Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Device-independent quantum cryptography

A quantum cryptographic protocol is device-independent if its security does not rely on trusting that the quantum devices used are truthful.Thus the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Cryptography is essential for secure communication in the digital era. Today, publickey cryptography is widely employed, and has… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 3.1
  • figure 3.2
Is this relevant?
2017
2017
We study the impact of finite-size effects on the key rate of continuous-variable (CV) measurement-device-independent (MDI… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2017
2017
The semi-device-independent approach provides a framework for prepare-and-measure quantum protocols using devices whose behavior… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Measurement-Device-Independent Quantum Cryptography Zhiyuan Tang Doctor of Philosophy Graduate Department of Physics University… Expand
  • figure 1.1
  • table 1.1
  • figure 1.2
  • figure 2.1
  • figure 2.2
Is this relevant?
2016
2016
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2015
Review
2015
In theory, quantum key distribution (QKD) provides information-theoretic security based on the laws of physics. Owing to the… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
2015
2015
By closing two loopholes at once, three experimental tests of Bell’s inequalities remove the last doubts that we should renounce… Expand
  • figure 1
Is this relevant?
2014
2014
We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the… Expand
  • figure 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Can a classical experimentalist command an untrusted quantum system to realize arbitrary quantum dynamics, aborting if it… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
Can a classical system command a general adversarial quantum system to realize arbitrary quantum dynamics? If so, then we could… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?