000 03533nam a22003973i 4500
001 EBC5116594
003 MiAaPQ
005 20240122001056.0
006 m o d |
007 cr cnu||||||||
008 231124s2017 xx o ||||0 eng d
020 _a9789176854600
_q(electronic bk.)
035 _a(MiAaPQ)EBC5116594
035 _a(Au-PeEL)EBL5116594
035 _a(CaPaEBR)ebr11462086
035 _a(OCoLC)1009273938
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
100 1 _aJogenfors, Jonathan.
245 1 0 _aBreaking the Unbreakable :
_bExploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography.
250 _a1st ed.
264 1 _aLink�oping :
_bLinkopings Universitet,
_c2017.
264 4 _c{copy}2017.
300 _a1 online resource (254 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLink�oping Studies in Science and Technology. Dissertations Series ;
_vv.1875
505 0 _aIntro -- Abstract -- Acknowledgments -- Contents -- List of Figures -- List of Tables -- List of Theorems -- List of Acronyms -- List of Symbols -- Preface -- Introduction -- History of Cryptography -- Fundamental Principles of Cryptography -- Public-Key Cryptography -- Cryptography and the Quantum World -- Outline -- Included Publications -- Basic Concepts -- Linear Algebra -- Probability Theory -- Fundamental Quantum Mechanics -- Quantum Key Distribution -- The BB84 Protocol -- Security Analysis of BB84 -- Bell's Theorem -- EPR and Hidden Variables -- Intuitive Explanation -- The Black Box Model -- Ekert's QKD Protocol -- Device-Independent QKD -- Loopholes in Bell Experiments -- The Detection Loophole -- The Coincidence-Time Loophole -- Experimental Bell testing -- Conclusions -- Energy-Time Entanglement -- The Franson Interferometer -- The Postselection Loophole -- Quantum Hacking -- The LHV Attack -- The Blinding Attack -- Optical Considerations -- Experimental Demonstration -- Countermeasures to Quantum Hacking -- Chaining the Bell Inequality -- Interferometric Visibility -- Modified Franson Setups -- Conclusions -- Quantum Bitcoin -- Hashcash -- Bitcoin -- Further Blockchain Developments -- Quantum Money -- Conclusions -- Future Work -- Index -- Bibliography -- Publications -- Energy-Time Entanglement, Elements of Reality, and Local Realism -- Hacking the Bell Test Using Classical Light in Energy-Time Entanglement-Based Quantum Key Distribution -- Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption -- High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities -- Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics -- Comment on "Franson Interference Generated by a Two-Level System.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aJogenfors, Jonathan
_tBreaking the Unbreakable
_dLink�oping : Linkopings Universitet,c2017
797 2 _aProQuest (Firm)
830 0 _aLink�oping Studies in Science and Technology. Dissertations Series
856 4 0 _uhttps://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=5116594
_zClick to View
999 _c304262
_d304262