Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Fundamental limitations on the device-independent quantum conference key agreement
We provide several general upper bounds on the rate of a key secure against a quantum
adversary in the device-independent conference key agreement (DI-CKA) scenario. They …
adversary in the device-independent conference key agreement (DI-CKA) scenario. They …
Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
The device-independent framework constitutes the most pragmatic approach to quantum
protocols that does not put any trust in their implementations. It requires all claims, about eg …
protocols that does not put any trust in their implementations. It requires all claims, about eg …
Upper bounds on device-independent quantum key distribution rates in static and dynamic scenarios
In this work, we develop upper bounds on key rates for device-independent quantum key
distribution (DI-QKD) protocols and devices. We study the reduced cc-squashed …
distribution (DI-QKD) protocols and devices. We study the reduced cc-squashed …
Upper bounds on device-independent quantum key distribution
Quantum key distribution (QKD) is a method that distributes a secret key to a sender and a
receiver by the transmission of quantum particles (eg, photons). Device-independent …
receiver by the transmission of quantum particles (eg, photons). Device-independent …
Upper bounds on device-independent quantum key distribution rates and a revised Peres conjecture
R Arnon-Friedman, F Leditzky - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Device-independent quantum key distribution (DIQKD) is one of the most challenging tasks
in quantum cryptography. The protocols and their security are based on the existence of Bell …
in quantum cryptography. The protocols and their security are based on the existence of Bell …
Communication cost for non-Markovianity of tripartite quantum states: A resource theoretic approach
E Wakakuwa - IEEE Transactions on Information Theory, 2020 - ieeexplore.ieee.org
To quantify non-Markovianity of tripartite quantum states from an operational viewpoint, we
introduce a class Ω° of operations performed by three distant parties. A tripartite quantum …
introduce a class Ω° of operations performed by three distant parties. A tripartite quantum …
Prospects for device-independent quantum key distribution
EYZ Tan - arXiv preprint arXiv:2111.11769, 2021 - arxiv.org
Device-independent quantum key distribution (DIQKD) aims to achieve secure key
distribution with only minimal assumptions, by basing its security on the violation of Bell …
distribution with only minimal assumptions, by basing its security on the violation of Bell …