Security of Quantum Key Distribution 7: Entanglement-Based Protocols

  Рет қаралды 4,086

Ramona Wolf

Ramona Wolf

Күн бұрын

Пікірлер: 14
@Hopegood7031
@Hopegood7031 Жыл бұрын
I came to KZbin to understand your definition about E91 and get your explanation on KZbin 😂, I like your way of explanation, and your book is just amazing❤ wish you all the best, PhD student from Algeria 🇩🇿
@shahanaaziz1910
@shahanaaziz1910 4 жыл бұрын
Thank you for this series of videos. The way you described the topic cleared every point of it for me. looking forward to have more videos on quantum computing and quantum information.
@RamonaWolf
@RamonaWolf 4 жыл бұрын
Hi Shahana, Thank you for your comment! I am glad you find the videos useful! Best, Ramona
@MazenAwaraa-yk1ts
@MazenAwaraa-yk1ts Ай бұрын
I want to start studying Quantum cryptography. How can I start
@anonymouslykinda145
@anonymouslykinda145 Жыл бұрын
I was a little bit confused in the explanation of the entanglement based BB84 protocol. According to the setup, there is a source that distributes an entangled state, one qubit to Alice, and 1 to Bob, that are entangled. In the explanation, you say alice prepares 2n qubits in the |Phi^+> state, and eventually sends one half of every qubit pair to Bob. But there is no quantum channel between Alice and Bob in the setup. I think it's equivilent to say Eve sends 2n qubit pairs to Alice and Bob, and the rest is the same. However, I don't see where and why Bob would announce that he has received his half of the qubit pairs in this setup.
@satindersingh7841
@satindersingh7841 4 жыл бұрын
Very Useful and informative Video 😍🌻
@mishuk2008
@mishuk2008 3 жыл бұрын
Hi, minute 04:10 , you said the allowed measurements for Alice and Bob. Why can't they choose any measurement to their liking? Why these two sets in particular?
@RamonaWolf
@RamonaWolf 3 жыл бұрын
Hi Tuhin, the two sets of measurements are designed such that Alice and Bob can achieve the maximum violation of the CHSH inequality in case they share a maximally entangled state (for example, the Phi+ state). With other measurements they might see no CHSH violation even though they share an entangled state. Best, Ramona
@mohmmadaldarowbi
@mohmmadaldarowbi 2 жыл бұрын
Why are the pairs (A2, B1), (A3, B1), and (A3, B2) not used at all in CHSH?
@sanyamjain840
@sanyamjain840 3 жыл бұрын
Dear Ramona, thanks for the video. Can you please provide some references for the P&B vs EB comparison you did in the last part of the video. Please. Thank You.
@RamonaWolf
@RamonaWolf 3 жыл бұрын
Hi Sanyam, I got this from Renato Renner's PhD thesis, which you can find here: arxiv.org/abs/quant-ph/0512258 It is shortly discussed in Section 1.2.
@sanyamjain840
@sanyamjain840 3 жыл бұрын
@@RamonaWolf Thanks :)
@muhammadusama5075
@muhammadusama5075 3 жыл бұрын
please explain ekert protocol part where use quantum observables and some trace concept please explain these steps its difficult to solve. thks mam your video series is good for quantum cryptography
@leonmozambique533
@leonmozambique533 3 жыл бұрын
Interesting
Security of Quantum Key Distribution 8: Classical Post-Processing
35:35
Security of Quantum Key Distribution 1: An Invitation
34:33
Ramona Wolf
Рет қаралды 8 М.
Why no RONALDO?! 🤔⚽️
00:28
Celine Dept
Рет қаралды 88 МЛН
How many people are in the changing room? #devil #lilith #funny #shorts
00:39
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 150 МЛН
Симбу закрыли дома?! 🔒 #симба #симбочка #арти
00:41
Симбочка Пимпочка
Рет қаралды 5 МЛН
How Quantum Key Distribution Works (BB84 & E91)
12:41
Improbable Matter
Рет қаралды 25 М.
Calderbank-Shor-Steane codes
21:38
Ramona Wolf
Рет қаралды 3,2 М.
Quantum Key Distribution - the long way from idea to application
49:26
Centre for Quantum Technologies
Рет қаралды 418
Security of Quantum Key Distribution 5: Quantum Entropy
33:32
Ramona Wolf
Рет қаралды 1,7 М.
Security of Quantum Key Distribution 10: Eavesdropping Strategies
38:41
Security of Quantum Key Distribution 2: Quantum Systems
28:33
Ramona Wolf
Рет қаралды 3,5 М.
Security of Quantum Key Distribution 9: Security Definition
36:16
Ramona Wolf
Рет қаралды 1,3 М.
Rotem Arnon-Friedman - Quantum Key-Distribution (Part 1A)
1:01:28
The BIU Research Center on Applied Cryptography and Cyber Security
Рет қаралды 1 М.
Security of Quantum Key Distribution 3: Composite Systems
32:14
Ramona Wolf
Рет қаралды 2,1 М.
Why no RONALDO?! 🤔⚽️
00:28
Celine Dept
Рет қаралды 88 МЛН