Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
- V. Scarani, A. Acín, G. Ribordy, N. Gisin
- Computer Science, MathematicsPhysical Review Letters
- 20 November 2002
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.
Random numbers certified by Bell’s theorem
- Stefano Pironio, A. Acín, C. Monroe
- Computer ScienceNature
- 18 November 2009
It is shown that the non-local correlations of entangled quantum particles can be used to certify the presence of genuine randomness, and it is thereby possible to design a cryptographically secure random number generator that does not require any assumption about the internal working of the device.
Device-independent quantum key distribution secure against collective attacks
- Stefano Pironio, A. Acín, N. Brunner, N. Gisin, S. Massar, V. Scarani
- Computer Science
- 25 March 2009
This proof exploits the full structure of quantum theory, but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol.
A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations
- M. Navascués, Stefano Pironio, A. Acín
- Computer Science
- 31 March 2008
It is shown that in some cases it is possible to conclude that a given set of correlations is quantum after performing only a finite number of tests, and used in particular to bound the quantum violation of various Bell inequalities.
Bounding the set of quantum correlations.
- M. Navascués, Stefano Pironio, A. Acín
- Computer SciencePhysical Review Letters
- 18 July 2006
We introduce a hierarchy of conditions necessarily satisfied by any distribution P_{alphabeta} representing the probabilities for two separate observers to obtain outcomes alpha and beta when making…
Device-independent security of quantum cryptography against collective attacks.
- A. Acín, N. Brunner, N. Gisin, S. Massar, Stefano Pironio, V. Scarani
- Computer SciencePhysical Review Letters
- 15 February 2007
The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
A Combinatorial Approach to Nonlocality and Contextuality
- A. Acín, T. Fritz, Anthony Leverrier, A. B. Sainz
- MathematicsCommunications in Mathematical Physics
- 17 December 2012
AbstractSo far, most of the literature on (quantum) contextuality and the Kochen–Specker theorem seems either to concern particular examples of contextuality, or be considered as quantum logic. Here,…
Discriminating States: the quantum Chernoff bound.
- K. Audenaert, J. Calsamiglia, F. Verstraete
- MathematicsPhysical Review Letters
- 4 October 2006
The problem of discriminating two different quantum states in the setting of asymptotically many copies is considered, and the minimal probability of error is determined, leading to the identification of the quantum Chernoff bound, thereby solving a long-standing open problem.
Randomness versus nonlocality and entanglement.
- A. Acín, S. Massar, Stefano Pironio
- MathematicsPhysical Review Letters
- 14 July 2011
It is proved here that quantum correlations with arbitrarily little nonlocality and states with arbitrarilylittle entanglement can be used to certify that close to the maximum of 2 bits of randomness are produced.
Classification of mixed three-qubit states.
- A. Acín, D. Bruß, M. Lewenstein, A. Sanpera
- MathematicsPhysical Review Letters
- 7 March 2001
A classification of mixed three-qubit states is introduced, in which the classes of separable, biseparable, W, and Greenberger-Horne-Zeilinger states are successively embedded into each other.
...
...