Write
262
edits
Line 28: | Line 28: | ||
* <math>n</math> expected number of rounds | * <math>n</math> expected number of rounds | ||
* <math>l</math> final key length | * <math>l</math> final key length | ||
* <math>s_{\max}</math> is the maximum length of a block of rounds. | |||
* <math>\gamma</math> fraction of test rounds | * <math>\gamma</math> fraction of test rounds | ||
* <math>Q</math> quantum bit error rate | * <math>Q</math> quantum bit error rate | ||
Line 40: | Line 41: | ||
* <math>\epsilon_{PA}</math> error probability of the privacy amplification protocol | * <math>\epsilon_{PA}</math> error probability of the privacy amplification protocol | ||
* <math>\mbox{leak}_{EC}</math> leakage in the error correction protocol | * <math>\mbox{leak}_{EC}</math> leakage in the error correction protocol | ||
==Properties== | ==Properties== | ||
Either the protocol (see [[Device Independent Quantum Key Distribution#Pseudocode|Pseudocode]]) aborts with probability higher than <math>1-(\epsilon_{EA}+\epsilon_{EC})</math>, or it generates a</br> | Either the protocol (see [[Device Independent Quantum Key Distribution#Pseudocode|Pseudocode]]) aborts with probability higher than <math>1-(\epsilon_{EA}+\epsilon_{EC})</math>, or it generates a</br> |