The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the generation of a secret shared key between two parties under minimal assumptions on the devices that produce the key. These devices are merely modeled as black boxes and mathematically described as conditional probability distributions. A major obstacle in the analysis of DIQKD protocols is the huge space of possible black box behaviors. De Finetti theorems can help to overcome this problem by reducing the analysis to black boxes that have an iid structure. Here we show two new de Finetti theorems that relate conditional probability distributions in the quantum set to de Finetti distributions (convex combinations of iid distributions), that ar...
When analysing quantum information processing protocols, one has to deal with large entangled system...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the ...
The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the ...
We propose various new techniques in quantum information theory, including a de Finetti style repres...
International audienceProving the unconditional security of quantum key distribution (QKD) is a high...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
International audienceEstablishing the security of continuous-variable quantum key distribution agai...
When analysing quantum information processing protocols, one has to deal with large entangled system...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...
The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the ...
The aim of device-independent quantum key distribution (DIQKD) is to study protocols that allow the ...
We propose various new techniques in quantum information theory, including a de Finetti style repres...
International audienceProving the unconditional security of quantum key distribution (QKD) is a high...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the secu...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate ...
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in t...
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of...
Quantum cryptography promises levels of security that are impossible to attain in a classical world....
International audienceEstablishing the security of continuous-variable quantum key distribution agai...
When analysing quantum information processing protocols, one has to deal with large entangled system...
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure k...
We discuss quantum key distribution protocols and their security analysis, considering a receiver-de...