Quantum Cryptography and Post-Quantum Cryptography

  1. Quantum Key Distribution
    1. QKD Fundamentals
      1. Security Model and Assumptions
        1. Threat Model
          1. Security Definitions
            1. Comparison to Classical Key Exchange
            2. QKD Protocol Structure
              1. Quantum Communication Phase
                1. Classical Post-Processing Phase
                  1. Key Distillation Process
                2. Prepare-and-Measure Protocols
                  1. BB84 Protocol
                    1. Protocol Overview
                      1. Photon Polarization Encoding
                        1. Rectilinear Basis
                          1. Diagonal Basis
                            1. State Preparation
                            2. Protocol Steps
                              1. Alice's State Preparation
                                1. Quantum Transmission
                                  1. Bob's Measurement
                                    1. Basis Reconciliation
                                    2. Eavesdropping Detection
                                      1. Error Rate Analysis
                                        1. Security Threshold
                                        2. Classical Post-Processing
                                          1. Sifting Process
                                            1. Error Correction
                                              1. Privacy Amplification
                                            2. B92 Protocol
                                              1. Protocol Description
                                                1. Two-State Implementation
                                                  1. Differences from BB84
                                                    1. Security Analysis
                                                    2. Six-State Protocol
                                                      1. Three-Basis Implementation
                                                        1. Enhanced Security Properties
                                                          1. Performance Trade-offs
                                                          2. Decoy State Protocols
                                                            1. Motivation and Purpose
                                                              1. Implementation Methods
                                                                1. Security Enhancement
                                                              2. Entanglement-Based Protocols
                                                                1. E91 Protocol
                                                                  1. Protocol Overview
                                                                    1. Entangled Photon Pair Generation
                                                                      1. Bell State Measurements
                                                                        1. Bell's Theorem Application
                                                                          1. Eavesdropping Detection via Bell Inequalities
                                                                            1. CHSH Inequality Testing
                                                                            2. BBM92 Protocol
                                                                              1. Protocol Description
                                                                                1. Relationship to BB84
                                                                                  1. Entanglement Advantages
                                                                                    1. Implementation Considerations
                                                                                  2. Continuous Variable QKD
                                                                                    1. Gaussian Modulation Protocols
                                                                                      1. Coherent State Implementation
                                                                                        1. Security Analysis
                                                                                          1. Practical Advantages