implements Quantum Key Distribution
A DIQKD protocol is composed by the following steps:
Either the protocol aborts with probability higher than $1-(\\\epsilon_{EA}+\\\epsilon_{EC})$, or it generates a
$(2\\\epsilon_{EC}+\\\epsilon_{PA}+\\\epsilon_s)$-correct-and-secret key of length
$$ l\\\geq \\\frac{{n}}{\\\bar{s}}\\\eta_{opt} -\\\frac{{n}}{\\\bar{s}}h(\\\omega_{exp}-\\\delta_{est}) -\\\sqrt{\\\frac{{n}}{\\\bar{s}}}\\\nu_1 -{leak}_{EC} -3\\\log(1-\\\sqrt{1-(\\\frac{\\\epsilon_s}{4(\\\epsilon{EA} + \\\epsilon_{EC})})^2})+2\\\log(\\\frac{1}{2\\\epsilon_{PA}}), $$[7]
where $\\\mbox{leak}_{EC}$ is the leakage due to error correction step and the functions $\\\bar{s}$, $\\\eta{opt}$, $\\\nu_1$ and $\\\nu_2$ are specified below. The security parameters of the error correction protocol, $\\\epsilon_{EC}$ and $\\\epsilon\'{EC}$, mean that if the error correction step of the protocol (see below) does not abort, then $K_A=K_B$ with probability at least $1-\\\epsilon{EC}$, and for an honest implementation, the error correction protocol aborts with probability at most $\\\epsilon\'{EC}+\\\epsilon{EC}$.
2. Error Correction
”Alice and Bob apply the error correction protocol $EC$ (see [ [5]]) , communicating script $O_{EC}$ in the process. ”
3. Parameter estimation
4. Privacy amplification
$PA(\\\cdot,\\\cdot)$ ”is a privacy amplification subroutine” (see [6])
No content has been added to this section, yet!
implements Quantum Key Distribution
A DIQKD protocol is composed by the following steps:
Either the protocol aborts with probability higher than $1-(\\\epsilon_{EA}+\\\epsilon_{EC})$, or it generates a
$(2\\\epsilon_{EC}+\\\epsilon_{PA}+\\\epsilon_s)$-correct-and-secret key of length
$$ l\\\geq \\\frac{{n}}{\\\bar{s}}\\\eta_{opt} -\\\frac{{n}}{\\\bar{s}}h(\\\omega_{exp}-\\\delta_{est}) -\\\sqrt{\\\frac{{n}}{\\\bar{s}}}\\\nu_1 -{leak}_{EC} -3\\\log(1-\\\sqrt{1-(\\\frac{\\\epsilon_s}{4(\\\epsilon{EA} + \\\epsilon_{EC})})^2})+2\\\log(\\\frac{1}{2\\\epsilon_{PA}}), $$[7]
where $\\\mbox{leak}_{EC}$ is the leakage due to error correction step and the functions $\\\bar{s}$, $\\\eta{opt}$, $\\\nu_1$ and $\\\nu_2$ are specified below. The security parameters of the error correction protocol, $\\\epsilon_{EC}$ and $\\\epsilon\'{EC}$, mean that if the error correction step of the protocol (see below) does not abort, then $K_A=K_B$ with probability at least $1-\\\epsilon{EC}$, and for an honest implementation, the error correction protocol aborts with probability at most $\\\epsilon\'{EC}+\\\epsilon{EC}$.
2. Error Correction
”Alice and Bob apply the error correction protocol $EC$ (see [ [5]]) , communicating script $O_{EC}$ in the process. ”
3. Parameter estimation
4. Privacy amplification
$PA(\\\cdot,\\\cdot)$ ”is a privacy amplification subroutine” (see [6])
No content has been added to this section, yet!
implements Quantum Key Distribution
A DIQKD protocol is composed by the following steps:
Either the protocol aborts with probability higher than $1-(\\\epsilon_{EA}+\\\epsilon_{EC})$, or it generates a
$(2\\\epsilon_{EC}+\\\epsilon_{PA}+\\\epsilon_s)$-correct-and-secret key of length
$$ l\\\geq \\\frac{{n}}{\\\bar{s}}\\\eta_{opt} -\\\frac{{n}}{\\\bar{s}}h(\\\omega_{exp}-\\\delta_{est}) -\\\sqrt{\\\frac{{n}}{\\\bar{s}}}\\\nu_1 -{leak}_{EC} -3\\\log(1-\\\sqrt{1-(\\\frac{\\\epsilon_s}{4(\\\epsilon{EA} + \\\epsilon_{EC})})^2})+2\\\log(\\\frac{1}{2\\\epsilon_{PA}}), $$[7]
where $\\\mbox{leak}_{EC}$ is the leakage due to error correction step and the functions $\\\bar{s}$, $\\\eta{opt}$, $\\\nu_1$ and $\\\nu_2$ are specified below. The security parameters of the error correction protocol, $\\\epsilon_{EC}$ and $\\\epsilon\'{EC}$, mean that if the error correction step of the protocol (see below) does not abort, then $K_A=K_B$ with probability at least $1-\\\epsilon{EC}$, and for an honest implementation, the error correction protocol aborts with probability at most $\\\epsilon\'{EC}+\\\epsilon{EC}$.
