Write, autoreview, editor, reviewer
3,129
edits
Line 11: | Line 11: | ||
A DIQKD protocol is composed by the following steps: | A DIQKD protocol is composed by the following steps: | ||
*'''Distribution:''' For each round of the distribution phase: | *'''Distribution:''' For each round of the distribution phase: | ||
** | ** Sender uses the source to prepare a maximally entangled state and send half of the state to Receiver. | ||
** Upon receiving the state, | ** Upon receiving the state, Receiver announces that he received it, and they both use their respective devices to measure the quantum systems. They record their output in a string of bits. | ||
* A second phase where | * A second phase where Sender and Receiver publicly exchange classical information in order to perform [[error correction]], where they correct their strings generating the raw keys, and [[parameter estimation]], where they estimate the parameters of interest. At the end of this phase Sender and Receiver are supposed to share the same <math>n</math>-bit string and have an estimate of how much knowledge an eavesdropper might have about their raw key. | ||
* In the final phase, | * In the final phase, Sender and Receiver perform [[privacy amplification]], where the not fully secure <math>n</math>-bit strings are mapped into smaller strings <math>K_A</math> and <math>K_B</math>, which represents the final keys of Sender and Receiver respectively. | ||
==Hardware Requirements == | ==Hardware Requirements == |