[HTML][HTML] Security of device-independent quantum key distribution protocols: a review
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
exchange protocol in terms of security, as it can be performed securely with uncharacterised …
[HTML][HTML] A device-independent quantum key distribution system for distant users
W Zhang, T van Leent, K Redeker, R Garthoff… - Nature, 2022 - nature.com
Device-independent quantum key distribution (DIQKD) enables the generation of secret
keys over an untrusted channel using uncharacterized and potentially untrusted devices …
keys over an untrusted channel using uncharacterized and potentially untrusted devices …
Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdropping attacks …
as the hardness of prime factorization to provide security against eavesdropping attacks …
Device-independent quantum key distribution based on the Mermin-Peres magic square game
Device-independent quantum key distribution (DIQKD) is information-theoretically secure
against adversaries who possess a scalable quantum computer and who have supplied …
against adversaries who possess a scalable quantum computer and who have supplied …
[HTML][HTML] Device-independent quantum key distribution with random key basis
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices
to distribute secret keys in an insecure network. It thus represents the ultimate form of …
to distribute secret keys in an insecure network. It thus represents the ultimate form of …
[HTML][HTML] Security of quantum key distribution from generalised entropy accumulation
The goal of quantum key distribution (QKD) is to establish a secure key between two parties
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …
connected by an insecure quantum channel. To use a QKD protocol in practice, one has to …
[HTML][HTML] Security of discrete-modulated continuous-variable quantum key distribution
Continuous variable quantum key distribution with discrete modulation has the potential to
provide information-theoretic security using widely available optical elements and existing …
provide information-theoretic security using widely available optical elements and existing …
[HTML][HTML] Quantum correlations in the minimal scenario
In the minimal scenario of quantum correlations, two parties can choose from two
observables with two possible outcomes each. Probabilities are specified by four marginals …
observables with two possible outcomes each. Probabilities are specified by four marginals …
[HTML][HTML] Device-independent quantum key distribution from generalized CHSH inequalities
Device-independent quantum key distribution aims at providing security guarantees even
when using largely uncharacterised devices. In the simplest scenario, these guarantees are …
when using largely uncharacterised devices. In the simplest scenario, these guarantees are …
Device-independent quantum key distribution
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorisation to provide security against eavesdropping attacks …
as the hardness of prime factorisation to provide security against eavesdropping attacks …