According to the entropy accumulation theorem, proving the unconditional security of a device-independent quantum key distribution protocol reduces to deriving tradeoff functions, i.e. bounds on the single-round von Neumann entropy of the raw key as a function of Bell linear functionals, conditioned on an eavesdropper's quantum side information. In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting, where the analysis can be reduced to qubit systems, by combining entropy bounds for variants of the well-known BB84 protocol with quantum constraints on qubit operators on the bipartite system shared by Alice and Bob. The approach gives analytic bounds on the entropy, or semi-analytic ones in r...
We introduce a quantum cloning bound which we apply to a straightforward and relatively direct secur...
Abstract. We derive a new entropic quantum uncertainty relation involving min-entropy. The relation ...
© 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against ...
According to the entropy accumulation theorem, proving the unconditional security of a device-indepe...
21 (+6) pages, 4 (+2) figuresThe rates of several device-independent (DI) protocols, including quant...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
The rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
Many researchers have contributed to creating Quantum Key Distribution (QKD) since the first protoco...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
Device-independent cryptography goes beyond conventional quantum cryptography by providing security ...
Quantum key distribution (QKD) could be the most significant application of quantum information theo...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
We introduce a quantum cloning bound which we apply to a straightforward and relatively direct secur...
Abstract. We derive a new entropic quantum uncertainty relation involving min-entropy. The relation ...
© 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against ...
According to the entropy accumulation theorem, proving the unconditional security of a device-indepe...
21 (+6) pages, 4 (+2) figuresThe rates of several device-independent (DI) protocols, including quant...
International audienceIn this work we present a security analysis for quantum key distribution, esta...
Dîevice-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quan...
In this work we present a security analysis for quantum key distribution, establishing a rigorous tr...
The rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy...
Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quant...
Many researchers have contributed to creating Quantum Key Distribution (QKD) since the first protoco...
We present a new technique for proving the security of quantum key distribution (QKD) protocols. It ...
Device-independent cryptography goes beyond conventional quantum cryptography by providing security ...
Quantum key distribution (QKD) could be the most significant application of quantum information theo...
Device-independent security is the gold standard for quantum cryptography: not only is security base...
We introduce a quantum cloning bound which we apply to a straightforward and relatively direct secur...
Abstract. We derive a new entropic quantum uncertainty relation involving min-entropy. The relation ...
© 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against ...