#### Filter Results:

#### Publication Year

2002

2015

#### Publication Type

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the… (More)

We present a simple and practical protocol for the solution of a secure multiparty communication task, the secret sharing, and its proof-of-principle experimental realization. In this protocol, a secret is split among several parties in a way that its reconstruction requires the collaboration of the participating parties. In our scheme the parties solve the… (More)

- Pavel Trojek, Christian Schmid, Mohamed Bourennane, Časlav Brukner, Marek Żukowski, Harald Weinfurter
- Natural Computing
- 2012

Most proposals for quantum solutions of information-theoretic problems rely on the usage of multi-partite entangled states which are still difficult to produce experimentally with current state-of-the-art technology. Here, we analyze a scheme to simplify a particular kind of multiparty communication protocols for the experiment. We prove that the fidelity… (More)

- Jonathan Jogenfors, Ashraf Mohamed Elhassan, Johan Ahrens, Mohamed Bourennane, Jan-Åke Larsson
- Science advances
- 2015

Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in… (More)

- Johan Ahrens, Elias Amselem, Adán Cabello, Mohamed Bourennane
- Scientific reports
- 2013

We report two fundamental experiments on three-level quantum systems (qutrits). The first one tests the simplest task for which quantum mechanics provides an advantage with respect to classical physics. The quantum advantage is certified by the violation of Wright's inequality, the simplest classical inequality violated by quantum mechanics. In the second… (More)

- Elias Amselem, Lars Eirik Danielsen, Antonio J López-Tarrida, José R Portillo, Mohamed Bourennane, Adán Cabello
- Physical review letters
- 2012

Quantum correlations are contextual yet, in general, nothing prevents the existence of even more contextual correlations. We identify and test a noncontextuality inequality in which the quantum violation cannot be improved by any hypothetical postquantum theory, and use it to experimentally obtain correlations in which the fraction of noncontextual… (More)

- Armin Tavakoli, Adán Cabello, Marek Żukowski, Mohamed Bourennane
- Scientific reports
- 2015

Clock synchronization for nonfaulty processes in multiprocess networks is indispensable for a variety of technologies. A reliable system must be able to resynchronize the nonfaulty processes upon some components failing causing the distribution of incorrect or conflicting information in the network. The task of synchronizing such networks is related to… (More)

Secret sharing is a cryptographic primitive which plays a central role in various secure multiparty computation tasks and management of keys in cryptography. In secret sharing protocols, a message is divided into shares given to recipient parties in such a way that some number of parties need to collaborate in order to reconstruct the message. Quantum… (More)

- Mohamed Nawareg, Sadiq Muhammad, Elias Amselem, Mohamed Bourennane
- Scientific reports
- 2015

Entanglement is one of the most puzzling features of quantum theory and of great importance for the new field of quantum information. The determination whether a given state is entangled or not is one of the most challenging open problems of the field. Here we report on the experimental demonstration of measurement-device-independent (MDI) entanglement… (More)

- Armin Tavakoli, Isabelle Herbauts, Marek Zukowski, Mohamed Bourennane
- 2015

We give an example of a wide class of problems for which quantum information protocols based on multi-system entanglement can be mapped into much simpler ones involving one system. Secret sharing is a cryptographic primitive which plays a central role in various secure multiparty computation tasks and management of keys in cryptography. In secret sharing… (More)