Universally- composable Security of Key Distribution from Causality Constraints

15
Universally-composable Security of Key Distribution from Causality Constraints Based on results by: Masanes, Renner, Christandl, Winter and Barrett

description

Universally- composable Security of Key Distribution from Causality Constraints. Based on results by: Masanes , Renner, Christandl , Winter and Barrett. Main Idea. Main Idea. Braunstein -Caves Bell Inequality. The Protocol. Alice. Bob. The Protocol. Alice. Bob. - PowerPoint PPT Presentation

Transcript of Universally- composable Security of Key Distribution from Causality Constraints

Page 1: Universally- composable  Security of Key Distribution from Causality Constraints

Universally-composable Security of Key Distribution from Causality Constraints

Based on results by: Masanes, Renner, Christandl, Winter and Barrett

Page 2: Universally- composable  Security of Key Distribution from Causality Constraints

Main Idea

Page 3: Universally- composable  Security of Key Distribution from Causality Constraints

Main Idea

Page 4: Universally- composable  Security of Key Distribution from Causality Constraints

Braunstein-Caves Bell Inequality

Page 5: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

Page 6: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

Page 7: Universally- composable  Security of Key Distribution from Causality Constraints

In terms of quantum measurements…

Page 8: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

I JNonlocality Estimation

Page 9: Universally- composable  Security of Key Distribution from Causality Constraints

The ProtocolAlice Bob

I JNonlocality Estimation

Error Correctionc=f(a)

Privacy Amplification

Thanks!

EC

Got it!

Page 10: Universally- composable  Security of Key Distribution from Causality Constraints

Nonlocality Estimation

Page 11: Universally- composable  Security of Key Distribution from Causality Constraints

Nonlocality Estimation

Page 12: Universally- composable  Security of Key Distribution from Causality Constraints

Privacy Amplification

Page 13: Universally- composable  Security of Key Distribution from Causality Constraints

Universally-composable Security

Page 14: Universally- composable  Security of Key Distribution from Causality Constraints

Universally-composable Security

Page 15: Universally- composable  Security of Key Distribution from Causality Constraints

Conclusions and Open Problems

References