Write
262
edits
Line 41: | Line 41: | ||
* <math>\mbox{leak}_{EC}</math> leakage in the error correction protocol | * <math>\mbox{leak}_{EC}</math> leakage in the error correction protocol | ||
==Properties== | ==Properties== | ||
Either | Either the protocol (see [[Device Independent Quantum Key Distribution#Pseudocode|Pseudocode]]) aborts with probability higher than <math>1-(\epsilon_{EA}+\epsilon_{EC})</math>, or it generates a</br> | ||
<math>(2\epsilon_{EC}+\epsilon_{PA}+\epsilon_s)</math>-correct-and-secret key of length</br> | <math>(2\epsilon_{EC}+\epsilon_{PA}+\epsilon_s)</math>-correct-and-secret key of length</br> | ||
<math> | <math> |