We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analysing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol. Recent results by...
A central goal in information theory and cryptography is finding simple characterizations of optimal...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key...
We investigate a general class of quantum key distribution (QKD) protocols using one-way classical c...
We investigate a general class of quantum key distribution (QKD) protocols using one-way classical c...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
We consider the distribution of secret keys, both in a bipartite and a multipartite (conference) set...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
A central goal in information theory and cryptography is finding simple characterizations of optimal...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...
We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key...
We investigate a general class of quantum key distribution (QKD) protocols using one-way classical c...
We investigate a general class of quantum key distribution (QKD) protocols using one-way classical c...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considera...
We consider the distribution of secret keys, both in a bipartite and a multipartite (conference) set...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
A central goal in information theory and cryptography is finding simple characterizations of optimal...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Here we present two new schemes for quantum key distribution (QKD) which neither require entanglemen...