7.4.1 Security against collective attacks
Course subject(s)
07. Quantum cryptography using untrusted devices
In this section we discuss the security proof of this module’s QKD protocol under the assumption that the eavesdropper is restricted to collective attacks: attacks which attempt to guess the bits generated by Alice and Bob in each round independently (yes, the name collective is confusing!).
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.