Skip to main content
  • 996 Accesses

Abstract

In this chapter, the basic concepts of both physical-layer security (PLS) and quantum-key distribution (QKD) are introduced. The chapter starts with the role of PLS , following by a brief overview of conventional key-based cryptographic systems. The concept of information-theoretic security is introduced next, and the perfect secrecy condition is described. The computational security is described as a special case of information-theoretic security in which several relaxations are introduced. The concepts of strong and weak secrecy are then introduced. Further, the degraded wiretap channel model, introduced by Wyner, is described, and corresponding wiretap channel codes are defined. After that, the broadcast channel with confidential messages , introduced by Csiszár and Körner, is described then, together with corresponding stochastic code. The last topic in PLS section is devoted to the secret-key agreement protocol. The QKD section describes first how to break the RSA protocol with the help of Shor’s factorization algorithm, followed by the brief description of foundations for both discrete variable (DV) and continuous variable (CV) QKD schemes. The key limitations of DV-QKD schemes are identified. Various QKD protocols are placed into three generic categories: device-dependent QKD , source-device-independent QKD , and measurement-device-independent (MDI) QKD . Further, the definition of the secrecy fraction for QKD protocols is provided, following by the brief description of individual (incoherent) and collective attacks , and explanation of how to calculate the corresponding secrecy fractions. In section on the organization of the book, the detailed description of the content of the chapters is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. X.800: Security architecture for open systems interconnection for CCITT applications, Recommendation X.800 (03/91). https://www.itu.int/rec/T-REC-X.800-199103-I

  2. Bloch M (2008) Physical-layer security. PhD dissertation, School of Electrical and Computer Engineering, Georgia Institute of Technology

    Google Scholar 

  3. Bloch M, Barros J (2011) Physical-layer security: from information theory to security engineering. Cambridge University Press, Cambridge

    Book  Google Scholar 

  4. Bloch M (2014) Fundamentals of physical layer security. In: Zhou X, Song L, Zhang Y (eds) Physical layer security in wireless communications. CRC Press, Boca Raton, London, New York, pp 1–16

    Google Scholar 

  5. Chorti A et al (2016) Physical layer security: a paradigm shift in data confidentiality. In Physical and data-link security techniques for future communications systems. Lecture notes in electrical engineering, vol 358. Springer, pp 1–15

    Google Scholar 

  6. Bloch M, Barros J, Rodrigues MRD, McLaughlin SW (2008) Wireless information-theoretic security. IEEE Trans Inform Theory 54(6):2515–2534

    Article  MathSciNet  Google Scholar 

  7. Bennet CH, Brassard G (1984) Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE international conference on computers, systems, and signal processing, Bangalore, India, pp 175–179

    Google Scholar 

  8. Bennett CH (1992) Quantum cryptography: uncertainty in the service of privacy. Science 257:752–753

    Article  ADS  Google Scholar 

  9. Neilsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge

    Google Scholar 

  10. Van Assche G (2006) Quantum cryptography and secrete-key distillation. Cambridge University Press, Cambridge, New York

    Book  Google Scholar 

  11. Djordjevic IB (2012) Quantum information processing and quantum error correction: an engineering approach. Elsevier/Academic Press, Amsterdam, Boston

    Google Scholar 

  12. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  Google Scholar 

  13. Schneier B (2015) Applied cryptography, second edition: protocols, algorithms, and source code in C. Wiley, Indianapolis, IN

    Book  Google Scholar 

  14. Drajic D, Ivanis P (2009) Introduction to information theory and coding, 3rd edn. Akademska Misao, Belgrade, Serbia. (in Serbian)

