Skip to main content

Quantum Communication and Cryptography

  • 1st Edition - October 1, 2026
  • Latest edition
  • Author: Walter O. Krawec
  • Language: English

Quantum Communication and Cryptography introduces readers to the theory of quantum cryptography, with a focus will on quantum key distribution (QKD) and more advanced quantum c… Read more

Early spring sale

Nurture your knowledge

Grow your expertise with up to 25% off trusted resources.

Description

Quantum Communication and Cryptography introduces readers to the theory of quantum cryptography, with a focus will on quantum key distribution (QKD) and more advanced quantum cryptographic protocols beyond QKD. It contains a brief introduction to the field of modern cryptography that is needed to fully appreciate and understand how quantum cryptographic systems are proven secure, and how they can be safely used in combination with current day classical systems. Readers are then introduced to quantum key distribution (QKD) - perhaps the most celebrated, and currently the most practical, of quantum cryptographic techniques.

Basic protocols are described, and security proofs are given, providing readers with the knowledge needed to understand how QKD protocols are proven secure using modern, state- of-the-art definitions of security. Following this, more advanced QKD protocols are discussed, along with alternative quantum and classical methods to improve QKD performance. Finally, alternative quantum cryptographic protocols are covered, along with a discussion on some of the practical considerations of quantum secure communication technology. Throughout, protocols are described in a clear and consistent manner that still provides comprehensive, theoretical proofs and methods.

Key features

  • Offers an in-depth explanation of quantum communication and quantum key distribution
  • Discusses state-of-the-art security definitions and methodologies, thus allowing readers to become knowledgeable in how to prove the security of quantum cryptographic protocols
  • Provides real-life examples and problems, with discussions on the practical issues surrounding the implementation of cryptographic protocols

Readership

Information security and Quantum technology professionals, Computer Science analysts, consultants, and researchers in academia and industry, Graduate students and senior undergraduate students in Computer Science, information security, and Quantum technology

Table of contents

1: Introduction


2: Background

2.1 Basic Linear Algebra

2.2 Quantum States, Dirac Notation

2.3 Quantum Measurement and Evolution

2.4 Entanglement


3: Quantum Information Theory

3.1 Density Operators

3.2 Shannon and von Neumann entropy

3.3 Quantum min entropy and entropic uncertainty

3.4 Modelling Quantum Protocols


4: Modern Cryptography

4.1 Historical cryptography versus modern cryptography

4.2 Defining (and proving) security

4.3 Encryption and Authentication

4.4 Key Distribution and Public Key Cryptography


5: Quantum Key Distribution (QKD) Protocols

5.1 Goal of QKD and the BB84 protocol

5.2 Stages of a QKD protocol

5.3 Basic QKD protocols: E91, B92, SARG04

5.4 Basic post processing techniques

5.5 Strengths and limitations of QKD


6: Security of QKD

6.1 Security goal and composable security

6.2 Asymptotic Security Proof of BB84

6.3 Finite Key Security

6.4 Alternative Security Proof Techniques: Quantum sampling


7: Advanced QKD

7.1 Two-way QKD: LM04 and the SDC protocol

7.2 Semi-quantum cryptography

7.3 Improving noise tolerance through classical post processing

7.4 Large scale QKD Networks


8: Random Number Generation and Device Independence*

8.1 Quantum Random Number Generation

8.2 Source Independence

8.3 Measurement Device Independence

8.4 Device Independence


9: High-Dimensional Quantum Cryptography

9.1 High dimensional BB84 - protocol and security proof

9.2 High dimensional random number generation *

9.3 Round Robin protocol

9.4 Group-key protocols

9.5 Creating high-dimensional states


10: Alternative Security Models and Cryptographic Primitives

10.1 Certified Deletion *

10.2 Bounded and Noisy Storage Model

10.3 Game Theoretic Security

10.4 Quantum public keys

10.5 Quantum Direct Communication


11: Practical Quantum Cryptography and Communication

11.1 Practical QKD Implementation

11.2 Practical device limitations

11.3 Decoy-state BB84

11.4 Side channel attacks and mitigation strategies

11.5 Hybrid quantum/post-quantum solutions

Product details

  • Edition: 1
  • Latest edition
  • Published: October 1, 2026
  • Language: English

About the author

WK

Walter O. Krawec

Dr. Walter O. Krawec is an Assistant Professor of Computer Science and Engineering at the University of Connecticut, USA. He earned a PhD in Computer Science from Stevens Institute of Technology and an MA in Mathematics from SUNY Albany. His primary research interests are in quantum cryptography and quantum information theory, with other areas of research including security, networking, and evolutionary algorithms, especially their use in studying problems in cryptography. Dr. Krawec has published numerous papers in the area of quantum cryptography and especially quantum key distribution in top journals and conferences. He is also an active educator, having experience teaching quantum cryptography to undergraduate and graduate students, and involving undergraduates in research.
Affiliations and expertise
Assistant Professor of Computer Science and Engineering, University of Connecticut, Storrs, CT, USA