http://www.w3.org/ns/prov#value | - FIG. 11 is a flowchart that illustrates an exemplary process, consistent with principles of the invention, for receiving encryption key material from another QKD endpoint using quantum cryptographic mechanisms and constructing a key pedigree based on the received key material.
|