• Publications
  • Influence
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between
Bell nonlocality
Nicolas Brunner, 2 Daniel Cavalcanti, 4 Stefano Pironio, Valerio Scarani, 6 and Stephanie Wehner 7 Département de Physique Théorique, Université de Genève, 1211 Genève, Switzerland H.H. Wills Physics
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
TLDR
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.
Information causality as a physical principle
TLDR
It is suggested that information causality—a generalization of the no-signalling condition—might be one of the foundational properties of nature and help to distinguish physical theories from non-physical ones.
Device-independent security of quantum cryptography against collective attacks.
TLDR
The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
TLDR
A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol.
Security proof for quantum key distribution using qudit systems
We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate
One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering
We analyze the security and feasibility of a protocol for quantum key distribution (QKD) in a context where only one of the two parties trusts his measurement apparatus. This scenario lies naturally
Reference-frame-independent quantum key distribution
We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A
...
1
2
3
4
5
...