Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is position verification
4
Classical position verification
5
Universal attack
6
No cloning theorem
7
PB84
8
PB84 attack
9
No goal theorem
10
Photon loss
11
Modern loss
12
Slow Quantum Communication
13
Bermuda Triangle
14
Summary
15
Law analysis
16
Security analysis
17
Proof
18
Experimental Parameters
19
Main Result
20
Loss Tolerance
21
Conclusion
22
Optimal strategy
23
Intuition
Description:
Learn about a groundbreaking quantum position verification protocol presented at the 18th Theory of Quantum Computation Conference through this technical talk. Explore the development of a fault-tolerant protocol that achieves security against entangled attackers while accommodating photon loss, a significant advancement in quantum cryptography. Dive into detailed analyses of BB84 states, classical information integration, and the protocol's extension to multiple bases. Understand the tight characterization between loss-tolerance and error rates, the implications for one-sided device-independent QKD protocols, and the theoretical foundations of quantum position verification. Follow along as the speaker covers essential concepts from basic position verification principles to advanced topics like universal attacks, no-cloning theorem, and experimental parameters, culminating in a comprehensive examination of optimal strategies and security proofs.

Single-Qubit Loss-Tolerant Quantum Position Verification Protocol

Squid: Schools for Quantum Information Development
Add to list