Write
262
edits
Line 55: | Line 55: | ||
==Pseudocode== | ==Pseudocode== | ||
*'''Input:'''<math> n, \delta</math></br> | *'''Input: '''<math> n, \delta</math></br> | ||
*'''Output:'''<math> K_A, K_B</math></br> | *'''Output: '''<math> K_A, K_B</math></br> | ||
'''1.''' Distribution and measurement</br> | '''1.''' Distribution and measurement</br> | ||
#'''For''' every block <math> j \in [m]</math> | #'''For''' every block <math> j \in [m]</math> | ||
Line 67: | Line 67: | ||
### Alice and Bob use their devices with the respective inputs and record their outputs, <math>A_i</math> and <math>B_i</math> respectively. | ### Alice and Bob use their devices with the respective inputs and record their outputs, <math>A_i</math> and <math>B_i</math> respectively. | ||
### '''If''' <math>T_i=1</math> they set <math>i=s_{max}+1</math>. | ### '''If''' <math>T_i=1</math> they set <math>i=s_{max}+1</math>. | ||
*At this | *''At this point Alice holds strings <math>X_1^n, A_1^n</math> and Bob <math>Y_1^n, B_1^n</math>, all of length <math>n</math>.'' | ||
'''2.''' Error Correction</br> | '''2.''' Error Correction</br> | ||
* Alice and Bob apply the error correction protocol <math>EC</math>, communicating script <math>O_{EC}</math> in the process. | * ''Alice and Bob apply the error correction protocol <math>EC</math>, communicating script <math>O_{EC}</math> in the process. '' | ||
# '''If''' <math>EC</math> aborts, they abort the protocol | # '''If''' <math>EC</math> aborts, they abort the protocol | ||
# '''Else''' they obtain raw keys <math>\tilde{A}_1^n</math> and <math>\tilde{B}_1^n</math>. | # '''Else''' they obtain raw keys <math>\tilde{A}_1^n</math> and <math>\tilde{B}_1^n</math>. | ||
Line 81: | Line 81: | ||
# He aborts '''If''' <math>\sum_j C_{j}<m\times (\omega_{exp}-\delta_{est})(1-(1-\gamma)^{s_{\max}})</math>, i.e., if they do not achieve the expected violation. | # He aborts '''If''' <math>\sum_j C_{j}<m\times (\omega_{exp}-\delta_{est})(1-(1-\gamma)^{s_{\max}})</math>, i.e., if they do not achieve the expected violation. | ||
'''4.''' Privacy amplification</br> | '''4.''' Privacy amplification</br> | ||
*<math>PA(\cdot,\cdot)</math> is a privacy amplification subroutine | *<math>PA(\cdot,\cdot)</math> ''is a privacy amplification subroutine'' | ||
# Alice and Bob run <math>PA(A_1^{n'},\tilde{B}_1^{n'})</math> and obtain secret keys <math>K_A, K_B</math>; | # Alice and Bob run <math>PA(A_1^{n'},\tilde{B}_1^{n'})</math> and obtain secret keys <math>K_A, K_B</math>; | ||