Abstract. Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and requires that the events gener-ating the raw key are causally disconnected. We then apply the proof to the chained Bell inequalities and compute the corresponding secret-key rates.
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
Quantum cryptography promises levels of security that are impossible to replicate in a classical wor...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of se...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
Quantum cryptography promises levels of security that are impossible to replicate in a classical wor...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of se...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...