2. Error Correction
”Alice and Bob apply the error correction protocol $EC$ (see [ [5]]) , communicating script $O_{EC}$ in the process. ”
3. Parameter estimation
4. Privacy amplification
$PA(\\\cdot,\\\cdot)$ ”is a privacy amplification subroutine” (see [6])
No content has been added to this section, yet!
implements Quantum Key Distribution
A DIQKD protocol is composed by the following steps:
Either the protocol (see Device Independent Quantum Key Distribution 1. Pseudocode|Pseudocode) aborts with probability higher than $1-(\\\epsilon_{EA}+\\\epsilon_{EC})$, or it generates a
$(2\\\epsilon_{EC}+\\\epsilon_{PA}+\\\epsilon_s)$-correct-and-secret key of length [ [7] ]
$$ l\\\geq \\\frac{{n}}{\\\bar{s}}\\\eta_{opt} -\\\frac{{n}}{\\\bar{s}}h(\\\omega_{exp}-\\\delta_{est}) -\\\sqrt{\\\frac{{n}}{\\\bar{s}}}\\\nu_1 -{leak}{EC} -3\\\log(1-\\\sqrt{1-(\\\frac{\\\epsilon_s}{4(\\\epsilon{EA} + \\\epsilon_{EC})})^2})+2\\\log(\\\frac{1}{2\\\epsilon_{PA}}), $$
where $\\\mbox{leak}{EC}$ is the leakage due to error correction step and the functions $\\\bar{s}$, $\\\eta{opt}$, $\\\nu_1$ and $\\\nu_2$ are specified below. The security parameters of the error correction protocol, $\\\epsilon_{EC}$ and $\\\epsilon\'{EC}$, mean that if the error correction step of the protocol (see below) does not abort, then $K_A=K_B$ with probability at least $1-\\\epsilon{EC}$, and for an honest implementation, the error correction protocol aborts with probability at most $\\\epsilon\'{EC}+\\\epsilon{EC}$.
2. Error Correction
”Alice and Bob apply the error correction protocol $EC$ (see [ [5]]) , communicating script $O_{EC}$ in the process. ”
3. Parameter estimation
4. Privacy amplification
$PA(\\\cdot,\\\cdot)$ ”is a privacy amplification subroutine” (see [6])
No content has been added to this section, yet!
implements Quantum Key Distribution
A DIQKD protocol is composed by the following steps:
Either the protocol (see Device Independent Quantum Key Distribution 1. Pseudocode|Pseudocode) aborts with probability higher than $1-(\\\epsilon_{EA}+\\\epsilon_{EC})$, or it generates a
$(2\\\epsilon_{EC}+\\\epsilon_{PA}+\\\epsilon_s)$-correct-and-secret key of length [ [7] ]
$$ l\\\geq \\\frac{{n}}{\\\bar{s}}\\\eta_{opt} -\\\frac{{n}}{\\\bar{s}}h(\\\omega_{exp}-\\\delta_{est}) -\\\sqrt{\\\frac{{n}}{\\\bar{s}}}\\\nu_1 -{leak}{EC} -3\\\log(1-\\\sqrt{1-(\\\frac{\\\epsilon_s}{4(\\\epsilon{EA} + \\\epsilon_{EC})})^2})+2\\\log(\\\frac{1}{2\\\epsilon_{PA}}), $$
where $\\\mbox{leak}{EC}$ is the leakage due to error correction step and the functions $\\\bar{s}$, $\\\eta{opt}$, $\\\nu_1$ and $\\\nu_2$ are specified below. The security parameters of the error correction protocol, $\\\epsilon_{EC}$ and $\\\epsilon\'{EC}$, mean that if the error correction step of the protocol (see below) does not abort, then $K_A=K_B$ with probability at least $1-\\\epsilon{EC}$, and for an honest implementation, the error correction protocol aborts with probability at most $\\\epsilon\'{EC}+\\\epsilon{EC}$.
2. Error Correction
”Alice and Bob apply the error correction protocol $EC$ (see [ [5]]) , communicating script $O_{EC}$ in the process. ”
3. Parameter estimation
4. Privacy amplification
$PA(\\\cdot,\\\cdot)$ ”is a privacy amplification subroutine” (see [6])
No content has been added to this section, yet!