Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …
as the hardness of prime factorization to provide security against eavesdrop** attacks …
Loophole-free Bell inequality violation with superconducting circuits
Superposition, entanglement and non-locality constitute fundamental features of quantum
physics. The fact that quantum physics does not follow the principle of local causality,–can …
physics. The fact that quantum physics does not follow the principle of local causality,–can …
Multidimensional quantum entanglement with large-scale integrated optics
The ability to control multidimensional quantum systems is central to the development of
advanced quantum technologies. We demonstrate a multidimensional integrated quantum …
advanced quantum technologies. We demonstrate a multidimensional integrated quantum …
Strong loophole-free test of local realism
We present a loophole-free violation of local realism using entangled photon pairs. We
ensure that all relevant events in our Bell test are spacelike separated by placing the parties …
ensure that all relevant events in our Bell test are spacelike separated by placing the parties …
Self-testing of quantum systems: a review
Self-testing is a method to infer the underlying physics of a quantum experiment in a black
box scenario. As such it represents the strongest form of certification for quantum systems. In …
box scenario. As such it represents the strongest form of certification for quantum systems. In …
Toward a photonic demonstration of device-independent quantum key distribution
The security of quantum key distribution (QKD) usually relies on that the users' devices are
well characterized according to the security models made in the security proofs. In contrast …
well characterized according to the security models made in the security proofs. In contrast …
Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres
More than 50 years ago, John Bell proved that no theory of nature that obeys locality and
realism can reproduce all the predictions of quantum theory: in any local-realist theory, the …
realism can reproduce all the predictions of quantum theory: in any local-realist theory, the …