課程目錄:量子密碼學(xué)培訓(xùn)
4401 人關(guān)注
(78637/99817)
課程大綱:

          量子密碼學(xué)培訓(xùn)

 

 

 

Optional Background Videos:Qubits
Quantum gates
Measuring qubits in a basis
Week 1: Quantum tools and a first protocolIntroduction and overview
Fundamental concepts of quantum information: pure and mixed quantum states,
the partial trace, classical-quantum states, generalized measurements
Encrypting quantum bits with the quantum one-time pad
Week 2: The power of entanglementSeparable states, entangled states and purification
Sharing a classical secret using quantum states
Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
Monogamy of entanglement
Week 3: Quantifying informationWhat it means to be ignorant: trace distance and its use in security definitions
The (min)-entropy
Uncertainty principles as a guessing game
Week 4: From imperfect information to (near) perfect securityIntroduction to privacy amplification
Strong randomness extractors
Randomness extraction using two-universal hashing
A construction of two-universal hash functions
Week 5: Distributing keysIntroduction to key distribution: the challenge of being correct and secure
Key distribution over a noisy channelGuest video: David Elkouss (QuTech, TU Delft) – Practical error correction in key distribution protocols
Week 6: Quantum key distribution protocolsBB84 Protocol
Warmup: Security against a classical eavesdropper
E91 Protocol: purifying protocols using entanglement
Quantum key distribution: definitions and conceptsGuest video: Nicolas Gisin (University of Geneva) – Quantum key distribution in practice
Week 7: Quantum cryptography using untrusted devicesIntroduction to device-independent quantum cryptography
Testing devices using a Bell experiment
Security of device-independent quantum key distribution against collective attacksGuest video:
Ronald Hanson (QuTech, TU Delft) – The first loophole free Bell experiment
Week 8: Quantum cryptography beyond key-distributionIntroduction and overview
Two-party cryptography: bit commitment and oblivious transfer
Impossibility of bit commitment
Weak commitments and coin tossing
Week 9: Perfect security from physical assumptionsThe noisy storage model
A simple protocol for bit commitment in the noisy-storage model
Security from quantum uncertainty
A universal primitive: weak string erasure
Week 10: Further topicsPosition verification from weak string erasure
Sharing a quantum secret
Secure computations on a remote quantum computer


主站蜘蛛池模板: 狠狠综合久久综合中文88| 伊人久久大香线蕉综合网站| 狠狠色伊人亚洲综合成人| 国产成人综合一区精品| 亚洲伊人色欲综合网| 亚洲av一综合av一区| 欧美日韩国产码高清综合人成| 色综合天天综合网国产成人网| 亚洲国产精品综合久久网络| 欧美亚洲另类久久综合| 亚洲色欲久久久综合网东京热| 久久婷婷综合中文字幕| 色欲综合一区二区三区| 亚洲国产日韩欧美综合久久| 亚洲色欲色欲综合网站| 高清欧美色欧美综合网站| 亚洲国产综合精品中文第一| 国产成人亚洲综合网站不卡| 亚洲综合久久久| 亚洲 欧美 国产 动漫 综合| 婷婷丁香五月激情综合| 国产日韩欧美综合| 观看 亚洲欧美日韩综合在线一区| 伊色综合久久之综合久久| 亚洲色偷偷狠狠综合网| 99久久国产综合精品女同图片| 亚洲综合中文字幕无线码| 国产欧美视频综合二区| 综合人妻久久一区二区精品| 久久久久高潮综合影院| 亚洲欧美日韩综合aⅴ视频| 亚洲情综合五月天| 91探花国产综合在线精品| 激情综合婷婷色五月蜜桃| 91欧美一区二区三区综合在线| 人妻 日韩 欧美 综合 制服| 国产欧美精品一区二区色综合| 综合在线视频精品专区| 综合网在线观看| 亚洲综合成人网在线观看| 国产成人精品综合在线观看|