We give an arguably simpler and more direct proof of a recent result by Miller, Jain and Shi, who proved device-independent security of a protocol for quantum key distribution in which the devices can be used in parallel. Our proof combines existing results on immunization (Kempe et al., SICOMP 2011) and parallel repetition (Bavarian et al., STOC 2017) of entangled games
We consider a game in which two separate laboratories collaborate to prepare a quantum system and ar...
We study the parallel repetition of one-round games involving players that can use quantum entanglem...
We study the parallel repetition of one-round games involving players that can use quantum entanglem...
We give an arguably simpler and more direct proof of a recent result by Miller, Jain and Shi, who pr...
We give an arguably simpler and more direct proof of a recent result by Miller, Jain and Shi, who pr...
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantu...
Abstract. A serious concern with quantum key distribution (QKD) schemes is that, when under attack, ...
htmlabstractA serious concern with quantum key distribution (QKD) schemes is that, when under attack...
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantu...
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2017.Cataloged fro...
htmlabstractWe consider a game in which two separate laboratories collaborate to prepare a quantum s...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
We consider a game in which two separate laboratories collaborate to prepare a quantum system and ar...
We study the parallel repetition of one-round games involving players that can use quantum entanglem...
We study the parallel repetition of one-round games involving players that can use quantum entanglem...
We give an arguably simpler and more direct proof of a recent result by Miller, Jain and Shi, who pr...
We give an arguably simpler and more direct proof of a recent result by Miller, Jain and Shi, who pr...
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantu...
Abstract. A serious concern with quantum key distribution (QKD) schemes is that, when under attack, ...
htmlabstractA serious concern with quantum key distribution (QKD) schemes is that, when under attack...
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantu...
A serious concern with quantum key distribution (QKD) schemes is that, when under attack, the quantu...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Mathematics, 2017.Cataloged fro...
htmlabstractWe consider a game in which two separate laboratories collaborate to prepare a quantum s...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
We consider a game in which two separate laboratories collaborate to prepare a quantum system and ar...
We study the parallel repetition of one-round games involving players that can use quantum entanglem...
We study the parallel repetition of one-round games involving players that can use quantum entanglem...