• Publications
  • Influence
Quantum Cryptography
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2Expand
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
TLDR
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. Expand
Quantum repeaters based on atomic ensembles and linear optics
TLDR
The theoretical and experimental status quo of this very active field of quantum repeater protocols is reviewed, and the potentials of different approaches are compared quantitatively, with a focus on the most immediate goal of outperforming the direct transmission of photons. Expand
Security of quantum key distribution using d-level systems.
TLDR
The information gained by a potential eavesdropper applying a cloning-based individual attack is derived, along with an upper bound on the error rate that ensures unconditional security against coherent attacks. Expand
Combined effects of polarization mode dispersion and polarization dependent losses in optical fibers
Abstract A general description of the effects of combined polarization mode dispersion (PMD) and polarization dependent losses (PDL) in single-mode optical fiber networks is presented. It generalizesExpand
Information-theoretic security proof for quantum-key-distribution protocols (17 pages)
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglementExpand
Device-independent security of quantum cryptography against collective attacks.
TLDR
The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality. Expand
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD followsExpand
Polarization-induced distortions in optical fiber networks with polarization-mode dispersion and polarization-dependent losses
We review the formalism required to investigate the combined effects of polarization-mode dispersion (PMD) and polarization dependent losses (PDL) in optical fiber networks. The combination of PMDExpand
...
1
2
3
4
5
...