International audienceCovert and secret quantum key distribution aims at generating information-theoretically secret bits between distant legitimate parties in a manner that remains provably undetectable by an adversary. We propose a framework in which to precisely define and analyze such an operation, and we show that covert and secret key expansion is possible. For fixed and known classical-quantum wiretap channels, we develop and analyze protocols based on forward and reverse reconciliation. The crux of our approach is the use of information reconciliation and privacy amplification techniques that are able to process the sparse signals required for covert operation and the Shannon entropy of which scales as the square root of their lengt...
The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamenta...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
International audienceCovert and secret quantum key distribution aims at generating information-theo...
We study the practical effectiveness of privacy amplification for classical key distribution schemes...
Quantum key distribution performs the trick of growing a secret key in two distant places connected ...
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the gr...
A secret key shared through quantum key distribution between two cooperative players is secure again...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Wilmink R. Quantum broadcast channels and cryptographic applications for separable states. Bielefeld...
We introduce insider-proof private channels which are private channels that additionally allow for s...
Collins and Popescu realized a powerful analogy between several resources in classical and quantum i...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamenta...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
International audienceCovert and secret quantum key distribution aims at generating information-theo...
We study the practical effectiveness of privacy amplification for classical key distribution schemes...
Quantum key distribution performs the trick of growing a secret key in two distant places connected ...
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the gr...
A secret key shared through quantum key distribution between two cooperative players is secure again...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
We identify those properties of a quantum channel that are relevant for cryptography. We focus on ge...
Wilmink R. Quantum broadcast channels and cryptographic applications for separable states. Bielefeld...
We introduce insider-proof private channels which are private channels that additionally allow for s...
Collins and Popescu realized a powerful analogy between several resources in classical and quantum i...
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is b...
UnrestrictedIn this thesis, we mainly investigate four different topics: efficiently implementable c...
The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamenta...
The problem of security of quantum key protocols is examined. In addition to the distribution of cla...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...