CRYPTOGRAPHY

undefined
SUMMER SCHOOL ON QUANTUM
CRYPTOGRAPHY
(IMPLEMENTATIONS)
University of Gda
ń
sk
GENERATION QI 
Next generation of quantum information scientists. Series of international schools 
for students in Gda
ń
sk.
Why the quantum cryptography?
Quantum hardware will be able to crack RSA and other security assuring algorithms in a
forseeable future
Quantum cryptography offers security against quantum attacks
Security of Quantum cryptography is unconditional in opposition to computational assumption
based ones
Quantum key distributions reaches commertial use nowadays
Quantum security can be potentially extended in distance in a future Quantum Internet
who ?
Miko
ł
aj Czechlewski
 (Institute of Informatics, University of Gda
ń
sk)
(Attacks on quantum internet)
Karol Horodecki 
(Institute of Informatics, ICTQT, University of Gda
ń
sk)
(Attacks on quantum key distribution devices)
Krystian Matusiewicz 
(Intel Corporation, Gda
ń
sk)
(
Post-quantum cryptography
)
Gláucia Murta 
(Heinrich-Heine-Universität Düsseldorf)
(Anonymous quantum key distribution)
Marcin Pawłowski 
(University of Gda
ń
sk)
(Practical QKD protocols; attacks on QKD devices)
Maciej Stankiewicz 
(Institute of Informatics, University Of Gda
ń
sk)
(private randomness as quantum cryptographic resource)
Bianka Wołoncewicz
 (ICTQT, University of Gda
ń
sk)
(
Upper bounds on QKD key rates
)
Guilherme Xavier
 (Linköping University)
(Practical QKD protocols)
For whom ?
The school is dedicated to
 students 
who whish to learn basics of theory and practice  of quantum
cryptography
We welcome those who are 
interested in academic/industrial 
careeer related to development of
quantum-based security and quantum Internet
The school introduces all the physics and mathematics needed to 
understand the concepts of quantum
key distribution
. Basic knowledge about algebra and probability theory is welcome.
All the young applicants can contiue the studies in our master  program 
Quantum Information
Technologies
 at the University of Gdańsk
Implementations of quantum cryptography
Introduction to Quantum Optics 
(one day)
 
Mathematical description of key optical components and their physical properties
Practical realizations of quantum key distribution protocols 
(one day)
 
The practical issues arising in realization of QKD protocols for existing implementations
 
and future possibilities
Atacks on QKD and quantum networks
(one day)
 
Attacks on QKD protocols including: photon numer splitting, detector blinding and possible
 
countermeasures
Quantum secrecy beyond QKD: post-quantum cryptography
(one day)
 
Classical quantum-safe cryptography including lattice and hash based protocols
Private Randomness 
(one day)
 
Randomness extraction and amplification protocols and methods for proving their privacy
Based on literature
M.A. Nielsen, I.L. & Chuang, 
2011. 
Quantum Computation and Quantum Information: 10th
Anniversary
 Edition, Cambridge University Press.
S. Sun & A. Huang 
 
A Review of Security Evaluation of Practical Quantum Key Distribution System
Entropy
 
2022
, 
24
(2), 260
T. Satoh et al.
Attacking the Quantum Internet 
” IEEE Transactions on Quantum Engineering 2 (2021):
1-17
Grasselli, et al. 
„Secure anonymous conferencing in quantum networks”.
 
PRX Quantum 3, 040306
Bera et al.
 „Randomness in Quantum Mechanics: Philosophy, Physics and Technology 
Rep. Prog. Phys.
80, 124001 (2017)
Slide Note
Embed
Share

Next generation of quantum information scientists gather at the University of Gda.sk for a Summer School on Quantum Cryptography. Explore the future of quantum security, key distribution, and potential developments in Quantum Internet. Meet the experts shaping the field and dive into the practical applications and theoretical foundations of quantum technologies. Join us to expand your knowledge and opportunities in this cutting-edge domain.

  • Quantum Information
  • Quantum Cryptography
  • Summer School
  • Gda.sk
  • Future Technologies

Uploaded on Feb 21, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. GENERATION QI Next generation of quantum information scientists. Series of international schools for students in Gda sk. SUMMER SCHOOL ON QUANTUM CRYPTOGRAPHY (IMPLEMENTATIONS) University of Gda sk

  2. Why Why the quantum the quantum cryptography cryptography? ? Quantum hardware will be able to crack RSA and other security assuring algorithms in a forseeable future Quantum cryptography offers security against quantum attacks Security of Quantum cryptography is unconditional in opposition to computational assumption based ones Quantum key distributions reaches commertial use nowadays Quantum security can be potentially extended in distance in a future Quantum Internet

  3. who who ? ? Miko Miko aj aj Czechlewski Czechlewski (Institute of Informatics, University of Gda sk) (Attacks on quantum internet) Karol Horodecki Karol Horodecki (Institute of Informatics, ICTQT, University of Gda sk) (Attacks on quantum key distribution devices) Krystian Matusiewicz Krystian Matusiewicz (Intel Corporation, Gda sk) (Post-quantum cryptography) Gl ucia Murta (Heinrich-Heine-Universit t D sseldorf) (Anonymous quantum key distribution) Marcin Paw Marcin Paw owski owski (University of Gda sk) (Practical QKD protocols; attacks on QKD devices) Maciej Stankiewicz Maciej Stankiewicz (Institute of Informatics, University Of Gda sk) (private randomness as quantum cryptographic resource) Wo oncewicz oncewicz (ICTQT, University of Gda sk) Bianka Bianka Wo (Upper bounds on QKD key rates) Guilherme Xavier (Link ping University) (Practical QKD protocols)

  4. For For whom whom ? ? The school is dedicated to students cryptography students who whish to learn basics of theory and practice of quantum We welcome those who are interested quantum-based security and quantum Internet interested in in academic academic/ /industrial industrial careeer related to development of The school introduces all the physics and mathematics needed to understand key key distribution distribution. Basic knowledge about algebra and probability theory is welcome. understand the the concepts concepts of quantum of quantum All the young applicants can contiue the studies in our master program Quantum Information Technologies Technologies at the University of Gda sk Quantum Information

  5. Implementations Implementations of quantum of quantum cryptography cryptography Introduction Introduction to Quantum to Quantum Optics Optics (one day) Mathematical description of key optical components and their physical properties Practical Practical realizations realizations of quantum of quantum key key distribution distribution protocols protocols (one day) The practical issues arising in realization of QKD protocols for existing implementations and future possibilities Atacks Atacks on QKD and quantum networks on QKD and quantum networks(one day) Attacks on QKD protocols including: photon numer splitting, detector blinding and possible countermeasures Quantum Quantum secrecy secrecy beyond beyond QKD: post QKD: post- -quantum quantum cryptography cryptography(one day) Classical quantum-safe cryptography including lattice and hash based protocols Private Private Randomness Randomness (one day) Randomness extraction and amplification protocols and methods for proving their privacy

  6. Based Based on on literature literature M.A. Nielsen, I.L. & Chuang, 2011. Quantum Computation and Quantum Information: 10th Anniversary Edition, Cambridge University Press. S. Sun & A. Huang A Review of Security Evaluation of Practical Quantum Key Distribution System Entropy2022, 24(2), 260 T. Satoh et al. Attacking the Quantum Internet IEEE Transactions on Quantum Engineering 2 (2021): 1-17 Grasselli, et al. Secure anonymous conferencing in quantum networks .PRX Quantum 3, 040306 Bera et al. Randomness in Quantum Mechanics: Philosophy, Physics and Technology Rep. Prog. Phys. 80, 124001 (2017)

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#