Editing Device-Independent Quantum Key Distribution
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 5: | Line 5: | ||
* '''Network:''' we assume the existence of an authenticated public classical channel between Alice and Bob. | * '''Network:''' we assume the existence of an authenticated public classical channel between Alice and Bob. | ||
* '''Timing:''' we assume that the network is synchronous. | * '''Timing:''' we assume that the network is synchronous. | ||
* '''Adversarial model:''' [[coherent attacks]] | * '''Adversarial model:''' [[coherent attacks]] | ||
==Outline== | ==Outline== |