21 (+6) pages, 4 (+2) figuresThe rates of several device-independent (DI) protocols, including quantum key-distribution (QKD) and randomness expansion (RE), can be computed via an optimization of the conditional von Neumann entropy over a particular class of quantum states. In this work we introduce a numerical method to compute lower bounds on such rates. We derive a sequence of optimization problems that converge to the conditional von Neumann entropy of systems defined on general separable Hilbert spaces. Using the Navascu\'es-Pironio-Ac\'in hierarchy we can then relax these problems to semidefinite programs, giving a computationally tractable method to compute lower bounds on the rates of DI protocols. Applying our method to compute the...
The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the viola...
Low noise tolerances for current device-independent quantum key distribution protocols and the exist...
We show that the entropy of a message can be tested in a device-independent way. Specifically, we co...
21 (+6) pages, 4 (+2) figuresThe rates of several device-independent (DI) protocols, including quant...
The rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy...
According to the entropy accumulation theorem, proving the unconditional security of a device-indepe...
According to the entropy accumulation theorem, proving the unconditional security of a device-indepe...
The entropy accumulation theorem states that the smooth min-entropy of an n-partite system A = (A_1 ...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
International audienceThe security of finite-length keys is essential for the implementation of devi...
A device-independent randomness expansion (DIRE) protocol aims to take an initial random string and ...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
© 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against ...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the viola...
Low noise tolerances for current device-independent quantum key distribution protocols and the exist...
We show that the entropy of a message can be tested in a device-independent way. Specifically, we co...
21 (+6) pages, 4 (+2) figuresThe rates of several device-independent (DI) protocols, including quant...
The rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy...
According to the entropy accumulation theorem, proving the unconditional security of a device-indepe...
According to the entropy accumulation theorem, proving the unconditional security of a device-indepe...
The entropy accumulation theorem states that the smooth min-entropy of an n-partite system A = (A_1 ...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
International audienceThe security of finite-length keys is essential for the implementation of devi...
A device-independent randomness expansion (DIRE) protocol aims to take an initial random string and ...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
© 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against ...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the viola...
Low noise tolerances for current device-independent quantum key distribution protocols and the exist...
We show that the entropy of a message can be tested in a device-independent way. Specifically, we co...