9.1.2 Example Evading impossibility

Course subject(s) 09. Perfect security from physical assumptions

Now we will see how we can construct a secure protocol for bit commitment, if we assume that Alice does not hold the purification of the state she shares with Bob.

Sorry but there don't seem to be any downloads..

Subtitles (captions) in other languages than provided can be viewed at YouTube. Select your language in the CC-button of YouTube.

Creative Commons License
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.
Back to top