The adversary method and quantum key distribution

19 Abril 2021, 16:30 André Souto

The adversary method to prove lower bounds on quantum query complexity.

Motivation and examples.
Introduction to quantum cryptography.
Its goals and its need.
Advantages compared to classical crypto.
The quantum key distribution as a solution for Diffie-Helmann.
The BB84 protocol.