Bas Westerbaan

home

Picture-perfect Quantum Key Distribution

28 Apr 2017 [ arXiv ]

We give a new way to bound the security of QKD using only the diagrammatic behavior of complementary observables and essential uniqueness of purification for quantum channels.

We begin by demonstrating a proof in the simplest case, where the eavesdropper doesn’t noticeably disturb the channel at all and has no quantum memory. We then show how this case extends with almost no effort to account for quantum memory and noise.