universally- composable security of key distribution from causality constraints
DESCRIPTION
Universally- composable Security of Key Distribution from Causality Constraints. Based on results by: Masanes , Renner, Christandl , Winter and Barrett. Main Idea. Main Idea. Braunstein -Caves Bell Inequality. The Protocol. Alice. Bob. The Protocol. Alice. Bob. - PowerPoint PPT PresentationTRANSCRIPT
Universally-composable Security of Key Distribution from Causality Constraints
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
Main Idea
Main Idea
Braunstein-Caves Bell Inequality
The ProtocolAlice Bob
The ProtocolAlice Bob
In terms of quantum measurements…
The ProtocolAlice Bob
I JNonlocality Estimation
The ProtocolAlice Bob
I JNonlocality Estimation
Error Correctionc=f(a)
Privacy Amplification
Thanks!
EC
Got it!
Nonlocality Estimation
Nonlocality Estimation
Privacy Amplification
Universally-composable Security
Universally-composable Security
Conclusions and Open Problems
References