150 likes | 281 Views
Universally- composable Security of Key Distribution from Causality Constraints. Based on results by: Masanes , Renner, Christandl , Winter and Barrett. Main Idea. Main Idea. Braunstein -Caves Bell Inequality. The Protocol. Alice. Bob. The Protocol. Alice. Bob.
E N D
Universally-composable Security of Key Distribution from Causality Constraints Based on results by: Masanes, Renner, Christandl, Winter and Barrett
The Protocol Alice Bob
The Protocol Alice Bob
The Protocol Alice Bob Nonlocality Estimation I J
The Protocol Alice Bob Nonlocality Estimation I J Error Correction c=f(a) EC Thanks! Privacy Amplification Got it!
Conclusions and Open Problems References