Transcript
Universally-composable Security of Key Distribution from Causality Constraints
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
Main Idea
Main Idea
Braunstein-Caves Bell Inequality
The ProtocolAlice Bob
The ProtocolAlice Bob
In terms of quantum measurements…
The ProtocolAlice Bob
I JNonlocality Estimation
The ProtocolAlice Bob
I JNonlocality Estimation
Error Correctionc=f(a)
Privacy Amplification
Thanks!
EC
Got it!
Nonlocality Estimation
Nonlocality Estimation
Privacy Amplification
Universally-composable Security
Universally-composable Security
Conclusions and Open Problems
References