欧美色欧美亚洲另类七区,惠美惠精品网,五月婷婷一区,国产亚洲午夜

課程目錄:量子密碼學培訓
4401 人關注
(78637/99817)
課程大綱:

          量子密碼學培訓

 

 

 

Optional Background Videos:Qubits
Quantum gates
Measuring qubits in a basis
Week 1: Quantum tools and a first protocolIntroduction and overview
Fundamental concepts of quantum information: pure and mixed quantum states,
the partial trace, classical-quantum states, generalized measurements
Encrypting quantum bits with the quantum one-time pad
Week 2: The power of entanglementSeparable states, entangled states and purification
Sharing a classical secret using quantum states
Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
Monogamy of entanglement
Week 3: Quantifying informationWhat it means to be ignorant: trace distance and its use in security definitions
The (min)-entropy
Uncertainty principles as a guessing game
Week 4: From imperfect information to (near) perfect securityIntroduction to privacy amplification
Strong randomness extractors
Randomness extraction using two-universal hashing
A construction of two-universal hash functions
Week 5: Distributing keysIntroduction to key distribution: the challenge of being correct and secure
Key distribution over a noisy channelGuest video: David Elkouss (QuTech, TU Delft) – Practical error correction in key distribution protocols
Week 6: Quantum key distribution protocolsBB84 Protocol
Warmup: Security against a classical eavesdropper
E91 Protocol: purifying protocols using entanglement
Quantum key distribution: definitions and conceptsGuest video: Nicolas Gisin (University of Geneva) – Quantum key distribution in practice
Week 7: Quantum cryptography using untrusted devicesIntroduction to device-independent quantum cryptography
Testing devices using a Bell experiment
Security of device-independent quantum key distribution against collective attacksGuest video:
Ronald Hanson (QuTech, TU Delft) – The first loophole free Bell experiment
Week 8: Quantum cryptography beyond key-distributionIntroduction and overview
Two-party cryptography: bit commitment and oblivious transfer
Impossibility of bit commitment
Weak commitments and coin tossing
Week 9: Perfect security from physical assumptionsThe noisy storage model
A simple protocol for bit commitment in the noisy-storage model
Security from quantum uncertainty
A universal primitive: weak string erasure
Week 10: Further topicsPosition verification from weak string erasure
Sharing a quantum secret
Secure computations on a remote quantum computer


主站蜘蛛池模板: 边坝县| 盐边县| 依安县| 元谋县| 崇义县| 慈利县| 本溪市| 姜堰市| 张家港市| 麻栗坡县| 天峻县| 邓州市| 东至县| 内丘县| 太和县| 甘肃省| 镇江市| 莱西市| 蒲江县| 顺平县| 辉南县| 阿坝| 航空| 陇西县| 岐山县| 宜州市| 枣庄市| 凤台县| 康马县| 昌邑市| 正蓝旗| 岳阳市| 清水河县| 揭西县| 芷江| 宁晋县| 连云港市| 逊克县| 阿坝| 蓝田县| 甘洛县|