Quantum Key Distribution: Difference between revisions

Line 25: Line 25:


==Further Information==
==Further Information==
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[1] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol.
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[1] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[2] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol.


==References==
==References==
Write
262

edits