16 Theory of Quantum Key Distribution (QKD)

Norbert Lütkenhaus

University of Waterloo, Institute for Quantum Computing, 200 University Ave. West, Waterloo, Ontario, N2L 3G1, Canada

16.1 Introduction

There are several communication tasks in which two parties would like to protect their communication against third party interference. One of them is secret communication, where the two parties would like to assure that no other party can gain some knowledge about the messages they exchange. Another task, for instance, is the problem of authenticating a message, that is, to enable a receiver of a message to verify that it indeed comes from the alleged sender in its exact form. Typically, a secret key is used up in the communication process, ...

Get Quantum Information, 2 Volume Set, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.