We analyze the security of quantum cryptography schemes for d-level systems using 2 or d+1 maximally conjugated bases, under individual eavesdropping attacks based on cloning machines and measurement after the basis reconciliation. We consider classical advantage distillation protocols, that allow to extract a key even in situations where the mutual information between the honest parties is smaller than the eavesdropper's information. In this scenario, advantage distillation protocols are shown to be as powerful as quantum distillation: key distillation is possible using classical techniques if and only if the corresponding state in the entanglement based protocol is distillabl
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key ...
We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $...
The application of quantum cryptographic methods to existing communications infrastructures can be e...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
This project investigates the problem of quantum key distribution (i.e. the process by which two dis...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key g...
Low noise tolerances for current device-independent quantum key distribution protocols and the exist...
[eng] Quantum cryptography is one of the most important quantum information applications. The presen...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
Quantum cryptography is one of the most important quantum information applications. The present thes...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
Abstract We look into multipartite quantum states on which quantum cryptographic protocols including...
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key ...
We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $...
The application of quantum cryptographic methods to existing communications infrastructures can be e...
We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In pa...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
This project investigates the problem of quantum key distribution (i.e. the process by which two dis...
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e. quantum ...
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key g...
Low noise tolerances for current device-independent quantum key distribution protocols and the exist...
[eng] Quantum cryptography is one of the most important quantum information applications. The presen...
We develop a formalism of distilling classical key from quantum state in a systematic way, expanding...
Quantum cryptography is one of the most important quantum information applications. The present thes...
Quantum information theory is a modern branch of theoretical physics. One of its main goals is to in...
Abstract We look into multipartite quantum states on which quantum cryptographic protocols including...
Provable entanglement has been shown to be a necessary precondition for unconditionally secure key ...
We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $...
The application of quantum cryptographic methods to existing communications infrastructures can be e...