Based on results by: Masanes, Renner, Christandl, Winter and Barrett Universally-composable Security of Key Distribution from Causality Constraints Based on results by: Masanes, Renner, Christandl, Winter and Barrett
Main Idea
Main Idea
Braunstein-Caves Bell Inequality
The Protocol Alice Bob
The Protocol Alice Bob
In terms of quantum measurements…
The Protocol Alice Bob Nonlocality Estimation I J
The Protocol I J Alice Bob Nonlocality Estimation Error Correction EC c=f(a) EC Thanks! Privacy Amplification Got it!
Nonlocality Estimation
Nonlocality Estimation
Privacy Amplification
Universally-composable Security
Universally-composable Security
Conclusions and Open Problems References