Bell nonlocality
Bell's 1964 theorem, which states that the predictions of quantum theory cannot be
accounted for by any local theory, represents one of the most profound developments in the …
accounted for by any local theory, represents one of the most profound developments in the …
Quantum steering
Quantum correlations between two parties are essential for the argument of Einstein,
Podolsky, and Rosen in favor of the incompleteness of quantum mechanics. Schrödinger …
Podolsky, and Rosen in favor of the incompleteness of quantum mechanics. Schrödinger …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Self-testing of quantum systems: a review
Self-testing is a method to infer the underlying physics of a quantum experiment in a black
box scenario. As such it represents the strongest form of certification for quantum systems. In …
box scenario. As such it represents the strongest form of certification for quantum systems. In …
Quantum random number generation
Quantum physics can be exploited to generate true random numbers, which have important
roles in many applications, especially in cryptography. Genuine randomness from the …
roles in many applications, especially in cryptography. Genuine randomness from the …
Advances in device-independent quantum key distribution
Device-independent quantum key distribution (DI-QKD) provides the gold standard for
secure key exchange. Not only does it allow for information-theoretic security based on …
secure key exchange. Not only does it allow for information-theoretic security based on …
Certified randomness in quantum physics
The concept of randomness plays an important part in many disciplines. On the one hand,
the question of whether random processes exist is fundamental for our understanding of …
the question of whether random processes exist is fundamental for our understanding of …
Practical device-independent quantum cryptography via entropy accumulation
Device-independent cryptography goes beyond conventional quantum cryptography by
providing security that holds independently of the quality of the underlying physical devices …
providing security that holds independently of the quality of the underlying physical devices …
All pure bipartite entangled states can be self-tested
Quantum technologies promise advantages over their classical counterparts in the fields of
computation, security and sensing. It is thus desirable that classical users are able to obtain …
computation, security and sensing. It is thus desirable that classical users are able to obtain …
Device-independent quantum key distribution based on the Mermin-Peres magic square game
Device-independent quantum key distribution (DIQKD) is information-theoretically secure
against adversaries who possess a scalable quantum computer and who have supplied …
against adversaries who possess a scalable quantum computer and who have supplied …