000 | 03533nam a22003973i 4500 | ||
---|---|---|---|
001 | EBC5116594 | ||
003 | MiAaPQ | ||
005 | 20240122001056.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 231124s2017 xx o ||||0 eng d | ||
020 |
_a9789176854600 _q(electronic bk.) |
||
035 | _a(MiAaPQ)EBC5116594 | ||
035 | _a(Au-PeEL)EBL5116594 | ||
035 | _a(CaPaEBR)ebr11462086 | ||
035 | _a(OCoLC)1009273938 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
100 | 1 | _aJogenfors, Jonathan. | |
245 | 1 | 0 |
_aBreaking the Unbreakable : _bExploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography. |
250 | _a1st ed. | ||
264 | 1 |
_aLink�oping : _bLinkopings Universitet, _c2017. |
|
264 | 4 | _c{copy}2017. | |
300 | _a1 online resource (254 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aLink�oping Studies in Science and Technology. Dissertations Series ; _vv.1875 |
|
505 | 0 | _aIntro -- Abstract -- Acknowledgments -- Contents -- List of Figures -- List of Tables -- List of Theorems -- List of Acronyms -- List of Symbols -- Preface -- Introduction -- History of Cryptography -- Fundamental Principles of Cryptography -- Public-Key Cryptography -- Cryptography and the Quantum World -- Outline -- Included Publications -- Basic Concepts -- Linear Algebra -- Probability Theory -- Fundamental Quantum Mechanics -- Quantum Key Distribution -- The BB84 Protocol -- Security Analysis of BB84 -- Bell's Theorem -- EPR and Hidden Variables -- Intuitive Explanation -- The Black Box Model -- Ekert's QKD Protocol -- Device-Independent QKD -- Loopholes in Bell Experiments -- The Detection Loophole -- The Coincidence-Time Loophole -- Experimental Bell testing -- Conclusions -- Energy-Time Entanglement -- The Franson Interferometer -- The Postselection Loophole -- Quantum Hacking -- The LHV Attack -- The Blinding Attack -- Optical Considerations -- Experimental Demonstration -- Countermeasures to Quantum Hacking -- Chaining the Bell Inequality -- Interferometric Visibility -- Modified Franson Setups -- Conclusions -- Quantum Bitcoin -- Hashcash -- Bitcoin -- Further Blockchain Developments -- Quantum Money -- Conclusions -- Future Work -- Index -- Bibliography -- Publications -- Energy-Time Entanglement, Elements of Reality, and Local Realism -- Hacking the Bell Test Using Classical Light in Energy-Time Entanglement-Based Quantum Key Distribution -- Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption -- High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities -- Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics -- Comment on "Franson Interference Generated by a Two-Level System. | |
588 | _aDescription based on publisher supplied metadata and other sources. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aJogenfors, Jonathan _tBreaking the Unbreakable _dLink�oping : Linkopings Universitet,c2017 |
797 | 2 | _aProQuest (Firm) | |
830 | 0 | _aLink�oping Studies in Science and Technology. Dissertations Series | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=5116594 _zClick to View |
999 |
_c304262 _d304262 |