15
Universally-composable Security of Key Distribution from Causality Constraints Based on results by: Masanes, Renner, Christandl, Winter and Barrett

Universally- composable Security of Key Distribution from Causality Constraints

  • Upload
    leona

  • View
    26

  • Download
    0

Embed Size (px)

DESCRIPTION

Universally- composable Security of Key Distribution from Causality Constraints. Based on results by: Masanes , Renner, Christandl , Winter and Barrett. Main Idea. Main Idea. Braunstein -Caves Bell Inequality. The Protocol. Alice. Bob. The Protocol. Alice. Bob. - PowerPoint PPT Presentation

Citation preview

Page 1: Universally- composable  Security of Key Distribution from Causality Constraints

Universally-composable Security of Key Distribution from Causality Constraints

Based on results by: Masanes, Renner, Christandl, Winter and Barrett

Page 2: Universally- composable  Security of Key Distribution from Causality Constraints

Main Idea

Page 3: Universally- composable  Security of Key Distribution from Causality Constraints

Main Idea

Page 4: Universally- composable  Security of Key Distribution from Causality Constraints

Braunstein-Caves Bell Inequality

Page 5: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

Page 6: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

Page 7: Universally- composable  Security of Key Distribution from Causality Constraints

In terms of quantum measurements…

Page 8: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

I JNonlocality Estimation

Page 9: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

I JNonlocality Estimation

Error Correctionc=f(a)

Privacy Amplification

Thanks!

EC

Got it!

Page 10: Universally- composable  Security of Key Distribution from Causality Constraints

Nonlocality Estimation

Page 11: Universally- composable  Security of Key Distribution from Causality Constraints

Nonlocality Estimation

Page 12: Universally- composable  Security of Key Distribution from Causality Constraints

Privacy Amplification

Page 13: Universally- composable  Security of Key Distribution from Causality Constraints

Universally-composable Security

Page 14: Universally- composable  Security of Key Distribution from Causality Constraints

Universally-composable Security

Page 15: Universally- composable  Security of Key Distribution from Causality Constraints

Conclusions and Open Problems

References