1. Classical cryptography, symmetrical and asymmetrical cryptosystems, mathematical complexity, quantum key distribution. Epsilon-security, authentication, quantum secret growing. 2. Discrete variables, non-cloning theorem, Bell inequalities. 3. Discrete-variable protocols: BB84, E91, modifications, information post-processing. 4. Classical information theory: discrete variables; Security analysis, QBER, individual/collective attacks. 5. Practical implementations: decoy-state, plug-and-play. 6. Practical issues: sources, channels, detectors, quantum hacking. 7. Continuous variables, Gaussian states, coherent-state protocol, squeezed-state protocol, entanglement-based implementation. 8. Classical information theory: continuous variables. Quantum capacity. Security analysis of continuous-variable protocols: individual/collective attacks, extremality of Gaussian states. 9. Practical issues: attenuation, noise, side-channels. 10. Realistic post-processing, finite-size effects. 11. Perspectives: secure quantum computing, quantum networking, repeaters, device-independent security.
|
-
G. Van Assche. (2006). Quantum Cryptography and Secret-Key Distillation. Cambridge University Press.
-
Ch. Weedbrook, S. Pirandola, R. García-Patrón, N. J. Cerf, T. C. Ralph, J. H. Shapiro, and S. Lloyd. (2012). Gaussian quantum information.
-
M. Dušek, N. Lütkenhaus, M. Hendrych. (2006). Quantum Cryptography.
-
M.A. Nielsen, I.L. Chuang. (2000). Quantum Computation and Quantum Information. Cambridge University Press.
-
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. (2002). Quantum cryptography.
-
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev. (2009). The security of practical quantum key distribution.
|