universally- composable security of key distribution from causality constraints

Post on 22-Feb-2016

23 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Universally- composable Security of Key Distribution from Causality Constraints. Based on results by: Masanes , Renner, Christandl , Winter and Barrett. Main Idea. Main Idea. Braunstein -Caves Bell Inequality. The Protocol. Alice. Bob. The Protocol. Alice. Bob. - PowerPoint PPT Presentation

TRANSCRIPT

Universally-composable Security of Key Distribution from Causality Constraints

Based on results by: Masanes, Renner, Christandl, Winter and Barrett

Main Idea

Main Idea

Braunstein-Caves Bell Inequality

The ProtocolAlice Bob

The ProtocolAlice Bob

In terms of quantum measurements…

The ProtocolAlice Bob

I JNonlocality Estimation

The ProtocolAlice Bob

I JNonlocality Estimation

Error Correctionc=f(a)

Privacy Amplification

Thanks!

EC

Got it!

Nonlocality Estimation

Nonlocality Estimation

Privacy Amplification

Universally-composable Security

Universally-composable Security

Conclusions and Open Problems

References

top related