課程目錄:量子密碼學培訓
4401 人關注
(78637/99817)
課程大綱:

          量子密碼學培訓

 

 

 

Optional Background Videos:Qubits
Quantum gates
Measuring qubits in a basis
Week 1: Quantum tools and a first protocolIntroduction and overview
Fundamental concepts of quantum information: pure and mixed quantum states,
the partial trace, classical-quantum states, generalized measurements
Encrypting quantum bits with the quantum one-time pad
Week 2: The power of entanglementSeparable states, entangled states and purification
Sharing a classical secret using quantum states
Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
Monogamy of entanglement
Week 3: Quantifying informationWhat it means to be ignorant: trace distance and its use in security definitions
The (min)-entropy
Uncertainty principles as a guessing game
Week 4: From imperfect information to (near) perfect securityIntroduction to privacy amplification
Strong randomness extractors
Randomness extraction using two-universal hashing
A construction of two-universal hash functions
Week 5: Distributing keysIntroduction to key distribution: the challenge of being correct and secure
Key distribution over a noisy channelGuest video: David Elkouss (QuTech, TU Delft) – Practical error correction in key distribution protocols
Week 6: Quantum key distribution protocolsBB84 Protocol
Warmup: Security against a classical eavesdropper
E91 Protocol: purifying protocols using entanglement
Quantum key distribution: definitions and conceptsGuest video: Nicolas Gisin (University of Geneva) – Quantum key distribution in practice
Week 7: Quantum cryptography using untrusted devicesIntroduction to device-independent quantum cryptography
Testing devices using a Bell experiment
Security of device-independent quantum key distribution against collective attacksGuest video:
Ronald Hanson (QuTech, TU Delft) – The first loophole free Bell experiment
Week 8: Quantum cryptography beyond key-distributionIntroduction and overview
Two-party cryptography: bit commitment and oblivious transfer
Impossibility of bit commitment
Weak commitments and coin tossing
Week 9: Perfect security from physical assumptionsThe noisy storage model
A simple protocol for bit commitment in the noisy-storage model
Security from quantum uncertainty
A universal primitive: weak string erasure
Week 10: Further topicsPosition verification from weak string erasure
Sharing a quantum secret
Secure computations on a remote quantum computer


主站蜘蛛池模板: 一本色道久久88—综合亚洲精品| 久久综合久久自在自线精品自| 久久综合88熟人妻| 欧美综合在线观看| 色婷婷久久综合中文久久一本| 亚洲国产精品成人AV无码久久综合影院 | 综合久久久久久中文字幕亚洲国产国产综合一区首 | 国产精品无码久久综合网| 2020国产精品亚洲综合网| 青青青国产色视频在线观看国产亚洲欧洲国产综合 | 狠狠色综合久色aⅴ网站 | 色综合天天综合给合国产| 欧美精品国产日韩综合在线| 欧美va亚洲va国产综合| 亚洲国产日韩欧美综合久久| 亚洲狠狠婷婷综合久久蜜芽| 亚洲国产婷婷综合在线精品| 精品综合久久久久久88小说| 亚洲综合日韩精品欧美综合区| 亚洲国产综合网| 亚洲综合另类小说色区| 久久久久久青草大香综合精品| 伊人久久综合成人网| 亚洲国产一成久久精品国产成人综合 | 国产精品日韩欧美久久综合| 狠狠色成人综合网图片区| 日本伊人色综合网| 五月天激情综合网| 青青草原综合久久大伊人精品| 色天使久久综合网天天| 亚洲综合国产精品| 丁香五月缴情综合网| 亚洲国产成人久久综合碰碰动漫3d| 久久影院综合精品| 人人狠狠综合88综合久久| 欧美日韩亚洲综合在线| 色综合网站国产麻豆| 久久久久青草线蕉综合超碰| 亚洲综合在线另类色区奇米| 色综合伊人色综合网站| 激情五月综合综合久久69|