Dominique Unruh 3 September 2012 Quantum Cryptography Dominique Unruh.

Slides:



Advertisements
Similar presentations
Quantum Software Copy-Protection Scott Aaronson (MIT) |
Advertisements

An Invitation to Quantum Complexity Theory The Study of What We Cant Do With Computers We Dont Have Scott Aaronson (MIT) QIP08, New Delhi BQP NP- complete.
New Evidence That Quantum Mechanics Is Hard to Simulate on Classical Computers Scott Aaronson Parts based on joint work with Alex Arkhipov.
QUANTUM MECHANICS Probability & Uncertainty 1.Probability 2.Uncertainty 3.Double-slit photons.
Gaitskell PH0008 Quantum Mechanics and Special Relativity Lecture ?? (Quantum Mechanics) TEST FILE Prof Rick Gaitskell Department of Physics Brown.
David Evans CS150: Computer Science University of Virginia Computer Science Lecture 40: Computing with Glue and Photons.
March 11, 2015CS21 Lecture 271 CS21 Decidability and Tractability Lecture 27 March 11, 2015.
CPSC 411, Fall 2008: Set 12 1 CPSC 411 Design and Analysis of Algorithms Set 12: Undecidability Prof. Jennifer Welch Fall 2008.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 7 Jonathan Katz.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Princeton University COS 433 Cryptography Fall 2007 Boaz Barak COS 433: Cryptography Princeton University Fall 2007 Boaz Barak Lecture 12: Idiot’s Guide.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Computing CPSC 321 Andreas Klappenecker. Plan T November 16: Multithreading R November 18: Quantum Computing T November 23: QC + Exam prep R November.
Quantum Computation and Error Correction Ali Soleimani.
EECS 598: Background in Theory of Computation Igor L. Markov and John P. Hayes
Quantum Computing Joseph Stelmach.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Information Processing
CS4600/5600 Biometrics and Cryptography UTC/CSE
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum Algorithms for Neural Networks Daniel Shumow.
One Complexity Theorist’s View of Quantum Computing Lance Fortnow NEC Research Institute.
חישוביות וסיבוכיות Computability and Complexity Lecture 7 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAAA.
Quantum Computation for Dummies Dan Simon Microsoft Research UW students.
October 1 & 3, Introduction to Quantum Computing Lecture 2 of 2 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Topic 22: Digital Schemes (2)
Institute for Experimental Physics University of Vienna Institute for Quantum Optics and Quantum Information Austrian Academy of Sciences Undecidability.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Instructor: Shengyu Zhang 1. Tractable While we have introduced many problems with polynomial-time algorithms… …not all problems enjoy fast computation.
David Evans CS150: Computer Science University of Virginia Computer Science Class 33: Computing with Photons From The.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Wednesday, October 31 Ford Final Chapter (10). Agenda Announce: –Test Wednesday –Office Hours probably busy…better book appt. –Read Chs. 1-3 of Vilekin.
Quantum Computers by Ran Li.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Ryan Henry I 538 /B 609 : Introduction to Cryptography.
3.3 Complexity of Algorithms
Nawaf M Albadia
Quantum and classical computing Dalibor HRG EECS FER
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Cryptography In the Bounded Quantum-Storage Model
Formal Verification of Quantum Cryptography Dominique Unruh University of Tartu.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Overview of the theory of computation Episode 3 0 Turing machines The traditional concepts of computability, decidability and recursive enumerability.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
Quantum Computers By Ryan Orvosh.
Quantum Computing and the Limits of the Efficiently Computable Scott Aaronson (MIT) Papers & slides at
Recall last lecture and Nondeterministic TMs Ola Svensson.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
Intro to Quantum Algorithms SUNY Polytechnic Institute Chen-Fu Chiang Fall 2015.
Attendance Syllabus Textbook (hardcopy or electronics) Groups s First-time meeting.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Scott Aaronson (MIT) QIP08, New Delhi
Introduction to Quantum Computing Lecture 1 of 2
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
For computer scientists
A Ridiculously Brief Overview
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Quantum Computing Joseph Stelmach.
Presentation transcript:

