Write, autoreview, editor, reviewer
3,129
edits
mNo edit summary |
|||
Line 17: | Line 17: | ||
*'''Privacy amplification:''' Alice and Bob use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key. | *'''Privacy amplification:''' Alice and Bob use an [[extractor]] on the previously established string to generate a smaller but completely secret string of bits, which is the final key. | ||
== | ==Requirements == | ||
*'''Network Stage:''' [[:Category:Prepare and Measure Network Stage|Prepare and Measure]] | *'''Network Stage:''' [[:Category:Prepare and Measure Network Stage|Prepare and Measure]] | ||
*'''Relevant Network Parameters:''' transmission error <math>\epsilon_T</math>, measurement error <math>\epsilon_M</math> (see [[:Category:Prepare and Measure Network Stage|Prepare and Measure]]) | *'''Relevant Network Parameters:''' transmission error <math>\epsilon_T</math>, measurement error <math>\epsilon_M</math> (see [[:Category:Prepare and Measure Network Stage|Prepare and Measure]]) | ||
Line 24: | Line 24: | ||
**<math>QBER \leq 0.11</math>, taking a depolarizing model as benchmark. Parameters satisfying <math> \epsilon_T+\epsilon_M\leq 0.11</math> are sufficient to asymptotically get positive secret key rate. | **<math>QBER \leq 0.11</math>, taking a depolarizing model as benchmark. Parameters satisfying <math> \epsilon_T+\epsilon_M\leq 0.11</math> are sufficient to asymptotically get positive secret key rate. | ||
*requires [[random number generator]]. | *requires [[random number generator]]. | ||
<br/> | |||
[[File:BB84 Quantum Key Distribution.png|center|BB84 Quantum Key Distribution]] | |||
==Notation== | ==Notation== |