Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

Security in quantum cryptography

C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …

Entropic uncertainty relations and their applications

PJ Coles, M Berta, M Tomamichel, S Wehner - Reviews of Modern Physics, 2017 - APS
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics.
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …

Quantum cryptography: Key distribution and beyond

A Pathak, R Srikanth - arXiv preprint arXiv:1802.05517, 2018 - arxiv.org
Quantum Cryptography: Key Distribution and Beyond Page 1 Quantum Cryptography: Key
Distribution and Beyond Akshata Shenoy-Hejamadi 1, Anirban Pathak 2 & Srikanth …

Experimental bit commitment based on quantum communication and special relativity

T Lunghi, J Kaniewski, F Bussieres, R Houlmann… - Physical review …, 2013 - APS
Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a
secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is …

Quantum position verification in the random oracle model

D Unruh - Advances in Cryptology–CRYPTO 2014: 34th Annual …, 2014 - Springer
We present a quantum position verification scheme in the random oracle model. In contrast
to prior work, our scheme does not require bounded storage/retrieval/entanglement …

Causal boxes: quantum information-processing systems closed under composition

C Portmann, C Matt, U Maurer… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Complex information-processing systems, for example, quantum circuits, cryptographic
protocols, or multi-player games, are naturally described as networks composed of more …

Practical relativistic bit commitment

T Lunghi, J Kaniewski, F Bussières, R Houlmann… - Physical Review Letters, 2015 - APS
Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a
secret bit to Bob. Perfectly secure bit commitment between two mistrustful parties is …

Device-independent two-party cryptography secure against sequential attacks

J Kaniewski, S Wehner - New Journal of Physics, 2016 - iopscience.iop.org
The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common
tasks without the need for mutual trust. Examples of such tasks are private access to a …

Entropic uncertainty from effective anticommutators

J Kaniewski, M Tomamichel, S Wehner - Physical Review A, 2014 - APS
We investigate entropic uncertainty relations for two or more binary measurements, for
example, spin-1 2 or polarization measurements. We argue that the effective …