We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove a...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Abstract. Device-independent cryptography represent the strongest form of physical security: it is b...
Device independent quantum key distribution (QKD) aims to provide a higher degree of security than t...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
We investigate a class of partially device-independent quantum key distribution protocols based on a...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove a...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Abstract. Device-independent cryptography represent the strongest form of physical security: it is b...
Device independent quantum key distribution (QKD) aims to provide a higher degree of security than t...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
We investigate a class of partially device-independent quantum key distribution protocols based on a...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove a...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...