Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Experimental quantum key distribution certified by Bell's theorem

DP Nadlinger, P Drmota, BC Nichol, G Araneda… - Nature, 2022 - nature.com
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …

Loophole-free Bell inequality violation with superconducting circuits

S Storz, J Schär, A Kulikov, P Magnard, P Kurpiers… - Nature, 2023 - nature.com
Superposition, entanglement and non-locality constitute fundamental features of quantum
physics. The fact that quantum physics does not follow the principle of local causality,–can …

Multidimensional quantum entanglement with large-scale integrated optics

J Wang, S Paesani, Y Ding, R Santagati, P Skrzypczyk… - Science, 2018 - science.org
The ability to control multidimensional quantum systems is central to the development of
advanced quantum technologies. We demonstrate a multidimensional integrated quantum …

Strong loophole-free test of local realism

LK Shalm, E Meyer-Scott, BG Christensen, P Bierhorst… - Physical review …, 2015 - APS
We present a loophole-free violation of local realism using entangled photon pairs. We
ensure that all relevant events in our Bell test are spacelike separated by placing the parties …

Self-testing of quantum systems: a review

I Šupić, J Bowles - Quantum, 2020 - quantum-journal.org
Self-testing is a method to infer the underlying physics of a quantum experiment in a black
box scenario. As such it represents the strongest form of certification for quantum systems. In …

Toward a photonic demonstration of device-independent quantum key distribution

WZ Liu, YZ Zhang, YZ Zhen, MH Li, Y Liu, J Fan, F Xu… - Physical Review Letters, 2022 - APS
The security of quantum key distribution (QKD) usually relies on that the users' devices are
well characterized according to the security models made in the security proofs. In contrast …

Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres

B Hensen, H Bernien, AE Dréau, A Reiserer, N Kalb… - Nature, 2015 - nature.com
More than 50 years ago, John Bell proved that no theory of nature that obeys locality and
realism can reproduce all the predictions of quantum theory: in any local-realist theory, the …