Write, autoreview, editor, reviewer
3,129
edits
m (→Properties) |
|||
Line 24: | Line 24: | ||
*'''Privacy amplification:''' Both use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key. | *'''Privacy amplification:''' Both use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key. | ||
=== | |||
===Notations Used=== | |||
**<math>n</math> number of total rounds of the protocol. | **<math>n</math> number of total rounds of the protocol. | ||
**<math>\ell</math> size of the secret key. | **<math>\ell</math> size of the secret key. | ||
Line 39: | Line 38: | ||
**<math>\epsilon_{\rm PA}</math> is the error probability of the privacy amplification protocol. | **<math>\epsilon_{\rm PA}</math> is the error probability of the privacy amplification protocol. | ||
**<math>\epsilon_{\rm PE}</math> is the error probability of the parameter estimation. | **<math>\epsilon_{\rm PE}</math> is the error probability of the parameter estimation. | ||
===Properties=== | |||
'''The protocol-''' | |||
**is Information-theoretically secure | **is Information-theoretically secure | ||
** requires [[synchronous network]], [[authenticated]] public classical channel, secure from [[coherent attacks]] | ** requires [[synchronous network]], [[authenticated]] public classical channel, secure from [[coherent attacks]] |