CRYPTOGRAPHY
Next generation of quantum information scientists gather at the University of Gda.sk for a Summer School on Quantum Cryptography. Explore the future of quantum security, key distribution, and potential developments in Quantum Internet. Meet the experts shaping the field and dive into the practical applications and theoretical foundations of quantum technologies. Join us to expand your knowledge and opportunities in this cutting-edge domain.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
GENERATION QI Next generation of quantum information scientists. Series of international schools for students in Gda sk. SUMMER SCHOOL ON QUANTUM CRYPTOGRAPHY (IMPLEMENTATIONS) University of Gda sk
Why Why the quantum the quantum cryptography cryptography? ? Quantum hardware will be able to crack RSA and other security assuring algorithms in a forseeable future Quantum cryptography offers security against quantum attacks Security of Quantum cryptography is unconditional in opposition to computational assumption based ones Quantum key distributions reaches commertial use nowadays Quantum security can be potentially extended in distance in a future Quantum Internet
who who ? ? Miko Miko aj aj Czechlewski Czechlewski (Institute of Informatics, University of Gda sk) (Attacks on quantum internet) Karol Horodecki Karol Horodecki (Institute of Informatics, ICTQT, University of Gda sk) (Attacks on quantum key distribution devices) Krystian Matusiewicz Krystian Matusiewicz (Intel Corporation, Gda sk) (Post-quantum cryptography) Gl ucia Murta (Heinrich-Heine-Universit t D sseldorf) (Anonymous quantum key distribution) Marcin Paw Marcin Paw owski owski (University of Gda sk) (Practical QKD protocols; attacks on QKD devices) Maciej Stankiewicz Maciej Stankiewicz (Institute of Informatics, University Of Gda sk) (private randomness as quantum cryptographic resource) Wo oncewicz oncewicz (ICTQT, University of Gda sk) Bianka Bianka Wo (Upper bounds on QKD key rates) Guilherme Xavier (Link ping University) (Practical QKD protocols)
For For whom whom ? ? The school is dedicated to students cryptography students who whish to learn basics of theory and practice of quantum We welcome those who are interested quantum-based security and quantum Internet interested in in academic academic/ /industrial industrial careeer related to development of The school introduces all the physics and mathematics needed to understand key key distribution distribution. Basic knowledge about algebra and probability theory is welcome. understand the the concepts concepts of quantum of quantum All the young applicants can contiue the studies in our master program Quantum Information Technologies Technologies at the University of Gda sk Quantum Information
Implementations Implementations of quantum of quantum cryptography cryptography Introduction Introduction to Quantum to Quantum Optics Optics (one day) Mathematical description of key optical components and their physical properties Practical Practical realizations realizations of quantum of quantum key key distribution distribution protocols protocols (one day) The practical issues arising in realization of QKD protocols for existing implementations and future possibilities Atacks Atacks on QKD and quantum networks on QKD and quantum networks(one day) Attacks on QKD protocols including: photon numer splitting, detector blinding and possible countermeasures Quantum Quantum secrecy secrecy beyond beyond QKD: post QKD: post- -quantum quantum cryptography cryptography(one day) Classical quantum-safe cryptography including lattice and hash based protocols Private Private Randomness Randomness (one day) Randomness extraction and amplification protocols and methods for proving their privacy
Based Based on on literature literature M.A. Nielsen, I.L. & Chuang, 2011. Quantum Computation and Quantum Information: 10th Anniversary Edition, Cambridge University Press. S. Sun & A. Huang A Review of Security Evaluation of Practical Quantum Key Distribution System Entropy2022, 24(2), 260 T. Satoh et al. Attacking the Quantum Internet IEEE Transactions on Quantum Engineering 2 (2021): 1-17 Grasselli, et al. Secure anonymous conferencing in quantum networks .PRX Quantum 3, 040306 Bera et al. Randomness in Quantum Mechanics: Philosophy, Physics and Technology Rep. Prog. Phys. 80, 124001 (2017)