science+Business Media New York 1995

Authors and Affiliations

  • Artur K. Ekert
    • 1
  1. 1.Clarendon LaboratoryUniversity of OxfordOxfordUK

Personalised recommendations