Based on results by: Masanes, Renner, Christandl, Winter and Barrett

Slides:



Advertisements
Similar presentations
The Complexity of Agreement A 100% Quantum-Free Talk Scott Aaronson MIT.
Advertisements

Quantum Cryptography Post Tenebras Lux!
QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
1 quantum teleportation David Riethmiller 28 May 2007.
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
Numbers
Quantum Key Distribution Yet another method of generating a key.
EPR – pair usage in the quantum teleportation The Question was: Is the Quantum Mechanical Description of Reality Actually Complete?
Toyohiro Tsurumaru (Mitsubishi Electric Corporation) Masahito Hayashi (Graduate School of Information Sciences, Tohoku University / CQT National University.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Cryptography In the Bounded Quantum-Storage Model
The question Can we generate provable random numbers? …. ?
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Antonio Acín
Ankit Garg Princeton Univ. Joint work with Mark Braverman Young Kun Ko Princeton Univ. Princeton Univ. Jieming Mao Dave Touchette Princeton Univ. Univ.
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Quantum Non-locality: From Bell to Information Causality Alex Thompson Physics 486 March 7, 2016.
Limitations on quantum PCPs Aram Harrow based on joint work with Fernando G.S.L. Brandão (ETHZ->Imperial)
10-1 人生与责任 淮安工业园区实验学校 连芳芳 “ 自我介绍 ” “ 自我介绍 ” 儿童时期的我.
Secret keys and random numbers from quantum non locality Serge Massar.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Beating the Direct Sum Theorem in Communication Complexity with Implications for Sketching Marco Molinaro David Woodruff Grigory Yaroslavtsev Georgia Tech.
Cryptography and Non-Locality Valerio Scarani Centre for Quantum Technologies National University of Singapore Ph.D. and post-doc positions available Barrett.
Non-Locality and Communication Complexity Stefan Wolf Università della Svizzera italiana Darmstadt,
How to Fix Bitdefender Total Security Error -1022? Support Number
Modeling a Flying Microwave Qubit
Efficient Device-Independent Quantum Key Distribution
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Roger Dingledine Jacob Appelbaum
Yahoo Mail Customer Support Number
Most Effective Techniques to Park your Manual Transmission Car
How do Power Car Windows Ensure Occupants Safety
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Message Security, User Authentication, and Key Management
CV Cryptography Using a Bidirectional Quantum Channel
Brandin L Claar CSE 597E 5 December 2001
THANK YOU!.
ВОМР Подмярка 19.2 Възможности за финансиране
Споразумение за партньорство
Thank you.
Authenticated QKD protocol using one-time ID
Thank you.
Ceremonies (in 3 minutes)
The totalitarian principle explains quantum correlations
Types of Errors And Error Analysis.
Measurement Incompatibility and Semi-quantum Nonlocal Games
Experimental test of nonlocal causality
“Hello Bob, Alice” ---Secure wireless communication with mutual link information (a tutorial perspective) Dr. Shaoen Wu School of Computing
How to Use Charm Crypto Lib
Bell Work Solve and Check x = y – 5.6 = 34.2 x = -68
Presentation transcript:

Based on results by: Masanes, Renner, Christandl, Winter and Barrett Universally-composable Security of Key Distribution from Causality Constraints Based on results by: Masanes, Renner, Christandl, Winter and Barrett

Main Idea

Main Idea

Braunstein-Caves Bell Inequality

The Protocol Alice Bob

The Protocol Alice Bob

In terms of quantum measurements…

The Protocol Alice Bob Nonlocality Estimation I J

The Protocol I J Alice Bob Nonlocality Estimation Error Correction EC c=f(a) EC Thanks! Privacy Amplification Got it!

Nonlocality Estimation

Nonlocality Estimation

Privacy Amplification

Universally-composable Security

Universally-composable Security

Conclusions and Open Problems References