- 10 序列
- 等级 高级
- 从31 十月 2018开始
- 以3 二月 2019结束
Quantum Cryptography
你无法访问存档的 讲座
课程详情
教学大纲
Optional Background Videos:
- Qubits
- Quantum gates
- Measuring qubits in a basis
Week 1: Quantum tools and a first protocol
- Introduction and overview
- Fundamental concepts of quantum information: pure and mixed quantum states, the partial trace, classical-quantum states, generalized measurements
- Encrypting quantum bits with the quantum one-time pad
Week 2: The power of entanglement
- Separable states, entangled states and purification
- Sharing a classical secret using quantum states
- Looking ahead to quantum key distribution: verifying entanglement using a Bell experiment
- Monogamy of entanglement
Week 3: Quantifying information
- What it means to be ignorant: trace distance and its use in security definitions
- The (min)-entropy
- Uncertainty principles as a guessing game
Week 4: From imperfect information to (near) perfect security
- Introduction to privacy amplification
- Strong randomness extractors
- Randomness extraction using two-universal hashing
- A construction of two-universal hash functions
Week 5: Distributing keys
- Introduction to key distribution: the challenge of being correct and secure
- Key distribution over a noisy channel
Guest video: David Elkouss (QuTech, TU Delft) – Practical error correction in key distribution protocols
Week 6: Quantum key distribution protocols
- BB84 Protocol
- Warmup: Security against a classical eavesdropper
- E91 Protocol: purifying protocols using entanglement
- Quantum key distribution: definitions and concepts
Guest video: Nicolas Gisin (University of Geneva) – Quantum key distribution in practice
Week 7: Quantum cryptography using untrusted devices
- Introduction to device-independent quantum cryptography
- Testing devices using a Bell experiment
- Security of device-independent quantum key distribution against collective attacks
Guest video: Ronald Hanson (QuTech, TU Delft) – The first loophole free Bell experiment
Week 8: Quantum cryptography beyond key-distribution
- Introduction and overview
- Two-party cryptography: bit commitment and oblivious transfer
- Impossibility of bit commitment
- Weak commitments and coin tossing
Week 9: Perfect security from physical assumptions
- The noisy storage model
- A simple protocol for bit commitment in the noisy-storage model
- Security from quantum uncertainty
- A universal primitive: weak string erasure
Week 10: Further topics
- Position verification from weak string erasure
- Sharing a quantum secret
- Secure computations on a remote quantum computer
先决条件
- Undergraduate linear algebra
- Undergraduate probability and statistics
- Basic quantum information theory, including qubits, unitaries and measurements (optional videos will provide additional support for those new to quantum information)
讲师
Stephanie Wehner
Professor, QuTech
Delft University of Technology
Thomas Vidick
Assistant Professor, Computing and Mathematical Sciences
California Institute of Technology
Guest Lecturers
编辑
代尔夫特理工大学(又称代尔夫特理工大学)是荷兰历史最悠久、规模最大的公立大学。
它位于荷兰代尔夫特。在 2022 年 QS 世界大学排名中,该校跻身世界十大工程技术大学之列。在建筑和土木工程方面,该校排名世界第二,仅次于麻省理工学院(MIT)。
平台
EdX est une plateforme d'apprentissage en ligne (dite FLOT ou MOOC). Elle héberge et met gratuitement à disposition des cours en ligne de niveau universitaire à travers le monde entier. Elle mène également des recherches sur l'apprentissage en ligne et la façon dont les utilisateurs utilisent celle-ci. Elle est à but non lucratif et la plateforme utilise un logiciel open source.
EdX a été fondée par le Massachusetts Institute of Technology et par l'université Harvard en mai 2012. En 2014, environ 50 écoles, associations et organisations internationales offrent ou projettent d'offrir des cours sur EdX. En juillet 2014, elle avait plus de 2,5 millions d'utilisateurs suivant plus de 200 cours en ligne.
Les deux universités américaines qui financent la plateforme ont investi 60 millions USD dans son développement. La plateforme France Université Numérique utilise la technologie openedX, supportée par Google.