Device-Independent Quantum Key Distribution: Difference between revisions

Jump to navigation Jump to search
Line 6: Line 6:
* '''Network:''' we assume the existence of an authenticated public classical channel between Alice and Bob.
* '''Network:''' we assume the existence of an authenticated public classical channel between Alice and Bob.
* '''Timing:''' we assume that the network is synchronous.
* '''Timing:''' we assume that the network is synchronous.
* '''Adversarial model:''' [[coherent attacks]]
* '''Adversarial model:''' [[coherent attacks]].


==Outline==
==Outline==
Write
262

edits

Navigation menu