Breaking the Unbreakable : Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography.

By: Jogenfors, JonathanMaterial type: TextTextSeries: Link�oping Studies in Science and Technology. Dissertations SeriesPublisher: Link�oping : Linkopings Universitet, 2017Copyright date: {copy}2017Edition: 1st edDescription: 1 online resource (254 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9789176854600Genre/Form: Electronic books.Additional physical formats: Print version:: Breaking the UnbreakableOnline resources: Click to View
Contents:
Intro -- Abstract -- Acknowledgments -- Contents -- List of Figures -- List of Tables -- List of Theorems -- List of Acronyms -- List of Symbols -- Preface -- Introduction -- History of Cryptography -- Fundamental Principles of Cryptography -- Public-Key Cryptography -- Cryptography and the Quantum World -- Outline -- Included Publications -- Basic Concepts -- Linear Algebra -- Probability Theory -- Fundamental Quantum Mechanics -- Quantum Key Distribution -- The BB84 Protocol -- Security Analysis of BB84 -- Bell's Theorem -- EPR and Hidden Variables -- Intuitive Explanation -- The Black Box Model -- Ekert's QKD Protocol -- Device-Independent QKD -- Loopholes in Bell Experiments -- The Detection Loophole -- The Coincidence-Time Loophole -- Experimental Bell testing -- Conclusions -- Energy-Time Entanglement -- The Franson Interferometer -- The Postselection Loophole -- Quantum Hacking -- The LHV Attack -- The Blinding Attack -- Optical Considerations -- Experimental Demonstration -- Countermeasures to Quantum Hacking -- Chaining the Bell Inequality -- Interferometric Visibility -- Modified Franson Setups -- Conclusions -- Quantum Bitcoin -- Hashcash -- Bitcoin -- Further Blockchain Developments -- Quantum Money -- Conclusions -- Future Work -- Index -- Bibliography -- Publications -- Energy-Time Entanglement, Elements of Reality, and Local Realism -- Hacking the Bell Test Using Classical Light in Energy-Time Entanglement-Based Quantum Key Distribution -- Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption -- High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities -- Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics -- Comment on "Franson Interference Generated by a Two-Level System.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Abstract -- Acknowledgments -- Contents -- List of Figures -- List of Tables -- List of Theorems -- List of Acronyms -- List of Symbols -- Preface -- Introduction -- History of Cryptography -- Fundamental Principles of Cryptography -- Public-Key Cryptography -- Cryptography and the Quantum World -- Outline -- Included Publications -- Basic Concepts -- Linear Algebra -- Probability Theory -- Fundamental Quantum Mechanics -- Quantum Key Distribution -- The BB84 Protocol -- Security Analysis of BB84 -- Bell's Theorem -- EPR and Hidden Variables -- Intuitive Explanation -- The Black Box Model -- Ekert's QKD Protocol -- Device-Independent QKD -- Loopholes in Bell Experiments -- The Detection Loophole -- The Coincidence-Time Loophole -- Experimental Bell testing -- Conclusions -- Energy-Time Entanglement -- The Franson Interferometer -- The Postselection Loophole -- Quantum Hacking -- The LHV Attack -- The Blinding Attack -- Optical Considerations -- Experimental Demonstration -- Countermeasures to Quantum Hacking -- Chaining the Bell Inequality -- Interferometric Visibility -- Modified Franson Setups -- Conclusions -- Quantum Bitcoin -- Hashcash -- Bitcoin -- Further Blockchain Developments -- Quantum Money -- Conclusions -- Future Work -- Index -- Bibliography -- Publications -- Energy-Time Entanglement, Elements of Reality, and Local Realism -- Hacking the Bell Test Using Classical Light in Energy-Time Entanglement-Based Quantum Key Distribution -- Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption -- High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities -- Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics -- Comment on "Franson Interference Generated by a Two-Level System.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.