Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Single-qubit loss-tolerant quantum position verification protocol secure against entangled attackers
We give a tight characterization of the relation between loss tolerance and error rate of the
most popular protocol for quantum position verification, which is based on BB84 states …
most popular protocol for quantum position verification, which is based on BB84 states …
Efficient quantum circuits for port-based teleportation
Port-based teleportation (PBT) is a variant of quantum teleportation that, unlike the canonical
protocol by Bennett et al., does not require a correction operation on the teleported state …
protocol by Bennett et al., does not require a correction operation on the teleported state …
Monogamy of highly symmetric states
We investigate the extent to which two particles can be maximally entangled when they are
also similarly entangled with other particles on a complete graph, focusing on Werner …
also similarly entangled with other particles on a complete graph, focusing on Werner …
Security of a continuous-variable based quantum position verification protocol
In this work we study quantum position verification with continuous-variable quantum states.
In contrast to existing discrete protocols, we present and analyze a protocol that utilizes …
In contrast to existing discrete protocols, we present and analyze a protocol that utilizes …
Quantum cryptography beyond key distribution: theory and experiment
Due to its fundamental principles, quantum theory holds the promise to enhance the security
of modern cryptography, from message encryption to anonymous communication, digital …
of modern cryptography, from message encryption to anonymous communication, digital …
A quantum cloning game with applications to quantum position verification
We introduce a quantum cloning game in which $ k $ separate collaborative parties receive
a classical input, determining which of them has to share a maximally entangled state with …
a classical input, determining which of them has to share a maximally entangled state with …
Towards practical and error-robust quantum position verification
Loss of inputs can be detrimental to the security of quantum position verification (QPV)
protocols, as it may allow attackers to not answer on all played rounds, but only on those …
protocols, as it may allow attackers to not answer on all played rounds, but only on those …
Continuous-variable Quantum Position Verification secure against entangled attackers
Motivated by the fact that coherent states may offer practical advantages it was recently
shown that a continuous-variable (CV) quantum position verification (QPV) protocol using …
shown that a continuous-variable (CV) quantum position verification (QPV) protocol using …
[PDF][PDF] Mixed Schur–Weyl duality in quantum information
DA Grinko - 2025 - ir.cwi.nl
Many thanks to Matthias Christandl, Ion Nechita, Michał Studziński, and Mio Murao for their
kind invitations and for organising my academic visits. Each of these visits was not only …
kind invitations and for organising my academic visits. Each of these visits was not only …
The Min-Entropy of Classical-Quantum Combs for Measurement-Based Applications
Learning a hidden property of a quantum system typically requires a series of interactions. In
this work, we formalise such multi-round learning processes using a generalisation of …
this work, we formalise such multi-round learning processes using a generalisation of …