BB84 Quantum Key Distribution: Difference between revisions

No edit summary
Line 6: Line 6:
* We assume the existence of an authenticated public classical channel between the two parties
* We assume the existence of an authenticated public classical channel between the two parties
* We assume synchronous network between parties
* We assume synchronous network between parties
* We assume security from [[coherent attacks]]
* Adversarial model: [[coherent attacks]]
 
==Outline==
==Outline==
The protocol shares a classical between two parties, Alice and Bob.
The protocol shares a classical between two parties, Alice and Bob.
Write
262

edits