    Google Scholar 

  15. Haykin S (2001) Communication systems, 4th edn. Wiley, Hamilton Printing Company, Canada

    Google Scholar 

  16. Katz J, Lindell Y (2015) Introduction to modern cryptography, 2nd edn. CRC Press, Boca Raton, FL

    MATH  Google Scholar 

  17. Diffie W, Hellman ME (1976) New direction in cryptography. IEEE Trans Inform Theory 22:644–654

    Article  MathSciNet  Google Scholar 

  18. Hellman ME (1977) An extension of the Shannon theory approach to cryptography. IEEE Trans Inform Theory 23:289–294

    Article  MathSciNet  Google Scholar 

  19. Rivest RL, Shamir A, Adleman L (1983) Cryptographic communications system and method. US Patent 4,405,829

    Google Scholar 

  20. Merkle M (1978) Secure communication over an insecure channel. Comm ACM 21:294–299

    Article  Google Scholar 

  21. McEliece RJ (1978) A public key cryptosystem based on algebraic coding theory. JPL DSN Prog Rep 42–44:114–116

    Google Scholar 

  22. Aumasson J-P (2018) Serious cryptography: a practical introduction to modern encryption. No Starch Press, San Francisco, CA

    MATH  Google Scholar 

  23. Kahn D (1967) The codebreakers: the story of secret writing. Macmillan Publishing Co., Ney York

    Google Scholar 

  24. Sebbery J, Pieprzyk J (1989) Cryptography: an introduction to computer security. Prentice Hall, New York

    Google Scholar 

  25. Delfs H, Knebl H (2015) Introduction to cryptography: principles and applications (information security and cryptography), 3rd edn. Springer, Heidelberg, New York

    Google Scholar 

  26. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Comm ACM 21(2):120–126

    Article  MathSciNet  Google Scholar 

  27. Le Bellac M (2006) An introduction to quantum information and quantum computation. Cambridge University Press

    Google Scholar 

  28. Shor PW (1997) Polynomial-time algorithms for prime number factorization and discrete logarithms on a quantum computer. SIAM J Comput 26(5):1484–1509

    Article  MathSciNet  Google Scholar 

  29. Ekert A, Josza R (1996) Quantum computation and Shor’s factoring algorithm. Rev Modern Phys 68(3):733–753

    Article  ADS  MathSciNet  Google Scholar 

  30. Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387

    Article  MathSciNet  Google Scholar 

  31. Lin F, Oggier F (2014) Coding for wiretap channels. In: Zhou X, Song L, Zhang Y (eds) Physical layer security in wireless communications. CRC Press, Boca Raton, London, New York, pp 17–32

    Chapter  Google Scholar 

  32. Csiszár I, Körner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339–348

    Article  MathSciNet  Google Scholar 

  33. Bennett CH, Brassard G, Crepeau C, Maurer U (1995) Generalized privacy amplification. IEEE Inform Theory 41(6):1915–1923

    Article  MathSciNet  Google Scholar 

  34. Ahlswede R, Csiszár I (1993) Common randomness in information theory and cryptography-Part I: Secret sharing. IEEE Trans Inf Theory 39(4):1121–1132

    Article  Google Scholar 

  35. Barnett SM (2009) Quantum information. Oxford University Press, Oxford

    MATH  Google Scholar 

  36. Liao S-K et al (2017) Satellite-to-ground quantum key distribution. Nature 549:43–47

    Article  ADS  Google Scholar 

  37. Scarani V, Bechmann-Pasquinucci H, Cerf NJ, Dušek M, Lütkenhaus N, Peev M (2009) The security of practical quantum key distribution. Rev Mod Phys 81:1301

    Article  ADS  Google Scholar 

  38. Devetak I, Winter A (2005) Distillation of secret key and entanglement from quantum states. Proc R Soc Lond Ser A 461(2053):207–235

    Article  ADS  MathSciNet  Google Scholar 

  39. Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733–742

    Article  MathSciNet  Google Scholar 

  40. Holevo AS (1973) Bounds for the quantity of information transmitted by a quantum communication channel. Probl Inf Transm 9(3):177–183

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ivan B. Djordjevic .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Djordjevic, I.B. (2019). Introduction. In: Physical-Layer Security and Quantum Key Distribution . Springer, Cham. https://doi.org/10.1007/978-3-030-27565-5_1

Download citation

Publish with us

Policies and ethics