HAR 2009: How to use quantum cryptography for secure identification 3/6

Clip3 Speaker: Stephanie Wehner Making the most of noise The goal of secure identification is to enable a user, Alice, to identify herself to Bob witho...

Christiaan008โ€ข207 viewsโ€ข9:49

๐Ÿ”ฅ Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Clip3 Speaker: Stephanie Wehner Making the most of noise The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct. For more information go to: https://har2009.org/program/events/153.en.html

Video Information

Views
207

Total views since publication

Duration
9:49

Video length

Published
Oct 12, 2009

Release date

Quality
sd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.