Quantum Cryptography: from key distribution to position-based cryptography

Presented at 32C3 (2015), Dec. 28, 2015, 8:30 p.m. (60 minutes)

I will entertain the audience with a science talk about quantum cryptography, covering both some classics (Quantum Key Distribution) and the latest developments (position-based quantum cryptography) in this fascinating research field. [No previous knowledge of quantum mechanics is required to follow the talk.] The most well-known application of <a href="https://en.wikipedia.org/wiki/Quantum_cryptography">quantum cryptography</a> is <a href="https://en.wikipedia.org/wiki/Quantum_key_distribution">Quantum Key Distribution (QKD)</a> which was invented in 1984 by <a href="https://en.wikipedia.org/wiki/Charles_H._Bennett_%28computer_scientist%29">Bennett</a> and <a href="https://en.wikipedia.org/wiki/Gilles_Brassard">Brassard</a>. QKD allows two players Alice and Bob to securely communicate over an insecure line which is overheard by an eavesdropper Eve. Security can be proven in an information-theoretic sense against an unrestricted Eve. Such a high level of security is impossible to achieve with classical communication. In the first part of the talk, I will introduce some basic concepts of quantum information theory in order to understand and appreciate the security of QKD. However, quantum cryptography offers a wide range of <a href="http://arxiv.org/abs/1510.06120">other applications</a> that go beyond the task of key distribution. For instance, the goal of <a href="https://en.wikipedia.org/wiki/Quantum_cryptography#Position-based_quantum_cryptography">“position-based cryptography”</a> is to use a player’s physical position as cryptographic credential. The combination of relativistic constraints (assuring that information cannot travel faster than the speed of light) and quantum mechanical effects (such as the impossibility to perfectly copy a quantum state) enables entirely new cryptographic applications like sending a message in such a way that it can only be read at a particular geographic position. In the second part, I will introduce you to this intriguing new branch of quantum cryptography.

Presenters:

  • Christian Schaffner
    I am assistant professor at the <a href="http://www.uva.nl">University of Amsterdam</a> and <a href="https://www.cwi.nl/">CWI</a>, Netherlands. My main area of research is <a href="https://en.wikipedia.org/wiki/Quantum_cryptography">Quantum Cryptography</a>.

Links:

Similar Presentations: