HAR 2009: Utilizing Quantum Cryptography for Secure Identification - Part 4/6

In this segment, speaker Stephanie Wehner discusses strategies for optimizing the use of noise in quantum cryptography to enhance secure identification, allowing a user, Alice, to authenticate herself to Bob.

HAR 2009: Utilizing Quantum Cryptography for Secure Identification - Part 4/6
Christiaan008
151 views • Oct 12, 2009
HAR 2009: Utilizing Quantum Cryptography for Secure Identification - Part 4/6

About this video

Clip4
Speaker: Stephanie Wehner

Making the most of noise
The goal of secure identification is to enable a user, Alice, to identify herself to Bob without revealing her password. Unfortunately, like many other interesting cryptographic problems involving two parties, this is impossible to achieve without making assumptions. For example, we could assume that factoring a large number is difficult. However it is not known whether this assumption is correct.

For more information go to: https://har2009.org/program/events/153.en.html

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

151

Duration

9:49

Published

Oct 12, 2009

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.