Skip to main content

All Questions

3 votes
2 answers
576 views

Why is discrete logarithm not quantum proof?

I don't understand why discrete logarithm is not quantum proof. I understand that quantum computer can quickly compute the exponent, but there is a modulo in the equation. Doesn't it mean, that there ...
pepa z depa's user avatar
0 votes
1 answer
97 views

QKD measuring qubit with wrong bases

I'm trying to end the research work for my master thesis about BB84 QKD (and QBC) and a basic problem of quantum mechanics is blocking me. I'm trying to do a probability calculus of the action of ...
VitoShade's user avatar
4 votes
1 answer
172 views

A question about performing quantum computations on uniform superpositions

Let us consider the following situation. Let $U_f$ be a gate computing $f$ mapping $\{0,1\}^n$ to $\{0,1\}^n$. That is, $U_f\left\vert x,0^n\right\rangle=\left\vert x,f(x)\right\rangle$. Let $\left\...
Henry's user avatar
  • 55
5 votes
1 answer
187 views

What are the misconceptions of IBM's CEO Arvind Krishna talk on the "Axios on HBO" about the quantum computing

IBM CEO Arvind made a talk in HBO's Axios program. It seems that there are misconceptions/misleading/flaws in reasoning etc. What are those! Some of the details of the speech is given as; IBM says ...
kelalaka's user avatar
  • 49.1k
2 votes
0 answers
71 views

What are some "must-read" papers for someone getting into Quantum Cryptography? [closed]

I'm a graduate student that just finished a first course on quantum computation. I've also done a graduate-level course in (classical) cryptography. I'm interested in Quantum Cryptography and would ...
CSSTUDENT's user avatar
  • 121
2 votes
1 answer
150 views

Differences between Extractors and Privacy Amplification for Quantum Random Generators

We know that for the last step of QRNG: we need to separate quantum and classical noises from each other so we use extractors, after extractor we need privacy amplification step. At this point: if ...
quest's user avatar
  • 21
1 vote
0 answers
57 views

Spontaneous parametric down-conversion [closed]

we generate heralded single pho- tons via spontaneous parametric downconversion using a 5 mm long periodically-poled potassium titanyl phosphate (ppKTP) crystal pumped with a 405 nm diode laser (200 ...
Rasha rashed's user avatar
2 votes
1 answer
226 views

Is there a notion of "computational security" in quantum cryptography?

In classical cryptography, security proofs are often based on the (assumed) computational hardness of some mathematical problem. Using the principles of quantum mechanics might provide means to design ...
jgerrit's user avatar
  • 51
1 vote
1 answer
414 views

What is Quantum Cryptography?

When it comes to exchanging secure information over an insecure channel, this approach is considered. It all depends on the nature of photons in which the third polarization is focused. It can easily ...
R1w's user avatar
  • 1,960