Matthew McKague, Lana Sheridan
Recently, it has been suggested that device independent approaches to quantum key distribution may be of limited utility, since standard protocols could leak key to the adversary when devices are used repeatedly. We propose a means by which devices with memories could be reused from one run of a quantum key distribution protocol to the next while bounding the leakage to Eve, under the assumption that one run of the protocol could be completed securely using devices with memories.
View original:
http://arxiv.org/abs/1209.4696
No comments:
Post a Comment