Long term Sec rit Long-term Security
through g
Quantum Cryptography
D i i U h Dominique Unruh University of Tartu
Dominique Unruh Dominique Unruh
EWSCS 2011 March 2, 2011
Long term Sec rit Long-term Security through g Quantum - - PowerPoint PPT Presentation
Long term Sec rit Long-term Security through g Quantum Cryptography D Dominique Unruh i i U h University of Tartu EWSCS 2011 March 2, 2011 Dominique Unruh Dominique Unruh Recall Recall Long term security: Protocol is secure if L
Dominique Unruh Dominique Unruh
EWSCS 2011 March 2, 2011
Dominique Unruh Long‐term security through quantum 2
Dominique Unruh Long‐term security through quantum 3
m0, m1 c{0,1} m
mc
Bob Alice
Dominique Unruh Long‐term security through quantum 4
Dominique Unruh Long‐term security through quantum 5
m0, m1 c{0,1}
Transcript trans
0, 1
{ , }
Bob Alice
Dominique Unruh
Long‐term security through quantum 6
Dominique Unruh Long‐term security through quantum 7
Dominique Unruh Long‐term security through quantum 8
Dominique Unruh Dominique Unruh Long‐term security through quantum 9
Dominique Unruh Long‐term security through quantum 10
– Photon takes both ways in superposition
Dominique Unruh Long‐term security through quantum 11
– Both situations happen “in superposition” – (Doesn’t need to make sense now)
Dominique Unruh Long‐term security through quantum 12
Dominique Unruh Long‐term security through quantum 13
Dominique Unruh Dominique Unruh Long‐term security through quantum 14
Dominique Unruh Long‐term security through quantum
15
Dominique Unruh Long‐term security through quantum 16
Dominique Unruh Long‐term security through quantum 17
Dominique Unruh Long‐term security through quantum 18
Dominique Unruh Long‐term security through quantum 19
Dominique Unruh Dominique Unruh Long‐term security through quantum 20
Dominique Unruh Long‐term security through quantum 21
Alice Bob Polarisation: Measures Sends basis
Shared key bits
Dominique Unruh Long‐term security through quantum 22
Alice Bob Polarisation: Ch d b t
Changed by measurement
(Took 12 additional years ) Adversary measures → Bit destroyed (Took 12 additional years…) y → Alice+Bob: different keys → Aack detected
Dominique Unruh Long‐term security through quantum
→
23
Dominique Unruh Long‐term security through quantum 24
Dominique Unruh Long‐term security through quantum 25