Author pages are created from data sourced from our academic publisher partnerships and public sources.
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2… Expand
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original… Expand
Combined effects of polarization mode dispersion and polarization dependent losses in optical fibers
Abstract A general description of the effects of combined polarization mode dispersion (PMD) and polarization dependent losses (PDL) in single-mode optical fiber networks is presented. It generalizes… Expand
Polarization-induced distortions in optical fiber networks with polarization-mode dispersion and polarization-dependent losses
We review the formalism required to investigate the combined effects of polarization-mode dispersion (PMD) and polarization dependent losses (PDL) in optical fiber networks. The combination of PMD… Expand
A relevant two qubit Bell inequality inequivalent to the CHSH inequality
We computationally investigate the complete polytope of Bell inequalities for two particles with small numbers of possible measurements and outcomes. Our approach is limited by Pitowsky's connection… Expand
Information-theoretic security proof for quantum-key-distribution protocols (17 pages)
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement… Expand
Device-independent security of quantum cryptography against collective attacks.
- A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, V. Scarani
- Physics, Medicine
- Physical review letters
- 15 February 2007
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution… Expand
Single photon detector fabricated in a complementary metal-oxide-semiconductor high-voltage technology
In this article, a fully integrated single photon detector including a silicon avalanche photodiode and a quenching circuit is presented. The low doping concentrations, inherent to the complementary… Expand
Security of quantum key distribution using d-level systems.
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases… Expand