In this chapter we introduce a variant of the BB’84 quantum key distribution protocol, the E’91 protocol due to Ekert. We show that this protocol achieves a higher level of security called “device independent security.” What this means, informally, is that the new protocol’s security doesn’t rely on Alice and Bob performing trusted measurements on their qubit in each round. We sketch the proof of security of the E’91 protocol, which rests on the property of entanglement monogamy.
Review the options below to login to check your access.
Log in with your Cambridge Aspire website account to check access.
If you believe you should have access to this content, please contact your institutional librarian or consult our FAQ page for further information about accessing our content.