Write
262
edits
No edit summary |
|||
Line 25: | Line 25: | ||
==Further Information== | ==Further Information== | ||
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [2]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[1] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[1] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | ||
==References== | ==References== |