Assume that three parties, Alice, Bob, and Eve, are presented with a sequence of identical tripartite quantum states. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from random variables and (ii) key distillation from pure tripartite quantum states. We obtain generalisations of fundamental results of scenarios (i) and (ii), including upper bounds given by the intrinsic information, squashed entanglement, and the relative entropy of entanglement. Based on an embedding of classical distributions into quantum states, w...
To communicate information securely, the sender and recipient of the information need to have a shar...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
© 2018 IEEE. In this paper, we consider two extensions of the Gács-Körner common information to thre...
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Al...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
States with private correlations but little or no distillable entanglement were recently reported. H...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
States with private correlations but little or no distillable entanglement were recently reported. H...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
To communicate information securely, the sender and recipient of the information need to have a shar...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantu...
© 2018 IEEE. In this paper, we consider two extensions of the Gács-Körner common information to thre...
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Al...
We provide a general formalism to characterize the cryptographic properties of quantum channels in t...
Secure key distribution among two remote parties is impossible when both are classical, unless some ...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
States with private correlations but little or no distillable entanglement were recently reported. H...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
States with private correlations but little or no distillable entanglement were recently reported. H...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
To communicate information securely, the sender and recipient of the information need to have a shar...
Quantum mechanical effects have enabled the construction of cryptographic primitives that are imposs...
At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment ca...