4.1.1 Privacy amplification
Course subject(s)
04. From imperfect information to (near) perfect security
In this video we introduce the task of Privacy Amplification: how do Alice and Bob “amplify a weak secret”?

Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.