HAR 2009: Unlocking Secure Identification with Quantum Cryptography π (Part 3/6)
Discover how quantum cryptography, even amidst noise, can ensure Alice's secure identification to Bob. Expert insights from Stephanie Wehner!

Christiaan008
207 views β’ Oct 12, 2009

About this video
Clip3
Speaker: Stephanie Wehner
Making the most of noise
The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct.
For more information go to: https://har2009.org/program/events/153.en.html
Speaker: Stephanie Wehner
Making the most of noise
The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct.
For more information go to: https://har2009.org/program/events/153.en.html
Video Information
Views
207
Duration
9:49
Published
Oct 12, 2009
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now