In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must co...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Device-independent security is the gold standard for quantum cryptography: not only is security base...
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
Abstract. Device-independent cryptography represent the strongest form of physical security: it is b...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
Device independent quantum key distribution (QKD) aims to provide a higher degree of security than t...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Device-independent security is the gold standard for quantum cryptography: not only is security base...
International audienceCryptographic key exchange protocols traditionally rely on computational conje...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
Abstract. Device-independent cryptography represent the strongest form of physical security: it is b...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
Device independent quantum key distribution (QKD) aims to provide a higher degree of security than t...
We present the optimal collective attack on a quantum key distribution protocol in the "device-indep...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
Device-independent security is the gold standard for quantum cryptography: not only is security base...
International audienceCryptographic key exchange protocols traditionally rely on computational conje...