We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems. Our main result is that, in order to prove that a certain property holds for an arbitrary input, it is sufficient to consider the case where the input is a particular de Finetti-type state, i.e., a state which consists of n identical and independent copies of an (unknown) state on a single subsystem. Our technique can be applied to the analysis of information-theoretic problems. For example, in quantum cryptography, we get a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protoc...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
We propose a general method for studying properties of quantum channels acting on an n-partite syste...
When analysing quantum information processing protocols, one has to deal with large entangled system...
We propose various new techniques in quantum information theory, including a de Finetti style repres...
Quantum de Finetti theorems are a useful tool in the study of correlations in quantum multipartite s...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
We extend the security analysis of continuous variable quantum-key-distribution protocols using a fa...
This paper presents a series of results on the interplay between quantum estimation, cloning and fin...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most...
The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the ...
International audienceWe give the first composable security proof for continuous-variable quantum ke...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
We propose a general method for studying properties of quantum channels acting on an n-partite syste...
When analysing quantum information processing protocols, one has to deal with large entangled system...
We propose various new techniques in quantum information theory, including a de Finetti style repres...
Quantum de Finetti theorems are a useful tool in the study of correlations in quantum multipartite s...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
We extend the security analysis of continuous variable quantum-key-distribution protocols using a fa...
This paper presents a series of results on the interplay between quantum estimation, cloning and fin...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most...
The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the ...
International audienceWe give the first composable security proof for continuous-variable quantum ke...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2008.In title on title...
We present new physical bounds on quantum information, and use them to prove the security of quantum...