Our systems are now restored following recent technical disruption, and we’re working hard to catch up on publishing. We apologise for the inconvenience caused. Find out more

Recommended product

Popular links

Popular links


Introduction to Quantum Cryptography

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography

Thomas Vidick, California Institute of Technology, USA
Stephanie Wehner, Delft University of Technology, The Netherlands
September 2023
Hardback
9781316515655

Experience the eBook and the associated online resources on our new Higher Education website. Go to site For other formats please stay on this page.

NZD$93.95
inc GST
Hardback
USD
eBook

    This book offers an accessible and engaging introduction to quantum cryptography, assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of quantum cryptographic protocols. The title explores several important applications such as quantum key distribution, quantum money, and delegated quantum computation, while also serving as a self-contained introduction to the field of quantum computing. With frequent illustrations and simple examples relevant to quantum cryptography, this title focuses on building intuition and challenges readers to understand the basis of cryptographic security. Frequent worked examples and mid-chapter exercises allow readers to extend their understanding, and in-text quizzes, end-of-chapter homework problems, and recommended further reading reinforce and broaden understanding. Online resources available to instructors include interactive computational problems in Julia, videos, lecture slides, and a fully worked solutions manual.

    • Based on a successful online course (MOOC) created by the authors, this book is student focused, engaging, and employs extensive pedagogical resources to support student engagement and understanding
    • Curated digital support material from the MOOC provided to support student learning, which is signposted through the text to ensure that students can engage as needed
    • The first book on the market that covers a complete quantum cryptography course written for readers across disciplines

    Reviews & endorsements

    'If you are intrigued by the prospects of quantum cryptography but not yet familiar with the formalism behind it, then this book is the perfect starting point for you. It playfully introduces the most important concepts in modern quantum cryptography, and at the same time gently but purposefully helps you discover the mathematical framework required to make formal statements.' Marco Tomamichel, National University of Singapore

    'Vidick and Wehner cover quantum cryptography in its full beauty and depth. Packed with enlightening examples and comprehensive exercises, this book will likely become an indispensable companion next time I hold lectures on the subject.' Renato Renner, ETH Zurich

    'Thomas Vidick and Stephanie Wehner take readers on an insightful exploration of the full landscape of quantum cryptography, skillfully weaving together theory and applications and providing pedagogical quizzes and exercises. The mathematical formalism is rigorous yet approachable, making this book an excellent introduction to this captivating area.' Anne Broadbent, University of Ottawa

    '[An] exciting, clearly written and self-contained textbook … It is an ideal way for those interested in quantum cryptography to enter the field with no prior knowledge and emerge with the understanding and the tools to progress.' Barry R. Masters, Optica

    See more reviews

    Product details

    September 2023
    Adobe eBook Reader
    9781009027793
    0 pages
    This ISBN is for an eBook version which is distributed on our behalf by a third party.

    Table of Contents

    • Preface
    • 1. Background material
    • 2. Quantum tools and a first protocol
    • 3. Quantum money
    • 4. The power of entanglement
    • 5. Quantifying information
    • 6. From imperfect information to (near) perfect security
    • 7. Distributing keys
    • 8. Quantum key distribution protocols
    • 9. Quantum cryptography using untrusted devices
    • 10. Quantum cryptography beyond key distribution
    • 11. Security from physical assumptions
    • 12. Further topics around encryption
    • 13. Delegated computation
    • References
    • Index.