Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Advances in device-independent quantum key distribution
V Zapatero, T van Leent, R Arnon-Friedman… - npj quantum …, 2023 - nature.com
Device-independent quantum key distribution (DI-QKD) provides the gold standard for
secure key exchange. Not only does it allow for information-theoretic security based on …
secure key exchange. Not only does it allow for information-theoretic security based on …
Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdrop** attacks …
as the hardness of prime factorization to provide security against eavesdrop** attacks …
Security of device-independent quantum key distribution protocols: a review
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
Device-independent randomness expansion against quantum side information
The ability to produce random numbers that are unknown to any outside party is crucial for
many applications. Device-independent randomness generation,,–does not require trusted …
many applications. Device-independent randomness generation,,–does not require trusted …
Simple security analysis of phase-matching measurement-device-independent quantum key distribution
J Lin, N Lütkenhaus - Physical Review A, 2018 - APS
Variations of phase-matching measurement-device-independent quantum key distribution
(PM-MDI QKD) protocols have been investigated before, but it was recently discovered that …
(PM-MDI QKD) protocols have been investigated before, but it was recently discovered that …
Generalised entropy accumulation
Consider a sequential process in which each step outputs a system A i and updates a side
information register E. We prove that if this process satisfies a natural “non-signalling” …
information register E. We prove that if this process satisfies a natural “non-signalling” …
Device-independent lower bounds on the conditional von Neumann entropy
The rates of several device-independent (DI) protocols, including quantum key-distribution
(QKD) and randomness expansion (RE), can be computed via an optimization of the …
(QKD) and randomness expansion (RE), can be computed via an optimization of the …
Device-independent quantum key distribution with random key basis
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices
to distribute secret keys in an insecure network. It thus represents the ultimate form of …
to distribute secret keys in an insecure network. It thus represents the ultimate form of …
Entropy accumulation
We ask the question whether entropy accumulates, in the sense that the operationally
relevant total uncertainty about an n-partite system A=(A_1, ... A_n) A=(A 1,… A n) …
relevant total uncertainty about an n-partite system A=(A_1, ... A_n) A=(A 1,… A n) …