Download presentation
Presentation is loading. Please wait.
Published byToby Wilkerson Modified over 5 years ago
1
Based on results by: Masanes, Renner, Christandl, Winter and Barrett
Universally-composable Security of Key Distribution from Causality Constraints Based on results by: Masanes, Renner, Christandl, Winter and Barrett
2
Main Idea
3
Main Idea
4
Braunstein-Caves Bell Inequality
5
The Protocol Alice Bob
6
The Protocol Alice Bob
7
In terms of quantum measurements…
8
The Protocol Alice Bob Nonlocality Estimation I J
9
The Protocol I J Alice Bob Nonlocality Estimation Error Correction EC
c=f(a) EC Thanks! Privacy Amplification Got it!
10
Nonlocality Estimation
11
Nonlocality Estimation
12
Privacy Amplification
13
Universally-composable Security
14
Universally-composable Security
15
Conclusions and Open Problems
References
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.