Summoning is a task between two parties, Alice and Bob, with distributed networks of agents in space-time. Bob gives Alice a random quantum state, known to him but not her, at some point. She is required to return the state at some later point, belonging to a subset defined by communications received from Bob at other points. Many results about summoning, including the impossibility of unrestricted summoning tasks and the necessary conditions for specific types of summoning tasks to be possible, follow directly from the quantum no-cloning theorem and the relativistic no-superluminal-signalling principle. The impossibility of cloning devices can be derived from the impossibility of superluminal signalling and the projection postulate, togeth...
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on...
This PhD thesis contains a general introduction and three main chapters. Chapter 2 investigates Bell...
We investigate the class of quantum cloning machines that equally duplicate all real states in a Hil...
The properties of quantum information in space-time can be investigated by studying operational task...
The relativistic quantum protocols realizing the bit commitment and distant coin tossing schemes are...
Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a secret bit...
Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit t...
Summoning retrieves quantum information, prepared somewhere in spacetime, at another specified point...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
This note presents a quantum protocol for bit commitment based on nonorthogonal states coding and Bo...
Quantum mechanics, which describes the behaviour of matter and energy on very small scales, is one o...
We investigate two-party cryptographic protocols that are secure under assumptions motivated by phys...
No-cloning theorem is fundamental for quantum mechanics and for quantum information science that sta...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on...
This PhD thesis contains a general introduction and three main chapters. Chapter 2 investigates Bell...
We investigate the class of quantum cloning machines that equally duplicate all real states in a Hil...
The properties of quantum information in space-time can be investigated by studying operational task...
The relativistic quantum protocols realizing the bit commitment and distant coin tossing schemes are...
Bit commitment is a fundamental cryptographic primitive in which Alice wishes to commit a secret bit...
Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit t...
Summoning retrieves quantum information, prepared somewhere in spacetime, at another specified point...
There had been well-known claims of unconditionally secure quantum protocols for bit commitment. How...
This note presents a quantum protocol for bit commitment based on nonorthogonal states coding and Bo...
Quantum mechanics, which describes the behaviour of matter and energy on very small scales, is one o...
We investigate two-party cryptographic protocols that are secure under assumptions motivated by phys...
No-cloning theorem is fundamental for quantum mechanics and for quantum information science that sta...
While unconditionally secure bit commitment (BC) is considered impossible within the quant...
The ``impossibility proof'' on unconditionally secure quantum bit commitment is critically analyzed....
Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on...
This PhD thesis contains a general introduction and three main chapters. Chapter 2 investigates Bell...
We investigate the class of quantum cloning machines that equally duplicate all real states in a Hil...