Intermediate states are known from intercept/resend eavesdropping in the Bennett-Brassard 1984 (BB84) quantum cryptographic protocol. But they also play fundamental roles in the optimal eavesdropping strategy on the BB84 protocol and in the CHSH (Clauser-Horne-Shimony-Holt) inequality. We generalize the intermediate states to an arbitrary dimension and consider intercept/resend eavesdropping, optimal eavesdropping on the generalized BB84 protocol and present a generalized Clauser-Horne-Shimony-Holt inequality for two entangled qudits based on these state
It is known from Bellʼs theorem that quantum predictions for some entangled states cannot be mimicke...
The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the viola...
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shim...
Intermediate states are known from intercept/resend eavesdropping in the Bennett-Brassard 1984 (BB84...
We present a generalized Bell inequality for two entangled quNits. On one quNit the choice is betwee...
Bell inequalities, considered within quantum mechanics, can be regarded as non-optimal witness opera...
International audienceThe Ekert quantum key distribution protocol [1] uses pairs of entangled qubits...
International audienceThe laws of quantum physics allow the design of cryptographic protocols for wh...
We review the status of Bell's inequalities in quantum information, stressing mainly the links with ...
Quantum state targeting is a quantum game which results from combining traditional quantum state est...
Bell inequality violations correspond to behavior of entangled quantum systems that cannot be simula...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
The Ekert quantum key distribution protocol [1] uses pairs of entan-gled qubits and performs checks ...
We consider a family of quantum communication protocols involving N partners. We demonstrate the exi...
It is known from Bellʼs theorem that quantum predictions for some entangled states cannot be mimicke...
The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the viola...
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shim...
Intermediate states are known from intercept/resend eavesdropping in the Bennett-Brassard 1984 (BB84...
We present a generalized Bell inequality for two entangled quNits. On one quNit the choice is betwee...
Bell inequalities, considered within quantum mechanics, can be regarded as non-optimal witness opera...
International audienceThe Ekert quantum key distribution protocol [1] uses pairs of entangled qubits...
International audienceThe laws of quantum physics allow the design of cryptographic protocols for wh...
We review the status of Bell's inequalities in quantum information, stressing mainly the links with ...
Quantum state targeting is a quantum game which results from combining traditional quantum state est...
Bell inequality violations correspond to behavior of entangled quantum systems that cannot be simula...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
The Ekert quantum key distribution protocol [1] uses pairs of entan-gled qubits and performs checks ...
We consider a family of quantum communication protocols involving N partners. We demonstrate the exi...
It is known from Bellʼs theorem that quantum predictions for some entangled states cannot be mimicke...
The security of device-independent (DI) quantum key distribution (QKD) protocols relies on the viola...
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shim...