ebook img

Quantum key distribution: how to distill unconditionally secure keys PDF

52 Pages·2012·1.05 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Quantum key distribution: how to distill unconditionally secure keys

Quantum key distribution: how to distill unconditionally secure keys Matteo Canale Ph.D. student @ UniPD Intern @ ID Quantique SA Motivations QKD system model Key distillation QKD in practice Outline 1 Motivations 2 QKD system model 3 Key distillation 4 QKD in practice Motivations QKD system model Key distillation QKD in practice Outline 1 Motivations 2 QKD system model 3 Key distillation 4 QKD in practice Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security strongest notion of security, as it makes no assumptions on the attacker’s computing power Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security strongest notion of security, as it makes no assumptions on the attacker’s computing power only relies on information theory Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security strongest notion of security, as it makes no assumptions on the attacker’s computing power only relies on information theory Physical laws of Quantum Mechanics can be exploited while looking for I-T security Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security strongest notion of security, as it makes no assumptions on the attacker’s computing power only relies on information theory Physical laws of Quantum Mechanics can be exploited while looking for I-T security 1 Eavesdropping detection “In quantum systems, one cannot take a measurement without perturbing the system itself.” Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security strongest notion of security, as it makes no assumptions on the attacker’s computing power only relies on information theory Physical laws of Quantum Mechanics can be exploited while looking for I-T security 1 Eavesdropping detection “In quantum systems, one cannot take a measurement without perturbing the system itself.” passive attacks can be detected Motivations QKD system model Key distillation QKD in practice Quantum tools for Information-Theoretic security Information-Theoretic security strongest notion of security, as it makes no assumptions on the attacker’s computing power only relies on information theory Physical laws of Quantum Mechanics can be exploited while looking for I-T security 1 Eavesdropping detection “In quantum systems, one cannot take a measurement without perturbing the system itself.” passive attacks can be detected no perturbation ⇒ no measurement ⇒ no eavesdropping

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.