Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
The security of practical quantum key distribution
- V. Scarani, H. Bechmann-Pasquinucci, N. Cerf, M. Dušek, N. Lutkenhaus, M. Peev
- 28 February 2008
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between…
Nicolas Brunner, 2 Daniel Cavalcanti, 4 Stefano Pironio, Valerio Scarani, 6 and Stephanie Wehner 7 Département de Physique Théorique, Université de Genève, 1211 Genève, Switzerland H.H. Wills Physics…
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
- V. Scarani, A. Acín, G. Ribordy, N. Gisin
- Computer Science, PhysicsPhysical review letters
- 20 November 2002
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.
Information causality as a physical principle
- M. Pawłowski, T. Paterek, D. Kaszlikowski, V. Scarani, A. Winter, M. Żukowski
- Physics, EconomicsNature
- 14 May 2009
It is suggested that information causality—a generalization of the no-signalling condition—might be one of the foundational properties of nature and help to distinguish physical theories from non-physical ones.
Device-independent security of quantum cryptography against collective attacks.
- A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, V. Scarani
- Physics, MedicinePhysical review letters
- 15 February 2007
The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows…
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol.
Security proof for quantum key distribution using qudit systems
We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use d-dimensional quantum systems. In the asymptotic regime, both the secret key rate…
One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering
We analyze the security and feasibility of a protocol for quantum key distribution (QKD) in a context where only one of the two parties trusts his measurement apparatus. This scenario lies naturally…
Reference-frame-independent quantum key distribution
We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A…