Quantum Cryptography

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Quantum Cryptography as PDF for free.

More details

  • Words: 236
  • Pages: 8
9DVLO3HQFKHY$VVRF3URI3K'

7KH6HFXULW\RI 4XDQWXP &U\SWRJUDSK\

[email protected] http://www.

esnips.com/web/vasilpenchevsnews Institute for Philosophical Research, Bulgarian Academy of Science

1

7KHLQYHQWRUV RI%%4.'SURWRFRO

2

&KDUOHV+%HQQHWW zDQ,%0 )HOORZDW ,%0 5HVHDUFK

*LOOHV%UDVVDUG • Founding Director, Institut transdisciplinaire d’informatique quantique (INTRIQ) Canada Research Chair in Quantum Information processing Université de Montréal

3

A better approach pioneered by Paul Townsend

A better approach pioneered by Paul Townsend

8QLYHUVLW\RI &DPEULGJH 'HSDUWPHQWRI $SSOLHG0DWKHPDWLFV DQG7KHRUHWLFDO3K\VLFV

p4XDQWXP/RYH6WRU\q E\ &KDUOHV+%HQQHWW

A quantum love story, based on the classic tale of Pyramus and Thisbe.

Alice and Bob are young and in love.

 EDVHGRQWKH FODVVLFWDOHRI 3\UDPXV DQG 7K\VEH

Unfortunately, their parents oppose their relationship, and have forbidden them to visit, or talk, or exchange email. Fortunately, they live next door to one another. Unfortunately, there's a wall between their two houses. Fortunately, there's a hole in the wall. -- more --

4

Unfortunately, the hole is only big enough for one atom of Alice to interact with one atom of Bob, via an interaction H' .

Fortunately, Alice and Bob know quantum mechanics. They know that any interaction can be used to create entanglement, and that interactions are intrinsically bidirectional and private: A cannot affect B without B affecting A. If C interferes or eavesdrops, the joint state of A and B will be degraded and randomized. -- more --

5

Artur Ekert Leigh Trapnell Professor of Quantum Physics, DAMTP, University of CamBridge, Fellow of King's College

6

4.'RQWKHPDUNHW

7

8

Related Documents

Quantum Cryptography
November 2019 3
Quantum Cryptography
June 2020 5
Quantum Cryptography
November 2019 5
Quantum Cryptography
April 2020 11
Quantum Cryptography
November 2019 3
Cryptography
November 2019 40