Security of device-independent quantum key distribution protocols: a review
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
[HTML][HTML] High-capacity device-independent quantum secure direct communication based on hyper-encoding
Quantum secure direct communication (QSDC) can directly transmit secret messages
through quantum channel without keys. Device-independent (DI) QSDC guarantees the …
through quantum channel without keys. Device-independent (DI) QSDC guarantees the …
Practical limitations on robustness and scalability of quantum Internet
A Sadhu, MA Somayajula, K Horodecki… - arXiv preprint arXiv …, 2023 - arxiv.org
As quantum theory allows for information processing and computing tasks that otherwise are
not possible with classical systems, there is a need and use of quantum Internet beyond …
not possible with classical systems, there is a need and use of quantum Internet beyond …
Fundamental limitations on the device-independent quantum conference key agreement
We provide several general upper bounds on the rate of a key secure against a quantum
adversary in the device-independent conference key agreement (DI-CKA) scenario. They …
adversary in the device-independent conference key agreement (DI-CKA) scenario. They …
Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
The device-independent framework constitutes the most pragmatic approach to quantum
protocols that does not put any trust in their implementations. It requires all claims, about eg …
protocols that does not put any trust in their implementations. It requires all claims, about eg …
Testing of quantum nonlocal correlations under constrained free will and imperfect detectors
In this work, we deal with the relaxation of two central assumptions in standard locally
realistic hidden variable (LRHV) inequalities: free will in choosing measurement settings …
realistic hidden variable (LRHV) inequalities: free will in choosing measurement settings …
Squashed quantum non-Markovianity: a measure of genuine quantum non-Markovianity in states
Quantum non-Markovianity in tripartite quantum states $\rho_ {ABC} $ represents a
correlation between systems $ A $ and $ C $ when conditioned on the system $ B $ and is …
correlation between systems $ A $ and $ C $ when conditioned on the system $ B $ and is …
Multipartite intrinsic non-locality and device-independent conference key agreement
In this work, we introduce multipartite intrinsic non-locality as a method for quantifying
resources in the multipartite scenario of device-independent (DI) conference key agreement …
resources in the multipartite scenario of device-independent (DI) conference key agreement …
Prospects for device-independent quantum key distribution
EYZ Tan - arXiv preprint arXiv:2111.11769, 2021 - arxiv.org
Device-independent quantum key distribution (DIQKD) aims to achieve secure key
distribution with only minimal assumptions, by basing its security on the violation of Bell …
distribution with only minimal assumptions, by basing its security on the violation of Bell …
Limitations on a device-independent key secure against a nonsignaling adversary via squashed nonlocality
M Winczewski, T Das, K Horodecki - Physical Review A, 2022 - APS
We initiate a systematic study to provide upper bounds on device-independent keys, secure
against a nonsignaling adversary (NSDI). We employ the idea of “squashing” on the secrecy …
against a nonsignaling adversary (NSDI). We employ the idea of “squashing” on the secrecy …