State-of-the-art survey of quantum cryptography
A Kumar, S Garhwal - Archives of Computational Methods in Engineering, 2021 - Springer
In today Internet era, confidential information transmitted over an insecure channel. With the
significant development in the area of quantum computing, there is a need for unconditional …
significant development in the area of quantum computing, there is a need for unconditional …
Self-testing quantum random number generator
The generation of random numbers is a task of paramount importance in modern science. A
central problem for both classical and quantum randomness generation is to estimate the …
central problem for both classical and quantum randomness generation is to estimate the …
Quantum cryptography: Key distribution and beyond
A Pathak, R Srikanth - arXiv preprint arXiv:1802.05517, 2018 - arxiv.org
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …
Receiver-device-independent quantum key distribution protocols
We discuss quantum key distribution protocols and their security analysis, considering a
receiver-device-independent (RDI) model. The sender's (Alice's) device is partially …
receiver-device-independent (RDI) model. The sender's (Alice's) device is partially …
Testing dimension and nonclassicality in communication networks
We consider networks featuring preparation, transformation, and measurement devices, in
which devices exchange communication via mediating physical systems. We investigate the …
which devices exchange communication via mediating physical systems. We investigate the …
[PDF][PDF] Experimental quantum randomness generation invulnerable to the detection loophole
Random numbers are essential for multiple applications, including cryptography, financial
security, digital rights management and scientific simulations. However, producing random …
security, digital rights management and scientific simulations. However, producing random …
Quantum randomness protected against detection loophole attacks
Device and semi-device-independent private quantum randomness generators are crucial
for applications requiring private randomness. However, they are vulnerable to detection …
for applications requiring private randomness. However, they are vulnerable to detection …
Detection efficiency and noise in a semi-device-independent randomness-extraction protocol
HW Li, ZQ Yin, M Pawłowski, GC Guo, ZF Han - Physical Review A, 2015 - APS
In this paper, we analyze several critical issues in semi-device-independent quantum
information processing protocol. In practical experimental realization, randomness …
information processing protocol. In practical experimental realization, randomness …
More randomness from a prepare-and-measure scenario with independent devices
How to generate genuine quantum randomness from untrusted devices is an important
problem in quantum information processing. Inspired by previous work on a self-testing …
problem in quantum information processing. Inspired by previous work on a self-testing …
Reduced gap between observed and certified randomness for semi-device-independent protocols
Quantum systems can be used to certify the existence of true randomness in nature, and
semi-device-independent (SDI) randomness expansion has been used to achieve this goal …
semi-device-independent (SDI) randomness expansion has been used to achieve this goal …