We formulate a general method to find bounds on the statistics of states passing through an unknown channel from the statistics of another set of states. We pay special attention to the application of this method to decoy-state quantum key distribution (QKD) where the states that can be practically prepared are not always the most secure states. In contrast to standard decoy-state analysis, we do not assume that our states are phase-randomised and can consider a fairly general laser source. We also develop a method to accommodate phase correlations with minimal characterisation of the source. Thus, we develop general techniques to deal with phase imperfections in a large class of QKD protocols. We apply these methods to a simple implementa...
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties...
Quantum key distribution (QKD) allows two users to generate a random secret key, which they can use ...
This thesis studies the limits on the performances of inference tasks with quantum data and quantum...
The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice....
We present the full characterization of phase-randomized or phase-averaged coherent states, a class ...
We develop a method to connect the infinite-dimensional description of optical continuous-variable q...
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately ach...
Quantum Key Distribution (QKD) promises information-theoretic security of secret keys. An important ...
Decoy states have recently been proposed as a useful method for substantially improving the performa...
The aim of this thesis is to understand the fundamental limitations on secret key distillation in va...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The decoy-state method is a standard enhancement to quantum key distribution (QKD) protocols that ha...
We show the unconditional security of decoy-state method with whatever intensity error pattern if th...
The asymptotic key generation (AKG) rates of quantum key distribution (QKD) with the decoy method ar...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties...
Quantum key distribution (QKD) allows two users to generate a random secret key, which they can use ...
This thesis studies the limits on the performances of inference tasks with quantum data and quantum...
The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice....
We present the full characterization of phase-randomized or phase-averaged coherent states, a class ...
We develop a method to connect the infinite-dimensional description of optical continuous-variable q...
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately ach...
Quantum Key Distribution (QKD) promises information-theoretic security of secret keys. An important ...
Decoy states have recently been proposed as a useful method for substantially improving the performa...
The aim of this thesis is to understand the fundamental limitations on secret key distillation in va...
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially in...
The decoy-state method is a standard enhancement to quantum key distribution (QKD) protocols that ha...
We show the unconditional security of decoy-state method with whatever intensity error pattern if th...
The asymptotic key generation (AKG) rates of quantum key distribution (QKD) with the decoy method ar...
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure ...
Quantum key-distribution (QKD) is a scheme for establishing shared secret key between remote parties...
Quantum key distribution (QKD) allows two users to generate a random secret key, which they can use ...
This thesis studies the limits on the performances of inference tasks with quantum data and quantum...