Quantum information theory is a modern branch of theoretical physics. One of its main goals is to interpret concepts of quantum physics. This leads to a deeper understanding of quantum theory. The most common examples of practical applications of basic quantum theory are quantum computation and quantum cryptography. Quantum cryptography provides secure communication between legitimate users even in the presence of an adversary by making possible the distribution of a secret key. It then allows error correction and privacy amplification, which is elimination of adversary information, through classical communication. In this thesis two important aspects of quantum key distribution are covered, namely robustness bounds with respect to provable...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Physics, 2018.Cataloged from PD...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
In this work our aim has been to elucidate our theoretical developments that bolster the efficiency ...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analy...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key g...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. H...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
In the age of information explosion, there is huge amount of information generated every second. So...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Physics, 2018.Cataloged from PD...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
In this work our aim has been to elucidate our theoretical developments that bolster the efficiency ...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analy...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key g...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. H...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
In the age of information explosion, there is huge amount of information generated every second. So...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Physics, 2018.Cataloged from PD...
Quantum cryptography exploits principles of quantum physics for the secure processing of information...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...