This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, proposed recently as a simple and fast experimental scheme. In the zero-error regime, the eavesdropper Eve can only take advantage of the losses in the transmission. We consider new attacks, based on unambiguous state discrimination, which perform better than the basic beam-splitting attack, but which can be detected by a careful analysis of the detection statistics. These results stress the importance of testing several statistical parameters in order to achieve higher rates of secret bits
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
The laws of quantum physics can be used to secure communications between two distant parties in a sc...
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key ...
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, pro...
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, pro...
The use of entanglement by quantum-cryptographic protocol to transfer the data was discussed. The de...
The use of entanglement by quantum-cryptographic protocol to transfer the data was discussed. The de...
The use of entanglement by quantum-cryptographic protocol to transfer the data was discussed. The de...
Symmetric coherent states are of interest in quantum cryptography, since for such states there is an...
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
This thesis deals with a detailed study of the unconditional security of Continuous-Variable (CV) Q...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright l...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
The laws of quantum physics can be used to secure communications between two distant parties in a sc...
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key ...
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, pro...
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, pro...
The use of entanglement by quantum-cryptographic protocol to transfer the data was discussed. The de...
The use of entanglement by quantum-cryptographic protocol to transfer the data was discussed. The de...
The use of entanglement by quantum-cryptographic protocol to transfer the data was discussed. The de...
Symmetric coherent states are of interest in quantum cryptography, since for such states there is an...
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
This thesis deals with a detailed study of the unconditional security of Continuous-Variable (CV) Q...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright l...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
The laws of quantum physics can be used to secure communications between two distant parties in a sc...
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key ...