6.6.2 A concentration inequality
Course subject(s)
06. Quantum key distribution protocols
In this video we discuss a technique used to remove the assumption that all rounds of the BB’84 protocol are played (and attacked!) independently.
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.