We show how the techniques developed for long distance quantum key distribution in op-tical fibers can be used to demonstrate other quantum information processing and com-munication protocols. We present a fiber optics realization of the Deutsch-Jozsa and Bernstein-Vazirani algorithms. We describe a method, called ”error filtration”, for re-ducing errors in quantum communication channels, and present an experimental imple-mentation thereof. We discuss the cryptographic primitive of string flipping, and present an experimental implementation which has higher security than achievable using any classical protocol
Though state-of-the-art quantum computers are currently limited to only a handful of physical qubits...
The main goals of cryptography are the encryption of messages to render them unintelligible to third...
In this thesis, Quantum Key Distribution and quantum communication methods based on high-dimensional...
We briefly present three topics in quantum communication. First of all a method, called error filtra...
Quantum cryptography is an emerging technology in which two parties may simultaneously generated sha...
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} m...
We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein-Vazirani quantum algor...
Quantum key distribution is an application of quantum physics that allows two distant partners to se...
Quantum key distribution enables two distant interlocutors to share a secret key. Laws of quantum ph...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The netw...
Quantum communication protocols invoke one of the most fundamentallaws of quantum mechanics, namely ...
We report on a quantum key distribution effected with a two-way deterministic protocol over a standa...
We demonstrate experimentally the feasibility of a two-state quan-tum bit commitment protocol, which...
Though state-of-the-art quantum computers are currently limited to only a handful of physical qubits...
The main goals of cryptography are the encryption of messages to render them unintelligible to third...
In this thesis, Quantum Key Distribution and quantum communication methods based on high-dimensional...
We briefly present three topics in quantum communication. First of all a method, called error filtra...
Quantum cryptography is an emerging technology in which two parties may simultaneously generated sha...
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} m...
We report on a fiber-optics implementation of the Deutsch-Jozsa and Bernstein-Vazirani quantum algor...
Quantum key distribution is an application of quantum physics that allows two distant partners to se...
Quantum key distribution enables two distant interlocutors to share a secret key. Laws of quantum ph...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security...
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The netw...
Quantum communication protocols invoke one of the most fundamentallaws of quantum mechanics, namely ...
We report on a quantum key distribution effected with a two-way deterministic protocol over a standa...
We demonstrate experimentally the feasibility of a two-state quan-tum bit commitment protocol, which...
Though state-of-the-art quantum computers are currently limited to only a handful of physical qubits...
The main goals of cryptography are the encryption of messages to render them unintelligible to third...
In this thesis, Quantum Key Distribution and quantum communication methods based on high-dimensional...