
Instructor  Dominique Unruh <<surname> at ut dot ee> 
Lecture Period  September 3, 2015  December 17, 2015 
Lectures  Mondays, 14:1515:45, room 511
(Dominique; may sometimes be switched with tutorial) 
Practice sessions 
Thursdays, 12:1513:45, room 512 (Dominique / Ehsan) 
Course Material  Lecture
notes, blackboard photos, practice blackboard photos (zip; huge zip), videos and exam study guide. 
Language  English 
Mailing list  utqcrypto@googlegroups.com 
Exam  TBA 
Contact  Dominique Unruh <<surname> at ut dot ee> 
20150903 (lecture)  Introduction and motivation. 
20150907 (lecture)  Introduction and motivation (ctd.). Mathematics of single qubits. 
20150910 (practice)  Short linear algebra recap. Mathematics of polarization filters. (Volunteer: Kristian Kuppart) 
20150914 (lecture)  ElizurVeidman bomb tester. Mathematics of multiple qubits. 
20150917 (practice)  Review of homework 1. Unitary transform. Search for polarization directions invariant under any rotations. (Volunteers: Bahman and Mihkel) 
20150921 (lecture)  Tensor product. Measurements. 
20150924 (practice)  Quantum teleportation . (Volunteer: ?) 
20151005 (lecture)  Measurements in subsystems. Deutsch's algorithm. Toy crypto example. 
20151008 (practice)  Implementing classical functions as unitaries. (Volunteer: Tore) 
20151012 (lecture)  Ensembles. Density operators. 
20151015 (practice)  Toy encryption protocol: security definition and proof. (Volunteer: Yauhen) 
20151019 (lecture)  Partial trace. Purification. 
20151022 (practice)  Purification of quantum circuits. 
20151026 (practice)  Spectral decomposition (Volunteer: Yauhen). 
20151029 (lecture)  Quantum operations. Statistical distance. Trace distance. 
20151102 (lecture)  Quantum key distribution (QKD): Idea. Security definition. Bell states. Start of construction/proof. 
20151105 (practice)  Secure message transfer from QKD: Security definition. 
20151109 (lecture)  "QKD: Proof continued. 
20151112 (practice)  Guessing the key in QKD without entanglement purification (started). 
20151116 (lecture)  "QKD: Proof continued. 
20151119 (practice)  Guessing the key in QKD without entanglement purification (finished) (Volunteer: Tore). 
20151123 (lecture)  "QKD: Proof finished . 
20151126 (practice)  QKD without using bell pairs and quantum memory. 
20151130 (lecture)  "Commitments (definitions). Impossibility of commitment . 
20151203 (practice)  Impossibility of oblivious transfer. 
20151207 (practice)  Simon's algorithm. Attack on the EvenMansour block cipher (Volunteers: Bahman and Yauhen). 
20151210 (lecture)  Wave function. Schrödinger equation. Particle in an infinite potential well. 
20151214 (lecture)  Quantum positionverification: Impossibility classical & quantum. Possibility in BQSM (Proof: started). 
20151217 (lecture)  Quantum positionverification in BQSM (Proof: finishd). 
Out  Due  Homework  Solution 

20150908  20150915  Homework 1  Solution 1 
20150915  20150922  Homework 2  Solution 2 
20150924  20151006  Homework 3  Solution 3 
20151007  20151013  Homework 4  Solution 4 
20151014  20151020  Homework 5  Solution 5 
20151020  20151027  Homework 6  Solution 6 
20151030  20151105  Homework 7  Solution 7 
20151103  20151110  Homework 8  Solution 8 
20151111  20151117  Homework 9  Solution 9 
20151118  20151124  Homework 10  Solution 10 
20151124  20151201  Homework 11  Solution 11 
20151201  20151208  Homework 12  Solution 12 
20151212  20151217  Homework 13  Solution 13 
In quantum cryptography we use quantum
mechanical effects to construct secure protocols. The paradoxical
nature of quantum mechanics allows for constructions that solve
problems known to be impossible without quantum mechanics. This lecture
gives an introduction into this fascinating area.
Possible topics include:
You need no prior knowledge of quantum mechanics. You should have heard some introductory lecture on cryptography. You should enjoy math and have a sound understanding of linear algebra.
[NC00] Nielsen, Chuang. "Quantum Computation and Quantum Information" Cambridge University Press, 2000. A standard textbook on quantum information and quantum computing. Also contains some quantum cryptography.
Further
reading may be suggested during the
course. See the "further reading" paragraphs in the lecture notes.