Dominique Unruh 3 September 2012 Quantum Cryptography Dominique Unruh

Organization Lecture: Tuesday 10.15am Practice: Wednesday 10.15am – Problem solving as a group (sometimes switched) Homework: Due after approx. one week 50% needed for exam 2

Dominique Unruh Organizatorial Black board lecture (except today) Material: – Board photos – Lecture notes (short) – Book: Nielsen, Chuang, “Quantum Computation and Quantum Information” (not required) Deregistering: Not after deadline 3

Dominique Unruh Scope of the lecture No physics (almost) – Do you need electrodynamics to understand Turing-machines? – Mathematical abstraction of quantum computation/communication Intro to Quantum computation/communication Selected topics in quantum crypto 4

Dominique Unruh Requirements No physics needed Some crypto background recommended – (To have a context / the big picture) Some linear algebra will be used – You should not be afraid of math – Can do recap during tutorial  ask!!! 5

Dominique Unruh Organizatorial Questions?

Dominique Unruh Quantum Mechanics 7

Dominique Unruh Quantum Cryptography Double Slit Experiment Light falls through two slits (S2) Light-dark pattern occurs Reason: Light is a wave → Interference 8

Dominique Unruh Quantum Cryptography Double Slit Experiment Send a single photon at a time Photon either goes through left or right path After a while, interference pattern occurs Each photon “interferes with itself” → Physicists puzzled Solution: Quantum mechanics: – Photon takes both ways in superposition 9

Dominique Unruh Quantum Cryptography Superposition If two situations are possible, nature “does not always decide” – Both situations happen “in superposition” – (Doesn’t need to make sense now) Only when we look, “nature decides” Schrödinger’s cat 10

Dominique Unruh Quantum Cryptography Quantum Mechanics Superposition: Several things happen “at once” Our intuition is classical, we cannot understand this Mathematical notions allow to handle QM, even if we do not understand it 11

Dominique Unruh Quantum Computing 12

Dominique Unruh Church-Turing Thesis Turing: Definition of Turing-machines Church-Turing thesis: → Turing-Machine characterises physical computability Usually: Efficient = polynomial-time Any physically computable function can be computed by a Turing machine efficiently efficient Strong 13

Dominique Unruh Randomized algorithms 1970s: Solovay-Strassen primality test No deterministic test known (at that time) Polynomial identity: No deterministic test today Any efficiently physically computable function can be computed by an efficient Turing machine probabilistic 14

Dominique Unruh Enters: The Quantum Computer Strong Church-Turing extended once – Perhaps has to be extended again Feynman 1982: – Simulating quantum systems difficult for TMs – Quantum system can simulate quantum system Probabilistic Church-Turing thesis wrong? – Unknown so far… But seems so… 15

Dominique Unruh Quantum Algorithms Deutsch-Jozsa 1992: – Testing whether function is balanced or constant – No practical relevance – Shows: Quantum Computers more powerful than classical Shor 1994: – Factorization of integers Grover 1996: – Quadratic speed-up of brute-force search 16

Dominique Unruh Today No quantum computers (except for toy models) Cannot execute quantum algorithms Future will tell 17

Dominique Unruh Quantum Cryptography 18

Dominique Unruh Quantum Key Exchange Bennet, Brassard 1984: – Key exchange using quantum communication Idea: – Measurement destroys state → Adversary cannot eavesdrop unnoticed 19

Dominique Unruh Quantum Key Exchange AliceBob Polarisation: Measures  Sends basis Shared key bits 20

Dominique Unruh Quantum Key Exchange – Attack AliceBob Polarisation: measures Adversary measures → Bit destroyed → Alice+Bob: different keys → Attack detected Changed by measurement Caution: This is only the intuition. Security analysis much more involved. (Took 12 additional years…) 21

Dominique Unruh Quantum Key Exchange Idea proposed 1984 First security proof: Mayers 1996 Possible with today’s technology – Single photon sources – Polarisation filters No complexity assumptions – Impossible classically Details later in lecture 22

Dominique Unruh Quantum Cryptography Any cryptography using quantum – Key exchange – Bit commitment – Oblivious transfer – Zero knowledge – Signatures Often: Quantum Crypto = Key Exchange – Other applications often ignored 23

Dominique Unruh End of Intro 24