BB84 Quantum Key Distribution: Difference between revisions

Jump to navigation Jump to search
Line 4: Line 4:
'''Tags:''' [[:Category:Two Party Protocols|Two Party]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]],[[Quantum Key Distribution]], [[Device Independent Quantum Key Distribution|Device Independent QKD]], [[Category:Multi Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]][[Category:Prepare and Measure Network Stage]]
'''Tags:''' [[:Category:Two Party Protocols|Two Party]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]],[[Quantum Key Distribution]], [[Device Independent Quantum Key Distribution|Device Independent QKD]], [[Category:Multi Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]][[Category:Prepare and Measure Network Stage]]
==Assumptions==
==Assumptions==
* We assume the existence of an authenticated public classical channel between the two parties
* We assume the existence of an authenticated public classical channel between Alice and Bob.
* We assume synchronous network between parties
* We assume that the network is  synchronous.
* Adversarial model: [[coherent attacks]]
* Adversarial model: [[coherent attacks]].


==Outline==
==Outline==
Write
262

edits

Navigation menu