(in Polish) Quantum communication in practice 0800-QCOMM
The following topics will be presented during the lecture:
1. Classical cryptography: brief history of cryptography, RSA protocol, error correction and privacy amplification procedures.
2. Quantum cryptography in theory by the example of BB84 protocol.
3. Main implementation problems for quantum key distribution protocols based on transmission of single-photon signals.
4. Characterization of realistic single-photon sources and detectors.
5. Practical security analysis of quantum key distribution protocols.
6. Methods for improving the security of protocols utilizing imperfect photon sources: SARG04 protocol, decoy-pulse method.
7. Quantum key distribution without using single-photon signals: utilization of coherent and squeezed states, distributed-phase-reference protocols.
8. Trojan horses and other unconventional methods for eavesdropping that exploit setup imperfections.
9. Quantum interference.
10. Utilizing quantum interference for the generation of cryptographic key without transmitting any physical objects – so-called counterfactual quantum key distribution.
11. EPR paradox, quantum entanglement and Bell inequalities.
12. Utilizing quantum entanglement in quantum cryptography: E91 protocol.
13. Device-independent and measurement-device-independent quantum key distribution.
14. Influence of finite key length on the security of the key.
15. Quantum key distribution with the use of commercially available telecommunication fibers transmitting strong classical signals at the same time: main difficulties and perspectives for future realisation.
16. Quantum teleportation: with the use of single photons, coherent states, between light and matter or between two atomic objects.
17. Entanglement swapping.
18. Quantum repeaters.
19. The idea of quantum networks and perspectives for its realisation.
20. Quantum communication utilizing processes with indefinite causal order.
Additionally, depending of the actual need, some basic topics from quantum optics (e.g. the properties of some states of electromagnetic field, Heisenberg uncertainty principle, basics of quantum description of light detection, no-cloning theorem) or information theory (e.g. Shannon entropy, von Neumann entropy, Holevo quantity, capacity of communication channels) will be discussed on different stages of the lecture.
Total student workload
Learning outcomes - knowledge
Learning outcomes - skills
Learning outcomes - social competencies
Teaching methods
Expository teaching methods
- problem-based lecture
Prerequisites
Assessment criteria
Written exam (verification of the learning outcomes W1, W2, W3, W4, U1 and U4), evaluation criteria:
- 1: 0-50 % points
- 3: 50-60 % points
- 3+: 60-70 % points
- 4: 70-80 % points
- 4+: 80-90 % points
- 5: 90-100 % points
Practical placement
none
Bibliography
Primary literature:
1. Books:
- C. C. Gerry, P. L. Knight, Introductory Quantum Optics, Cambridge University Press, Cambridge, 2004.
- N. A. Nielsen, I. L. Chuang, Quantum computation and quantum information, Cambridge University Press, Cambridge, 2006.
2. Review articles:
- V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dusek, N. Lutkenhaus, M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81, 1301 (2009).
- M. D. Eisaman, J. Fan, A. Migdall, S. V. Polyakov, Single-photon sources and detectors, Rev. Sci. Instrum. 82, 071101 (2011).
- S. Pirandola, J. Eisert, C. Weedbrook, A. Furusawa, S. L. Braunstein, Advances in quantum teleportation, Nat. Photonics 9, 641 (2015).
- N. Sangouard, C. Simon, H. de Riedmatten, N. Gisin, Quantum repeaters based on atomic ensembles and linear optics, Rev. Mod. Phys. 83, 33 (2011).
Supplemental literature: a numer of scientific articles presented by the tutor during the lecture
Additional information
Additional information (registration calendar, class conductors, localization and schedules of classes), might be available in the USOSweb system: