Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Quantum nonlocality without entanglement

CH Bennett, DP DiVincenzo, CA Fuchs, T Mor, E Rains… - Physical Review A, 1999 - APS
We exhibit an orthogonal set of product states of two three-state particles that nevertheless
cannot be reliably distinguished by a pair of separated observers ignorant of which of the …

Quantum cloning machines and the applications

H Fan, YN Wang, L **g, JD Yue, HD Shi, YL Zhang… - Physics Reports, 2014 - Elsevier
No-cloning theorem is fundamental for quantum mechanics and for quantum information
science that states an unknown quantum state cannot be cloned perfectly. However, we can …

Quantum key distribution in the Holevo limit

A Cabello - Physical Review Letters, 2000 - APS
A theorem by Shannon and the Holevo theorem impose that the efficiency of any protocol for
quantum key distribution, E, defined as the number of secret (ie, allowing eavesdrop** …

Quantum key distribution with classical Bob

M Boyer, D Kenigsberg, T Mor - 2007 First International …, 2007 - ieeexplore.ieee.org
Secure key distribution among two remote parties is impossible when both are classical,
unless some unproven (and arguably unrealistic) computation-complexity assumptions are …

Semiquantum key distribution

M Boyer, R Gelles, D Kenigsberg, T Mor - Physical Review A—Atomic …, 2009 - APS
Secure key distribution between two remote parties is impossible when both are classical,
unless some unproven (and arguably unrealistic) computation-complexity assumptions are …

Deterministic secure communication without using entanglement

C Qing-Yu, L Bai-Wen - Chinese Physics Letters, 2004 - iopscience.iop.org
Deterministic Secure Communication Without Using Entanglement Page 1 Chinese Physics
Letters Deterministic Secure Communication Without Using Entanglement To cite this article …

Counterfactual quantum cryptography

TG Noh - Physical review letters, 2009 - APS
Quantum cryptography allows one to distribute a secret key between two remote parties
using the fundamental principles of quantum mechanics. The well-known established …

Optimal cloning of pure states, testing single clones

M Keyl, RF Werner - Journal of Mathematical Physics, 1999 - pubs.aip.org
We consider quantum devices for turning a finite number N of d-level quantum systems in
the same unknown pure state σ into M> N systems of the same kind, in an approximation of …

Semiquantum-key distribution using less than four quantum states

X Zou, D Qiu, L Li, L Wu, L Li - Physical Review A—Atomic, Molecular, and …, 2009 - APS
Recently Boyer [Phys. Rev. Lett. 99, 140501 (2007)] suggested the idea of semiquantum key
distribution (SQKD) in which Bob is classical and they also proposed a semiquantum key …