DEPARTMENT OF COMPUTER SCIENCE

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
Physics Information Day. Physics of Information Day.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Measurement System Evaluation pp Needed because total variance of process recorded is the sum of process variation and measurement variation.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum information and the monogamy of entanglement Aram Harrow (MIT) Brown SUMS March 9, 2013.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Computing Paola Cappellaro
Physics of Computing and the Promise and Limitations of Quantum Computing Charles H. Bennett IBM Research Yorktown Santa Cruz, 24 Oct 2005.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
1 Content IP-SECOQC – Consortium, Funding What is Quantum Cryptography? Project Goals / Project Structure Standard Related Issues: –In Quantum Key Distribution.
Nawaf M Albadia
Quantum Steering in the Gaussian World Ioannis Kogias, A. Lee, S. Ragy and G. Adesso University of Nottingham To appear on arXiv: [quant-ph]
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
CENTER FOR EXOTIC QUANTUM SYSTEMS CEQS Preskill 1983 Kitaev 2002 Refael 2005 Motrunich 2006 Fisher 2009 Historically, Caltech physics has focused on the.
Cryptography In the Bounded Quantum-Storage Model
Quantum Communications Hub
Mesoscopic Physics Introduction Prof. I.V.Krive lecture presentation Address: Svobody Sq. 4, 61022, Kharkiv, Ukraine, Rooms. 5-46, 7-36, Phone: +38(057)707.
Quantum Cryptography Antonio Acín
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
Secret keys and random numbers from quantum non locality Serge Massar.
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge.
Quantum is Different, Part 1. Richard Feynman Caltech Course : Potentialities and Limitations of Computing Machines “Nature isn't classical, dammit,
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Institute of Physics (IOP), Bhubaneswar
Quantum mechanics in electronics
Quantum Key Distribution in the GÉANT network
Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Information and Everything.
ICNFP, Kolymbari, Crete, Greece August 28 – September 5, 2013
with Weak Measurements
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Unconstrained distillation capacities of
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Catching photons for the future of computing
Quantum Technologies Flagship
Quantum Key Distribution
Industrial Perspectives of Quantum Communications in Flagship
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Q Jeff Kinne.
Bits and Bobs: The Quantum Theory of Information
Efficient CRT-Based RSA Cryptosystems
CV Cryptography Using a Bidirectional Quantum Channel
Quantum Teleportation
Quantum Cryptography Alok.T.J EC 11.
Quantum Information with Continuous Variables
Decoupling with random diagonal-unitaries
OSU Quantum Information Seminar
Presentation transcript:

DEPARTMENT OF COMPUTER SCIENCE The Quantum Information Group Riccardo Laurenza CSRSS group presentation seminar –15 Feb 2018

QUANTUM INFORMATION AND QUANTUM TECHNOLOGY Nature behaves quantum mechanically at the very small scales Quantum theory has opened to us the microscopic world of particles, atoms and photons It can be harnessed to improve new tools for communication, measurement and computing

QUANTUM CRYPTOGRAPHY Alice and Bob use qubits to establish the key. Eve cannot measure these qubits without disturbing them. She will always get caught Quantum features allow two parties to share random numbers which nobody else can learn Quantum secure communication systems use quantum effects to secure sensitive data transmissions, such as bank transactions.

Accurate timing, enhanced imaging and sensing QUANTUM METROLOGY AND SENSING Engineered quantum states can be much more sensitive to the variations of measurable quantities than classical measurement instruments Accurate timing, enhanced imaging and sensing

QUANTUM COMPUTING Computers power and speed are exponentially increasing  The size of the bits has continuously decreased due to technological improvements The bit dimension will soon reach atom’s size. Increase in the power exploiting quantum effects (state superposition and entanglement) machine learning, image recognition, optimization, large number factorization, etc. J. Biamonte, et al. Nature volume 549, pages 195–202 (14 September 2017)

UK NATIONAL QT PROGRAMME

UK NATIONAL QT PROGRAMME

THE QUANTUM HUB UNIVERSITIES INDUSTRIES York (leader) Leeds Cambridge Sheffield Bristol Strathclyde Glasgow Heriot Watt Edinburgh Royal Holloway London Toshiba Group British Telecom NATIONAL PHYSICAL LABORATORY ID Quantique ADVA Qumet ….and many more

SOME OF THE MAIN GOALS Short-range, Free-space QKD Chip-scale QKD devices Large scale Quantum Communications Networking Next generation Quantum Communications Quantum Digital Signature Quantum Repeaters Measurement Device Independent QKD

GROUP LEADERS OUR RESEARCH GROUP Pr. Samuel L. Braunstein Pr. Stefano Pirandola

RESEARCH ASSOCIATES OUR RESEARCH GROUP Dr. Cosmo Lupo Continuous variable QKD Measurement device independent quantum cryptography Quantum metrology Quantum Shannon theory Dr. Carlo Ottaviani Continuous variable QKD Measurement device independent quantum cryptography Quantum optics

PhD STUDENTS OUR RESEARCH GROUP Panagiotis Papanastasiou Zhiwei Wang Thermodynamics of Black Holes Quantum Information and Black Holes QKD with continuous variables MDI QKD Thomas Cope Me Quantum communication QKD with inefficient devices Quantum Metrology Quantum channel capacities Quantum Shannon Theory Quantum Metrology & QKD

PhD STUDENTS OUR RESEARCH GROUP Jason Pereira: Security of quantum communications against hacking, e.g. side channel attacks, continuous variable protocols. Athena Karsa: Quantum Illumination, Quantum Radar, Quantum Sensing, Quantum Machine Learning Kieran Wilkinson: Quantum butterfly network, Quantum communication