Write
262
edits
Line 21: | Line 21: | ||
*'''Benchmark values:''' | *'''Benchmark values:''' | ||
** Minimum number of rounds ranging from <math>\mathcal{O}(10^6)</math> to <math>\mathcal{O}(10^{12})</math> depending on the network parameters<math>\epsilon_T,\epsilon_M</math>, for commonly used security parameters. | ** Minimum number of rounds ranging from <math>\mathcal{O}(10^6)</math> to <math>\mathcal{O}(10^{12})</math> depending on the network parameters<math>\epsilon_T,\epsilon_M</math>, for commonly used security parameters. | ||
** <math>QBER \leq 0.071</math>, taking a depolarizing model as benchmark. Parameters satisfying <math>\epsilon_T+\epsilon_M\leq 0.071</math> are sufficient. | ** <math>QBER \leq 0.071</math>, taking a depolarizing model as benchmark. Parameters satisfying <math>\epsilon_T+\epsilon_M\leq 0.071</math> are sufficient to asymptotically get positive secret key rate. | ||
* Distribution of Bell pairs, and measurement in three different bases (two basis on Alice's side and three basis on Bob's side). | * Distribution of Bell pairs, and measurement in three different bases (two basis on Alice's side and three basis on Bob's side). | ||
* Requires [[random number generator]]. | * Requires [[random number generator]]. |