Lectures
-
9.2.1 The noisy storage model
-
9.2.2 Example The noisy storage model
-
9.3.1 A protocol for oblivious transfer
-
9.3.2 Example A simple protocol for 1-2 oblivious transfer in the noisy-storage model
-
9.3.3 Example: continuation
-
9.4.1 Security from quantum uncertainty
-
9.5.1 Weak string erasure
-
9.5.2 Security against Bob
-
9.5.3 Security from quantum uncertainty
-
Guest lecture: Nicolas Gisin
Subject(s) 06. Quantum key distribution protocols
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.