All Questions
Tagged with quantum-computing quantum-cryptography
9
questions
3
votes
2
answers
576
views
Why is discrete logarithm not quantum proof?
I don't understand why discrete logarithm is not quantum proof. I understand that quantum computer can quickly compute the exponent, but there is a modulo in the equation. Doesn't it mean, that there ...
0
votes
1
answer
97
views
QKD measuring qubit with wrong bases
I'm trying to end the research work for my master thesis about BB84 QKD (and QBC) and a basic problem of quantum mechanics is blocking me.
I'm trying to do a probability calculus of the action of ...
4
votes
1
answer
172
views
A question about performing quantum computations on uniform superpositions
Let us consider the following situation. Let $U_f$ be a gate computing $f$ mapping $\{0,1\}^n$ to $\{0,1\}^n$. That is, $U_f\left\vert x,0^n\right\rangle=\left\vert x,f(x)\right\rangle$. Let $\left\...
5
votes
1
answer
187
views
What are the misconceptions of IBM's CEO Arvind Krishna talk on the "Axios on HBO" about the quantum computing
IBM CEO Arvind made a talk in HBO's Axios program. It seems that there are misconceptions/misleading/flaws in reasoning etc.
What are those!
Some of the details of the speech is given as;
IBM says ...
2
votes
0
answers
71
views
What are some "must-read" papers for someone getting into Quantum Cryptography? [closed]
I'm a graduate student that just finished a first course on quantum computation. I've also done a graduate-level course in (classical) cryptography.
I'm interested in Quantum Cryptography and would ...
2
votes
1
answer
150
views
Differences between Extractors and Privacy Amplification for Quantum Random Generators
We know that for the last step of QRNG: we need to separate quantum and classical noises from each other so we use extractors, after extractor we need privacy amplification step. At this point: if ...
1
vote
0
answers
57
views
Spontaneous parametric down-conversion [closed]
we generate heralded single pho- tons via spontaneous parametric downconversion using a 5 mm long periodically-poled potassium titanyl phosphate (ppKTP) crystal pumped with a 405 nm diode laser (200 ...
2
votes
1
answer
226
views
Is there a notion of "computational security" in quantum cryptography?
In classical cryptography, security proofs are often based on the (assumed) computational hardness of some mathematical problem. Using the principles of quantum mechanics might provide means to design ...
1
vote
1
answer
414
views
What is Quantum Cryptography?
When it comes to exchanging secure information over an insecure channel, this approach is considered. It all depends on the nature of photons in which the third polarization is focused. It can easily ...