裂缝 发表于 2025-3-25 05:17:09
http://reply.papertrans.cn/79/7813/781261/781261_21.pngNeedlework 发表于 2025-3-25 10:49:51
Introduction, past years, there has been tremendous progress with regard to the design of novel protocols, the development of sophisticated techniques for security proofs, and even in-field implementations of technological prototypes.Maximize 发表于 2025-3-25 15:08:48
http://reply.papertrans.cn/79/7813/781261/781261_23.png出生 发表于 2025-3-25 17:52:48
Quantum Key Distribution Protocols,on protocol can be divided into two parts: The first part is the quantum transmission phase, in which Alice and Bob send and/or measure quantum states. The second part is the classical post-processing phase, where they turn the bit strings generated in the quantum phase into a pair of secure keys.偏见 发表于 2025-3-25 22:48:50
Introduction,ing the principles of quantum theory to establish a secret key between two distant parties whose security is guaranteed by the laws of physics. In the past years, there has been tremendous progress with regard to the design of novel protocols, the development of sophisticated techniques for security预知 发表于 2025-3-26 02:05:25
Mathematical Tools, recap the definitions and concepts that will be needed later, which includes the description of quantum systems, quantum phenomena such as entanglement, and measures of distance between quantum states.grenade 发表于 2025-3-26 06:55:42
Information and Entropies,otocols. In general, the quantum entropy quantifies the amount of uncertainty we have of the state of a quantum mechanical system. In the context of a quantum key distribution protocol, the entropy can be used, for instance, to estimate how much information an adversary has about the key that Aliceconservative 发表于 2025-3-26 10:25:19
Quantum Key Distribution Protocols,nnel. The crucial point here is that the key generating protocol is . secure against any possible attack that an eavesdropper can perform. It is the law of physics (or, in fact, quantum mechanics) that guarantees the security of the protocol, not only the technical limitations that exist in practica腐蚀 发表于 2025-3-26 13:05:24
http://reply.papertrans.cn/79/7813/781261/781261_29.pnglesion 发表于 2025-3-26 18:25:03
Device-Independent QKD,al protocol and do not take into account the problems that arise when implementing a protocol, such as the photon-number-splitting attack. DIQKD circumvents this problem by assuming that the incorporated devices are not trusted, therefore not making any assumptions on them in the security proof. To