BB84: Quantum Protected Cryptography

BB84: Quantum Protected Cryptography

Subscribers:
348,000
Published on ● Video Link: https://www.youtube.com/watch?v=LXzpPDF5rXo



Duration: 1:01:41
863 views
0


A Google TechTalk, presented by Alan Christopher, 2021/08/12
ABSTRACT: The BB84 protocol leverages no-cloning properties of quantum systems to allow two parties -- Alice and Bob -- to negotiate a shared secret which is impervious to an attacker -- Eve -- with unlimited mathematical sophistication and computational resources. This talk covers core, "textbook" BB84, as well as the post-processing procedures necessary to create a practical cryptographic protocol from it.




Other Videos By Google TechTalks


2021-10-06Greybeard Qualification (Linux Internals) part 3: Memory Management
2021-10-06Greybeard Qualification (Linux Internals) part 2 Execution, Scheduling, Processes & Threads
2021-10-06Greybeard Qualification (Linux Internals) part 6: Networking & Building a Kernel
2021-10-06Greybeard Qualification (Linux Internals) part 5: Block Devices & File Systems
2021-10-06Greybeard Qualification (Linux Internals) part 4: Startup and Init
2021-09-30A Regret Analysis of Bilateral Trade
2021-09-29CoinPress: Practical Private Mean and Covariance Estimation
2021-09-29"I need a better description": An Investigation Into User Expectations For Differential Privacy
2021-09-29On the Convergence of Deep Learning with Differential Privacy
2021-09-29A Geometric View on Private Gradient-Based Optimization
2021-09-29BB84: Quantum Protected Cryptography
2021-07-13Efficient Exploration in Bayesian Optimization – Optimism and Beyond by Andreas Krause
2021-07-13Learning to Explore in Molecule Space by Yoshua Bengio
2021-07-13Resource Allocation in Multi-armed Bandits by Kirthevasan Kandasamy
2021-07-13Grey-box Bayesian Optimization by Peter Frazier
2021-06-10Is There a Mathematical Model of the Mind? (Panel Discussion)
2021-06-04Dataset Poisoning on the Industrial Scale
2021-06-04Towards Training Provably Private Models via Federated Learning in Practice
2021-06-04Breaking the Communication-Privacy-Accuracy Trilemma
2021-06-04Cronus: Robust Knowledge Transfer for Federated Learning
2021-06-04Private Algorithms with Minimal Space