HAR 2009: Utilizing Quantum Cryptography for Secure Identification - Part 4/6
In this segment, speaker Stephanie Wehner discusses strategies for optimizing the use of noise in quantum cryptography to enhance secure identification, allowing a user, Alice, to authenticate herself to Bob.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Clip4
Speaker: Stephanie Wehner
Making the most of noise
The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct.
For more information go to: https://har2009.org/program/events/153.en.html
Video Information
Views
151
Total views since publication
Duration
9:49
Video length
Published
Oct 12, 2009
Release date
Quality
sd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.