IQIS Lecture 5.7 — Quantum key distribution

preview_player
Показать описание

Рекомендации по теме
Комментарии
Автор

Arthur hello again. You mention public channel as something trivial (sounded to me this way). How in reality is it insured data are not modified by EVE? As of now after listening to your lecture 5 looks to me public channel might be weakest link, I have not heard you talking how to secure it against data change when in transmission. TIA

Guess: asymmetric conventional crypto? In such case why bother with qubits if this part is left to asymmetric - how does using qubits for shared newly made key adds to overall security ? Again I guess it is a complex topic, I expect you just mention some research paper, but still hope for something crypto newbie can understand. TIA

suchistheuniverse