The phenomenal progress in quantum technologies over the past decades has laid the groundwork for the construction of quantum networks, which will channel the power of quantum theory to guarantee secure and efficient communication, computation, and much more. This thesis studies the notion of trust in quantum networks. In our information age, protecting the security or anonymity of data is a key requirement. We investigate certain protocols that are fundamental to the operation and applications of quantum networks, and propose ways to test and analyse their security, in spite of adversarial intervention. Our focus is on practical methods of verifying the untrusted components, which could be incorporated into realistic networks in the near f...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...
Quantum networks hold the promise of enabling secure and trustworthy communication and computation. ...
5 pages, added appendixFuture quantum information networks will likely consist of quantum and classi...
International audienceQuantum communication networks have the potential to revolutionize information...
In this paper, we consider the problem of entanglement verification across the quantum memories of a...
Quantum networks allow multiple devices to exchange information encoded within quantum systems.Such ...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Entangled quantum states are remarkably rich resources for communication and computation. Today, we ...
Based on extensions to the protocols PPP and IPSEC, we present a working proposal for building a net...
Based on extensions to the protocols PPP and IPSEC, we present a working proposal for building a net...
Secure communication is one of the key applications of quantum networks. In recent years, following ...
We introduce a protocol for authenticated teleportation, which can be proven secure even when the re...
In this work, we invoke several stochastic models to investigate the behavior of quantum networks. M...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...
Quantum networks hold the promise of enabling secure and trustworthy communication and computation. ...
5 pages, added appendixFuture quantum information networks will likely consist of quantum and classi...
International audienceQuantum communication networks have the potential to revolutionize information...
In this paper, we consider the problem of entanglement verification across the quantum memories of a...
Quantum networks allow multiple devices to exchange information encoded within quantum systems.Such ...
Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing...
Entangled quantum states are remarkably rich resources for communication and computation. Today, we ...
Based on extensions to the protocols PPP and IPSEC, we present a working proposal for building a net...
Based on extensions to the protocols PPP and IPSEC, we present a working proposal for building a net...
Secure communication is one of the key applications of quantum networks. In recent years, following ...
We introduce a protocol for authenticated teleportation, which can be proven secure even when the re...
In this work, we invoke several stochastic models to investigate the behavior of quantum networks. M...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement ...
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribu...