Abstract
In this chapter, the basic concepts of both physical-layer security (PLS) and quantum-key distribution (QKD) are introduced. The chapter starts with the role of PLS , following by a brief overview of conventional key-based cryptographic systems. The concept of information-theoretic security is introduced next, and the perfect secrecy condition is described. The computational security is described as a special case of information-theoretic security in which several relaxations are introduced. The concepts of strong and weak secrecy are then introduced. Further, the degraded wiretap channel model, introduced by Wyner, is described, and corresponding wiretap channel codes are defined. After that, the broadcast channel with confidential messages , introduced by Csiszár and Körner, is described then, together with corresponding stochastic code. The last topic in PLS section is devoted to the secret-key agreement protocol. The QKD section describes first how to break the RSA protocol with the help of Shor’s factorization algorithm, followed by the brief description of foundations for both discrete variable (DV) and continuous variable (CV) QKD schemes. The key limitations of DV-QKD schemes are identified. Various QKD protocols are placed into three generic categories: device-dependent QKD , source-device-independent QKD , and measurement-device-independent (MDI) QKD . Further, the definition of the secrecy fraction for QKD protocols is provided, following by the brief description of individual (incoherent) and collective attacks , and explanation of how to calculate the corresponding secrecy fractions. In section on the organization of the book, the detailed description of the content of the chapters is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
X.800: Security architecture for open systems interconnection for CCITT applications, Recommendation X.800 (03/91). https://www.itu.int/rec/T-REC-X.800-199103-I
Bloch M (2008) Physical-layer security. PhD dissertation, School of Electrical and Computer Engineering, Georgia Institute of Technology
Bloch M, Barros J (2011) Physical-layer security: from information theory to security engineering. Cambridge University Press, Cambridge
Bloch M (2014) Fundamentals of physical layer security. In: Zhou X, Song L, Zhang Y (eds) Physical layer security in wireless communications. CRC Press, Boca Raton, London, New York, pp 1–16
Chorti A et al (2016) Physical layer security: a paradigm shift in data confidentiality. In Physical and data-link security techniques for future communications systems. Lecture notes in electrical engineering, vol 358. Springer, pp 1–15
Bloch M, Barros J, Rodrigues MRD, McLaughlin SW (2008) Wireless information-theoretic security. IEEE Trans Inform Theory 54(6):2515–2534
Bennet CH, Brassard G (1984) Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE international conference on computers, systems, and signal processing, Bangalore, India, pp 175–179
Bennett CH (1992) Quantum cryptography: uncertainty in the service of privacy. Science 257:752–753
Neilsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge
Van Assche G (2006) Quantum cryptography and secrete-key distillation. Cambridge University Press, Cambridge, New York
Djordjevic IB (2012) Quantum information processing and quantum error correction: an engineering approach. Elsevier/Academic Press, Amsterdam, Boston
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Schneier B (2015) Applied cryptography, second edition: protocols, algorithms, and source code in C. Wiley, Indianapolis, IN
Drajic D, Ivanis P (2009) Introduction to information theory and coding, 3rd edn. Akademska Misao, Belgrade, Serbia. (in Serbian)
Haykin S (2001) Communication systems, 4th edn. Wiley, Hamilton Printing Company, Canada
Katz J, Lindell Y (2015) Introduction to modern cryptography, 2nd edn. CRC Press, Boca Raton, FL
Diffie W, Hellman ME (1976) New direction in cryptography. IEEE Trans Inform Theory 22:644–654
Hellman ME (1977) An extension of the Shannon theory approach to cryptography. IEEE Trans Inform Theory 23:289–294
Rivest RL, Shamir A, Adleman L (1983) Cryptographic communications system and method. US Patent 4,405,829
Merkle M (1978) Secure communication over an insecure channel. Comm ACM 21:294–299
McEliece RJ (1978) A public key cryptosystem based on algebraic coding theory. JPL DSN Prog Rep 42–44:114–116
Aumasson J-P (2018) Serious cryptography: a practical introduction to modern encryption. No Starch Press, San Francisco, CA
Kahn D (1967) The codebreakers: the story of secret writing. Macmillan Publishing Co., Ney York
Sebbery J, Pieprzyk J (1989) Cryptography: an introduction to computer security. Prentice Hall, New York
Delfs H, Knebl H (2015) Introduction to cryptography: principles and applications (information security and cryptography), 3rd edn. Springer, Heidelberg, New York
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Comm ACM 21(2):120–126
Le Bellac M (2006) An introduction to quantum information and quantum computation. Cambridge University Press
Shor PW (1997) Polynomial-time algorithms for prime number factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484–1509
Ekert A, Josza R (1996) Quantum computation and Shor’s factoring algorithm. Rev Modern Phys 68(3):733–753
Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387
Lin F, Oggier F (2014) Coding for wiretap channels. In: Zhou X, Song L, Zhang Y (eds) Physical layer security in wireless communications. CRC Press, Boca Raton, London, New York, pp 17–32
Csiszár I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339–348
Bennett CH, Brassard G, Crepeau C, Maurer U (1995) Generalized privacy amplification. IEEE Inform Theory 41(6):1915–1923
Ahlswede R, Csiszár I (1993) Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans Inf Theory 39(4):1121–1132
Barnett SM (2009) Quantum information. Oxford University Press, Oxford
Liao S-K et al (2017) Satellite-to-ground quantum key distribution. Nature 549:43–47
Scarani V, Bechmann-Pasquinucci H, Cerf NJ, Dušek M, Lütkenhaus N, Peev M (2009) The security of practical quantum key distribution. Rev Mod Phys 81:1301
Devetak I, Winter A (2005) Distillation of secret key and entanglement from quantum states. Proc R Soc Lond Ser A 461(2053):207–235
Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742
Holevo AS (1973) Bounds for the quantity of information transmitted by a quantum communication channel. Probl Inf Transm 9(3):177–183
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Djordjevic, I.B. (2019). Introduction. In: Physical-Layer Security and Quantum Key Distribution . Springer, Cham. https://doi.org/10.1007/978-3-030-27565-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-27565-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27564-8
Online ISBN: 978-3-030-27565-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)