• Publications
  • Influence
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
TLDR
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.
A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations
We are interested in the problem of characterizing the correlations that arise when performing local measurements on separate quantum systems. In a previous work (Navascues et al 2007 Phys. Rev.
Random numbers certified by Bell’s theorem
TLDR
It is shown that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness, and it is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device.
Bounding the set of quantum correlations.
We introduce a hierarchy of conditions necessarily satisfied by any distribution P_{alphabeta} representing the probabilities for two separate observers to obtain outcomes alpha and beta when making
Device-independent security of quantum cryptography against collective attacks.
TLDR
The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows
Discriminating States: the quantum Chernoff bound.
TLDR
The problem of discriminating two different quantum states in the setting of asymptotically many copies is considered, and the minimal probability of error is determined, leading to the identification of the quantum Chernoff bound, thereby solving a long-standing open problem.
Classification of mixed three-qubit states.
TLDR
A classification of mixed three-qubit states is introduced, in which the classes of separable, biseparable, W, and Greenberger-Horne-Zeilinger states are successively embedded into each other.
A Combinatorial Approach to Nonlocality and Contextuality
AbstractSo far, most of the literature on (quantum) contextuality and the Kochen–Specker theorem seems either to concern particular examples of contextuality, or be considered as quantum logic. Here,
General properties of nonsignaling theories
This article identifies a series of properties common to all theories that do not allow for superluminal signaling and predict the violation of Bell inequalities. Intrinsic randomness, uncertainty
...
1
2
3
4
5
...