Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Quantum random number generators
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …
applications in simulation and cryptography. The inherent randomness at the core of …
[图书][B] Quantum information processing with finite resources: mathematical foundations
M Tomamichel - 2015 - books.google.com
This book provides the reader with the mathematical framework required to fully explore the
potential of small quantum information processing devices. As decoherence will continue to …
potential of small quantum information processing devices. As decoherence will continue to …
Security of quantum key distribution
R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
applied issues in quantum mechanics from an information-theoretical viewpoint. The …
Quantum state discrimination and its applications
Quantum state discrimination underlies various applications in quantum information
processing tasks. It essentially describes the distinguishability of quantum systems in …
processing tasks. It essentially describes the distinguishability of quantum systems in …
[图书][B] Introduction to cryptography
H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
Private randomness expansion with untrusted devices
Randomness is an important resource for many applications, from gambling to secure
communication. However, guaranteeing that the output from a candidate random source …
communication. However, guaranteeing that the output from a candidate random source …
Optimality of Gaussian attacks in continuous-variable quantum cryptography
We analyze the asymptotic security of the family of Gaussian modulated quantum key
distribution protocols for continuous-variables systems. We prove that the Gaussian unitary …
distribution protocols for continuous-variables systems. We prove that the Gaussian unitary …
A framework for non-asymptotic quantum information theory
M Tomamichel - arXiv preprint arXiv:1203.2142, 2012 - arxiv.org
This thesis consolidates, improves and extends the smooth entropy framework for non-
asymptotic information theory and cryptography. We investigate the conditional min-and max …
asymptotic information theory and cryptography. We investigate the conditional min-and max …
Leftover hashing against quantum side information
The Leftover Hash Lemma states that the output of a two-universal hash function applied to
an input with sufficiently high entropy is almost uniformly random. In its standard formulation …
an input with sufficiently high entropy is almost uniformly random. In its standard formulation …