課程目錄:量子密碼學(xué)培訓(xùn)
4401 人關(guān)注
(78637/99817)
課程大綱:

          量子密碼學(xué)培訓(xùn)

 

 

 

Optional Background Videos:Qubits
Quantum gates
Measuring qubits in a basis
Week 1: Quantum tools and a first protocolIntroduction and overview
Fundamental concepts of quantum information: pure and mixed quantum states,
the partial trace, classical-quantum states, generalized measurements
Encrypting quantum bits with the quantum one-time pad
Week 2: The power of entanglementSeparable states, entangled states and purification
Sharing a classical secret using quantum states
Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
Monogamy of entanglement
Week 3: Quantifying informationWhat it means to be ignorant: trace distance and its use in security definitions
The (min)-entropy
Uncertainty principles as a guessing game
Week 4: From imperfect information to (near) perfect securityIntroduction to privacy amplification
Strong randomness extractors
Randomness extraction using two-universal hashing
A construction of two-universal hash functions
Week 5: Distributing keysIntroduction to key distribution: the challenge of being correct and secure
Key distribution over a noisy channelGuest video: David Elkouss (QuTech, TU Delft) – Practical error correction in key distribution protocols
Week 6: Quantum key distribution protocolsBB84 Protocol
Warmup: Security against a classical eavesdropper
E91 Protocol: purifying protocols using entanglement
Quantum key distribution: definitions and conceptsGuest video: Nicolas Gisin (University of Geneva) – Quantum key distribution in practice
Week 7: Quantum cryptography using untrusted devicesIntroduction to device-independent quantum cryptography
Testing devices using a Bell experiment
Security of device-independent quantum key distribution against collective attacksGuest video:
Ronald Hanson (QuTech, TU Delft) – The first loophole free Bell experiment
Week 8: Quantum cryptography beyond key-distributionIntroduction and overview
Two-party cryptography: bit commitment and oblivious transfer
Impossibility of bit commitment
Weak commitments and coin tossing
Week 9: Perfect security from physical assumptionsThe noisy storage model
A simple protocol for bit commitment in the noisy-storage model
Security from quantum uncertainty
A universal primitive: weak string erasure
Week 10: Further topicsPosition verification from weak string erasure
Sharing a quantum secret
Secure computations on a remote quantum computer


主站蜘蛛池模板: 综合久久一区二区三区| 丁香狠狠色婷婷久久综合 | 狠狠色综合久久久久尤物| 伊人久久成人成综合网222| 久久久亚洲裙底偷窥综合| 91精品欧美综合在线观看| 欧美亚洲另类久久综合婷婷| 亚洲精品二区国产综合野狼| 中文字幕亚洲综合久久菠萝蜜| 久久乐国产综合亚洲精品| 色综合久久88色综合天天 | 久久婷婷综合中文字幕| 激情五月激情综合网| 色8激情欧美成人久久综合电| 丁香五月婷婷综合激情在线| 狠狠色婷婷狠狠狠亚洲综合 | 亚洲综合精品网站在线观看| 91超碰碰碰碰久久久久久综合| 日韩欧美综合在线| 国产成人综合一区精品| 婷婷五月六月激情综合色中文字幕| 中文字幕亚洲综合久久2| 亚洲中文字幕无码久久综合网| 狠狠色丁香久久婷婷综合图片| 丁香婷婷色五月激情综合深爱| 欧美综合欧美视频| 久久天天日天天操综合伊人av| 亚洲欧美日韩综合一区二区| 亚洲欧美日韩综合aⅴ视频| 亚洲国产精品综合久久一线| 色综合中文字幕| 狠狠狠色丁香婷婷综合久久五月| 久久综合视频网站| 五月天激情综合| 亚洲狠狠综合久久| 欧美亚洲综合另类| 亚洲综合精品香蕉久久网97| 青青综合在线| 国产成人综合网在线观看| 五月天激激婷婷大综合丁香| 99久久亚洲综合精品成人|