Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a Bell's inequality between two parties, Alice and Bob, who are connected by a quantum channel. However, in reality, quantum channels are lossy and current DIQKD protocols are thus vulnerable to attacks exploiting the detection loophole of the Bell test. Here, we propose a novel approach to DIQKD that overcomes this limitation. In particular, we propose a protocol where the Bell test is performed entirely on two casually independent devices situated in Alice's laboratory. As a result, the detection loophole caused by the losses in the channel is avoided
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a ...
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploi...
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploi...
Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ...
We analyze the security and feasibility of a protocol for quantum key distribution (QKD) in a contex...
We derive a device-independent quantum key distribution protocol based on synchronous correlations a...
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to b...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
International audienceWe present protocols for quantum key distribution in a prepare-and-measure set...
5 + 10 pages, 2 figuresDevice-independent quantum key distribution (DIQKD) allows two users to set u...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a ...
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploi...
In device-independent quantum key distribution (DIQKD), the violation of a Bell inequality is exploi...
Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ...
We analyze the security and feasibility of a protocol for quantum key distribution (QKD) in a contex...
We derive a device-independent quantum key distribution protocol based on synchronous correlations a...
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to b...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
International audienceWe present protocols for quantum key distribution in a prepare-and-measure set...
5 + 10 pages, 2 figuresDevice-independent quantum key distribution (DIQKD) allows two users to set u...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...