9.1.2 Example Evading impossibility
Course subject(s)
09. Perfect security from physical assumptions
Now we will see how we can construct a secure protocol for bit commitment, if we assume that Alice does not hold the purification of the state she shares with Bob.
Sorry but there don't seem to be any downloads..
Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.