• Publications
  • Influence
On quantum Rényi entropies: A new generalization and some properties
This work proposes a new quantum generalization of the family of Renyi entropies that contains the von Neumann entropy, min-entropy, collision entropy, and the max-entropies as special cases, thus encompassing most quantum entropie in use today.
The decoupling approach to quantum information theory
The central theorem of this thesis proves the existence of a protocol that transmits quantum data that is partially known to the receiver through a single use of an arbitrary noisy quantum channel via entanglement-assisted and unassisted asymptotic coding theorems.
On quantum Renyi entropies: a new definition and some properties
This paper presents a probabilistic simulation of the response of the proton-proton collision in a discrete-time setting with real-time consequences.
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of
Practical device-independent quantum cryptography via entropy accumulation
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.
One-Shot Decoupling
If a quantum system A, which is initially correlated to another system, E, undergoes an evolution separated from E, then the correlation to E generally decreases. Here, we study the conditions under
Entropy accumulation
It is shown that entropy accumulation occurs more generally, i.e., without an independence assumption, provided one quantifies the uncertainty about the individual systems $A_i$ by the von Neumann entropy of suitably chosen conditional states.
Actively Secure Two-Party Evaluation of Any Quantum Operation
The first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map is provided, constructed from the protocol for the same task secure against specious adversaries present.
Entropy Accumulation With Improved Second-Order Term
  • F. Dupuis, Omar Fawzi
  • Computer Science, Mathematics
    IEEE Transactions on Information Theory
  • 29 May 2018
This paper improves this second-order sublinear term of the entropy accumulation theorem, particularly suited to proving the security of quantum cryptographic protocols, and in particular so-called device-independent protocols for randomness expansion and key distribution.
Generalized Entropies
An entropy measure for quantum systems is studied that generalizes the von Neumann entropy as well as its classical counterpart, the Gibbs or Shannon entropy, and is derived from the formulation as a semidefinite program.