States with private correlations but little or no distillable entanglement were recently reported. Here, we consider the secure distribution of such states, i.e., the situation when an adversary gives two parties such states and they have to verify privacy. We present a protocol which enables the parties to extract from such untrusted states an arbitrarily long and secure key, even though the amount of distillable entanglement of the untrusted states can be arbitrarily small
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secur...
States with private correlations but little or no distillable entanglement were recently reported. H...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric...
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pb...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitr...
To communicate information securely, the sender and recipient of the information need to have a shar...
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret strin...
We study achievable secret key rates for the Bennett-Brassard-84 (BB84) quantum key distribution pro...
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret strin...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secur...
States with private correlations but little or no distillable entanglement were recently reported. H...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric...
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pb...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitr...
To communicate information securely, the sender and recipient of the information need to have a shar...
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret strin...
We study achievable secret key rates for the Bennett-Brassard-84 (BB84) quantum key distribution pro...
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret strin...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...