We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
The research presented in this thesis focused on the problem of entanglement distribution. Simply pu...
International audienceThe laws of quantum physics allow the design of cryptographic protocols for wh...
We analyze the security of quantum cryptography schemes for d-level systems using 2 or d+1 maximally...
Entanglement distillation is an essential building block in quantum communication protocols. Here, w...
We construct interesting entanglement distillation protocols by interpolating between the recurrence...
This thesis deals with n-to-1 entanglement distillation protocols for bipartite quantum systems in a...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
We show the equivalence of two approaches to the design of entanglement distillation protocols. The ...
Abstract We look into multipartite quantum states on which quantum cryptographic protocols including...
We provide a new class of entanglement witnesses for d ⊗ d systems (two qudits). Our construction ge...
We present different algorithms for mixed-state multicopy entanglement distillation for pairs of qub...
We propose families of protocols for magic-state distillation—important components of fault-toleranc...
Quantum entanglement is a physical resource that is essential for many quantum information processin...
The relation between Bell inequalities with two two-outcome measurements per site and distillability...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
The research presented in this thesis focused on the problem of entanglement distribution. Simply pu...
International audienceThe laws of quantum physics allow the design of cryptographic protocols for wh...
We analyze the security of quantum cryptography schemes for d-level systems using 2 or d+1 maximally...
Entanglement distillation is an essential building block in quantum communication protocols. Here, w...
We construct interesting entanglement distillation protocols by interpolating between the recurrence...
This thesis deals with n-to-1 entanglement distillation protocols for bipartite quantum systems in a...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
We show the equivalence of two approaches to the design of entanglement distillation protocols. The ...
Abstract We look into multipartite quantum states on which quantum cryptographic protocols including...
We provide a new class of entanglement witnesses for d ⊗ d systems (two qudits). Our construction ge...
We present different algorithms for mixed-state multicopy entanglement distillation for pairs of qub...
We propose families of protocols for magic-state distillation—important components of fault-toleranc...
Quantum entanglement is a physical resource that is essential for many quantum information processin...
The relation between Bell inequalities with two two-outcome measurements per site and distillability...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
The research presented in this thesis focused on the problem of entanglement distribution. Simply pu...
International audienceThe laws of quantum physics allow the design of cryptographic protocols for wh...