“…A common characteristic of these works is that significant attention is given to demonstrate correctness (i.e., that Alice and Bob calculate the same key), and efficiency; much less formal analysis (as we detail below) is performed to demonstrate security. More specifically, the security of many of these works, e.g., [16], [18], [19], [23], directly relied on the assumption that if the adversary is a wavelength away from the communicating parties, the adversary's observation is independent of the parties' measurements. Some other works made some further steps to analyze security.…”