Breaking the Unbreakable : Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography.

Bibliographic Details
Main Author: Jogenfors, Jonathan.
Format: eBook
Language:English
Published: Linköping : Linkopings Universitet, 2017.
Edition:1st ed.
Series:Linköping Studies in Science and Technology. Dissertations Series
Subjects:
Online Access:Click to View
LEADER 03496nam a22003853i 4500
001 EBC5116594
003 MiAaPQ
005 20240729202202.0
006 m o d |
007 cr cnu||||||||
008 240729s2017 xx o ||||0 eng d
020 |a 9789176854600  |q (electronic bk.) 
035 |a (MiAaPQ)EBC5116594 
035 |a (Au-PeEL)EBL5116594 
035 |a (CaPaEBR)ebr11462086 
035 |a (OCoLC)1009273938 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
100 1 |a Jogenfors, Jonathan. 
245 1 0 |a Breaking the Unbreakable :  |b Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography. 
250 |a 1st ed. 
264 1 |a Linköping :  |b Linkopings Universitet,  |c 2017. 
264 4 |c {copy}2017. 
300 |a 1 online resource (254 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Linköping Studies in Science and Technology. Dissertations Series ;  |v v.1875 
505 0 |a Intro -- Abstract -- Acknowledgments -- Contents -- List of Figures -- List of Tables -- List of Theorems -- List of Acronyms -- List of Symbols -- Preface -- Introduction -- History of Cryptography -- Fundamental Principles of Cryptography -- Public-Key Cryptography -- Cryptography and the Quantum World -- Outline -- Included Publications -- Basic Concepts -- Linear Algebra -- Probability Theory -- Fundamental Quantum Mechanics -- Quantum Key Distribution -- The BB84 Protocol -- Security Analysis of BB84 -- Bell's Theorem -- EPR and Hidden Variables -- Intuitive Explanation -- The Black Box Model -- Ekert's QKD Protocol -- Device-Independent QKD -- Loopholes in Bell Experiments -- The Detection Loophole -- The Coincidence-Time Loophole -- Experimental Bell testing -- Conclusions -- Energy-Time Entanglement -- The Franson Interferometer -- The Postselection Loophole -- Quantum Hacking -- The LHV Attack -- The Blinding Attack -- Optical Considerations -- Experimental Demonstration -- Countermeasures to Quantum Hacking -- Chaining the Bell Inequality -- Interferometric Visibility -- Modified Franson Setups -- Conclusions -- Quantum Bitcoin -- Hashcash -- Bitcoin -- Further Blockchain Developments -- Quantum Money -- Conclusions -- Future Work -- Index -- Bibliography -- Publications -- Energy-Time Entanglement, Elements of Reality, and Local Realism -- Hacking the Bell Test Using Classical Light in Energy-Time Entanglement-Based Quantum Key Distribution -- Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption -- High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities -- Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics -- Comment on "Franson Interference Generated by a Two-Level System. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
776 0 8 |i Print version:  |a Jogenfors, Jonathan  |t Breaking the Unbreakable  |d Linköping : Linkopings Universitet,c2017 
797 2 |a ProQuest (Firm) 
830 0 |a Linköping Studies in Science and Technology. Dissertations Series 
856 4 0 |u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=5116594  |z Click to View