We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all the d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob send...
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographicall...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
We analyze the security of quantum cryptography schemes for d-level systems using 2 or d+1 maximally...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
The topic of this thesis is Quantum Cryptography. Based on the laws of Quantum Mechanics, this allow...
We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quan...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
In this article I present a protocol for quantum cryptography which is secure against individual att...
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD expe...
This project investigates the problem of quantum key distribution (i.e. the process by which two dis...
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob send...
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographicall...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
We analyze the security of quantum cryptography schemes for d-level systems using 2 or d+1 maximally...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
The topic of this thesis is Quantum Cryptography. Based on the laws of Quantum Mechanics, this allow...
We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quan...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
In this article I present a protocol for quantum cryptography which is secure against individual att...
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD expe...
This project investigates the problem of quantum key distribution (i.e. the process by which two dis...
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob send...
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographicall...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...