Editing Quantum Key Distribution
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 33: | Line 33: | ||
==Further Information== | ==Further Information== | ||
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[3] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[3] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | ||
==References== | ==References== |