arXiv:1205.6672 [quant-ph]AbstractReferencesReviewsResources
Reply to "Comment on 'Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations' "
Published 2012-05-30Version 1
In this reply I address the comment by W-Y. Hwang and O. Gittsovich on my paper [Phys. Rev. A {\bf 82}, 032313 (2010)]. The authors of the comment point out that I use implicit assumption that the alphabet of the eavesdropper is binary. They claim that such assumption is unrealistic. Here I show that even without this assumption the main result of my paper still holds.
Comments: for the comment see arXiv:1204.4235
Journal: PRA 85, 046302 (2012)
Categories: quant-ph
Keywords: bells inequality violations, cryptographic protocols, security proof, comment point, implicit assumption
Tags: journal article
Related articles: Most relevant | Search more
Security proof for cryptographic protocols based only on the monogamy of Bell's inequality violations
arXiv:1204.4235 [quant-ph] (Published 2012-04-19)
Comment on "Security Proof for Cryptographic Protocols Based Only on Monogamy of Bell's Inequality Violations"
Monogamy of Bell's inequality violations in non-signaling theories