Device-Independent Quantum Key Distribution: Difference between revisions

Jump to navigation Jump to search
Line 11: Line 11:
A DIQKD protocol is composed by the following steps:
A DIQKD protocol is composed by the following steps:
*'''Distribution:''' For each round of the distribution phase:
*'''Distribution:''' For each round of the distribution phase:
** Alice uses the source to prepare a maximally entangled state and send half of the state to Bob.
** Sender uses the source to prepare a maximally entangled state and send half of the state to Receiver.
** Upon receiving the state, Bob announces that he received it, and they both use their respective devices to measure the quantum systems. They record their output in a string of bits.
** Upon receiving the state, Receiver announces that he received it, and they both use their respective devices to measure the quantum systems. They record their output in a string of bits.
*  A second phase where Alice and Bob publicly exchange classical information in order to perform [[error correction]], where they correct their strings generating the raw keys, and [[parameter estimation]], where they estimate the parameters of interest. At the end of this phase Alice and Bob are supposed to share the same <math>n</math>-bit string and have an estimate of how much knowledge an eavesdropper might have about their raw key.
*  A second phase where Sender and Receiver publicly exchange classical information in order to perform [[error correction]], where they correct their strings generating the raw keys, and [[parameter estimation]], where they estimate the parameters of interest. At the end of this phase Sender and Receiver are supposed to share the same <math>n</math>-bit string and have an estimate of how much knowledge an eavesdropper might have about their raw key.
* In the final phase, Alice and Bob perform [[privacy amplification]], where the not fully secure <math>n</math>-bit strings are mapped into smaller strings <math>K_A</math> and <math>K_B</math>, which represents the final keys of Alice and Bob respectively.
* In the final phase, Sender and Receiver perform [[privacy amplification]], where the not fully secure <math>n</math>-bit strings are mapped into smaller strings <math>K_A</math> and <math>K_B</math>, which represents the final keys of Sender and Receiver respectively.


==Hardware Requirements ==
==Hardware Requirements ==
Write, autoreview, editor, reviewer
3,129

edits

Navigation menu