universally- composable security of key distribution from causality constraints
Post on 22-Feb-2016
23 Views
Preview:
DESCRIPTION
Universally- composable Security of Key Distribution from Causality Constraints. Based on results by: Masanes , Renner, Christandl , Winter and Barrett. Main Idea. Main Idea. Braunstein -Caves Bell Inequality. The Protocol. Alice. Bob. The Protocol. Alice. Bob. - PowerPoint PPT Presentation
TRANSCRIPT
Universally-composable Security of Key Distribution from Causality Constraints
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
Main Idea
Main Idea
Braunstein-Caves Bell Inequality
The ProtocolAlice Bob
The ProtocolAlice Bob
In terms of quantum measurements…
The ProtocolAlice Bob
I JNonlocality Estimation
The ProtocolAlice Bob
I JNonlocality Estimation
Error Correctionc=f(a)
Privacy Amplification
Thanks!
EC
Got it!
Nonlocality Estimation
Nonlocality Estimation
Privacy Amplification
Universally-composable Security
Universally-composable Security
Conclusions and Open Problems
References
top related