Device-Independent Quantum Cryptography (IMAGE)
Caption
The key to proving the security of device-independent quantum cryptography in a regime that is attainable with state-of-the-art quantum technology is the realization that any attack strategy, no matter how complex (symbolized in the lower row), can be decomposed into a sequence of simple steps (upper row).
Credit
(Image from Arnon-Friedman et al. Nature Comms 9, 459; 2018).
Usage Restrictions
None
License
Licensed content