Breaking the Unbreakable : Exploiting Loopholes in Bell's Theorem to Hack Quantum Cryptography.
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Linköping :
Linkopings Universitet,
2017.
|
Edition: | 1st ed. |
Series: | Linköping Studies in Science and Technology. Dissertations Series
|
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- Abstract
- Acknowledgments
- Contents
- List of Figures
- List of Tables
- List of Theorems
- List of Acronyms
- List of Symbols
- Preface
- Introduction
- History of Cryptography
- Fundamental Principles of Cryptography
- Public-Key Cryptography
- Cryptography and the Quantum World
- Outline
- Included Publications
- Basic Concepts
- Linear Algebra
- Probability Theory
- Fundamental Quantum Mechanics
- Quantum Key Distribution
- The BB84 Protocol
- Security Analysis of BB84
- Bell's Theorem
- EPR and Hidden Variables
- Intuitive Explanation
- The Black Box Model
- Ekert's QKD Protocol
- Device-Independent QKD
- Loopholes in Bell Experiments
- The Detection Loophole
- The Coincidence-Time Loophole
- Experimental Bell testing
- Conclusions
- Energy-Time Entanglement
- The Franson Interferometer
- The Postselection Loophole
- Quantum Hacking
- The LHV Attack
- The Blinding Attack
- Optical Considerations
- Experimental Demonstration
- Countermeasures to Quantum Hacking
- Chaining the Bell Inequality
- Interferometric Visibility
- Modified Franson Setups
- Conclusions
- Quantum Bitcoin
- Hashcash
- Bitcoin
- Further Blockchain Developments
- Quantum Money
- Conclusions
- Future Work
- Index
- Bibliography
- Publications
- Energy-Time Entanglement, Elements of Reality, and Local Realism
- Hacking the Bell Test Using Classical Light in Energy-Time Entanglement-Based Quantum Key Distribution
- Tight Bounds for the Pearle-Braunstein-Caves Chained Inequality Without the Fair-Coincidence Assumption
- High-Visibility Time-Bin Entanglement for Testing Chained Bell Inequalities
- Quantum Bitcoin: An Anonymous and Distributed Currency Secured by the No-Cloning Theorem of Quantum Mechanics
- Comment on "Franson Interference Generated by a Two-Level System.