Quantum cryptography

Quantum secret sharing

Quantum secret sharing (QSS) is a quantum cryptographic scheme for secure communication that extends beyond simple quantum key distribution. It modifies the classical secret sharing (CSS) scheme by using quantum information and the no-cloning theorem to attain the ultimate security for communications. The method of secret sharing consists of a sender who wishes to share a secret with a number of receiver parties in such a way that the secret is fully revealed only if a large enough portion of the receivers work together. However, if not enough receivers work together to reveal the secret, the secret remains completely unknown. The classical scheme was independently proposed by Adi Shamir and George Blakley in 1979. In 1998, Mark Hillery, Vladimír Bužek, and André Berthiaume extended the theory to make use of quantum states for establishing a secure key that could be used to transmit the secret via classical data. In the years following, more work was done to extend the theory to transmitting quantum information as the secret, rather than just using quantum states for establishing the cryptographic key. QSS has been proposed for being used in quantum money as well as for joint checking accounts, quantum networking, and distributed quantum computing, among other applications. (Wikipedia).

Quantum secret sharing
Video thumbnail

Secret Sharing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Quantum Computer in a Nutshell (Documentary)

The reservoir of possibilities offered by the fundamental laws of Nature, is the key point in the development of science and technology. Quantum computing is the next step on the road to broaden our perspective from which we currently look at the Universe. The movie shows the history of pr

From playlist Quantum computing

Video thumbnail

What Is Quantum Computing | Quantum Computing Explained | Quantum Computer | #Shorts | Simplilearn

🔥Explore Our Free Courses With Completion Certificate by SkillUp: https://www.simplilearn.com/skillup-free-online-courses?utm_campaign=QuantumComputingShorts&utm_medium=ShortsDescription&utm_source=youtube Quantum computing is a branch of computing that focuses on developing computer tech

From playlist #Shorts | #Simplilearn

Video thumbnail

Keeping Secrets: Cryptography In A Connected World

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to

From playlist Explore the World Science Festival

Video thumbnail

Quantum Supremacy Explained

Find out what it takes for a quantum computer to beat a classical computer to achieve quantum supremacy. Check out this video's sponsor https://brilliant.org/dos Quantum supremacy’s that moment when a quantum computer beats the best supercomputers at solving some kind of problem, and it’s

From playlist Quantum Physics Videos - Domain of Science

Video thumbnail

Quantum physics - tap-proof through randomness

In principle, almost any encryption key can be broken - all you need is the right computing power. The situation is different, however, with quantum cryptography: messages that are encoded with this method cannot be decrypted without the sender and receiver noticing. Gerd Leuchs is researc

From playlist Most popular videos

Video thumbnail

Cryptography: Codes, Ciphers, and Connections

The encryption of information is as old as information itself. Ever since two people wanted to pass something along, so has there been a third party who wanted to be privy to it. This back and forth battle of creating codes, breaking them, and finding new ones has been happening quietly fo

From playlist Mathematics

Video thumbnail

Secret Sharing - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Quantum Computing for Beginners | How to get started with Quantum Computing

Quantum computing is the use of quantum-mechanical phenomena such as superposition and entanglement to perform computation. A quantum computer is used to perform such computation, which can be implemented theoretically or physically. The field of quantum computing is actually a sub-field

From playlist Quantum Physics

Video thumbnail

Barry Sanders: Spacetime replication of continuous-variable quantum information

Abstract: Combining the relativistic speed limit on transmitting information with linearity and unitarity of quantum mechanics leads to a relativistic extension of the no-cloning principle called spacetime replication of quantum information. We introduce continuous-variable spacetime-repli

From playlist Mathematical Physics

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

FWIMD 2022 - Keynote Lecture

FWIMD 2022 - Keynote Lecture

From playlist My Math Talks

Video thumbnail

Is Digital Privacy At An End?

Share on Facebook: http://on.fb.me/1xTm7HR If you use the Internet a lot, you've probably transmitted some pretty private information. From credit card numbers to embarrassing photos, our secrets are out there - but how safe are they from hackers and eavesdroppers? In the future, will we

From playlist Fw:Thinking

Video thumbnail

MPC in the Head With Applications to Blockchain (Lecture 1) by Carmit Hazay

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

Craig Costello - Post-quantum key exchange from supersingular isogenies- IPAM at UCLA

Recorded 26 July 2022. Craig Costello of Microsoft Research presents "Post-quantum key exchange from supersingular isogenies" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This talk will give an overview of Supersingular isogeny Diffie-Hellman (SIDH): t

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

What is Quantum Cryptography?

GET NORDVPN: https://nordvpn.org/sabine USE COUPON CODE: sabine USE THE CODE SO YOU CAN GET 68% off 2-year plan + 1 additional month FREE. You can learn more about NordVPN on their YouTube channel: https://www.youtube.com/channel/UCSZhRxyloC-qzURiOa3vbFQ Note: At 7 min 52 secs "vertical

From playlist Physics

Video thumbnail

Will Quantum Computers break encryption?

How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life? 0:00 Intro - Are we DOOOOMED?? 0:52 How

From playlist Quantum (and Classical) Computing

Video thumbnail

Open Source Quantum Computing: Write Your Own Quantum Programs

Quantum computers are not just science fiction anymore, with many companies building increasingly more powerful quantum computers. While, concepts in quantum computing have been around for over 30 years, but it hasn't been generally accessible until recently. Despite this quantum computing

From playlist Quantum Computing

Video thumbnail

Quantum Cryptography | CaltechX and DelftX on edX | Course About Video

Learn how quantum communication provides security that is guaranteed by the laws of nature. Take this course free on edX: https://www.edx.org/course/quantum-cryptography-caltechx-delftx-qucryptox#! ABOUT THIS COURSE How can you tell a secret when everyone is able to listen in? In this co

From playlist Research & Science

Related pages

Quantum nonlocality | Bell test | Hilbert space | Communication channel | Greenberger–Horne–Zeilinger state | George Blakley | Quantum key distribution | Threshold cryptosystem | Quantum information | Quantum cryptography | Quantum network | Secret sharing | Orthogonality | Key (cryptography) | Bell's theorem | No-cloning theorem | Quantum computing