Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Quantum random number generators

M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important
applications in simulation and cryptography. The inherent randomness at the core of …

[图书][B] Quantum information processing with finite resources: mathematical foundations

M Tomamichel - 2015 - books.google.com
This book provides the reader with the mathematical framework required to fully explore the
potential of small quantum information processing devices. As decoherence will continue to …

Security of quantum key distribution

R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …

Quantum state discrimination and its applications

J Bae, LC Kwek - Journal of Physics A: Mathematical and …, 2015 - iopscience.iop.org
Quantum state discrimination underlies various applications in quantum information
processing tasks. It essentially describes the distinguishability of quantum systems in …

[图书][B] Introduction to cryptography

H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …

Private randomness expansion with untrusted devices

R Colbeck, A Kent - Journal of Physics A: Mathematical and …, 2011 - iopscience.iop.org
Randomness is an important resource for many applications, from gambling to secure
communication. However, guaranteeing that the output from a candidate random source …

Optimality of Gaussian attacks in continuous-variable quantum cryptography

M Navascués, F Grosshans, A Acin - Physical review letters, 2006 - APS
We analyze the asymptotic security of the family of Gaussian modulated quantum key
distribution protocols for continuous-variables systems. We prove that the Gaussian unitary …

A framework for non-asymptotic quantum information theory

M Tomamichel - arXiv preprint arXiv:1203.2142, 2012 - arxiv.org
This thesis consolidates, improves and extends the smooth entropy framework for non-
asymptotic information theory and cryptography. We investigate the conditional min-and max …

Leftover hashing against quantum side information

M Tomamichel, C Schaffner, A Smith… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The Leftover Hash Lemma states that the output of a two-universal hash function applied to
an input with sufficiently high entropy is almost uniformly random. In its standard formulation …