Write
262
edits
Line 97: | Line 97: | ||
#[https://doi.org/10.1103/PhysRevLett.113.140501 Vazirani and Vidick (2014)] gives the first security proof of device-independent QKD against [[coherent attacks]]. | #[https://doi.org/10.1103/PhysRevLett.113.140501 Vazirani and Vidick (2014)] gives the first security proof of device-independent QKD against [[coherent attacks]]. | ||
#[https://www.nature.com/articles/s41467-017-02307-4 Arnon-Friedman et al. (2018)] & [https://epubs.siam.org/doi/10.1137/18M1174726 Arnon-Friedman et al. (2019)] simplify and tighten security proofs of device-independent QKD against [[coherent attacks]]. | #[https://www.nature.com/articles/s41467-017-02307-4 Arnon-Friedman et al. (2018)] & [https://epubs.siam.org/doi/10.1137/18M1174726 Arnon-Friedman et al. (2019)] simplify and tighten security proofs of device-independent QKD against [[coherent attacks]]. | ||
#[https://arxiv.org/abs/1903.10535 Tan et al. (2019)] shows that post-processing of the key using 2-way classical communication, denoted [[advantage distillation]], can increase the QBER tolerance up to <math>9.1\%</math>. | |||
<div style='text-align: right;'>''contributed by Gláucia Murta''</div> | <div style='text-align: right;'>''contributed by Gláucia Murta''</div> |