BB84 Quantum Key Distribution: Difference between revisions

Jump to navigation Jump to search
m
Line 24: Line 24:
*'''Privacy amplification:''' Both use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key.
*'''Privacy amplification:''' Both use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key.


===Properties===
 
----
===Notations Used===
*'''Notations Used:'''
**<math>n</math> number of total rounds of the protocol.
**<math>n</math> number of total rounds of the protocol.
**<math>\ell</math> size of the secret key.
**<math>\ell</math> size of the secret key.
Line 39: Line 38:
**<math>\epsilon_{\rm PA}</math> is the error probability of the privacy amplification protocol.
**<math>\epsilon_{\rm PA}</math> is the error probability of the privacy amplification protocol.
**<math>\epsilon_{\rm PE}</math> is the error probability of the parameter estimation.
**<math>\epsilon_{\rm PE}</math> is the error probability of the parameter estimation.
 
===Properties===
*'''The protocol-'''
'''The protocol-'''
**is Information-theoretically secure
**is Information-theoretically secure
** requires [[synchronous network]], [[authenticated]] public classical channel, secure from [[coherent attacks]]
** requires [[synchronous network]], [[authenticated]] public classical channel, secure from [[coherent attacks]]
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu