7.4.1 Security against collective attacks

Course subject(s) 07. Quantum cryptography using untrusted devices

In this section we discuss the security proof of this module’s QKD protocol under the assumption that the eavesdropper is restricted to collective attacks: attacks which attempt to guess the bits generated by Alice and Bob in each round independently (yes, the name collective is confusing!).

Creative Commons License
Quantum Cryptography by TU Delft OpenCourseWare is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at https://ocw.tudelft.nl/courses/quantum-cryptography/.
Back to top