Search results for: quantum key distribution - Bridge of Knowledge

Search

Search results for: quantum key distribution

Search results for: quantum key distribution

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publication
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Unifying classical and quantum key distillation

    Publication
    • M. Christandl
    • A. Ekert
    • M. Horodecki
    • P. Horodecki
    • J. Oppenheim
    • R. Renner

    - Year 2007

    Przypuśćmy, że dwie oddalone od siebie osoby, Alicja i Bob, oraz osoba z nimi niewspółpracująca, Ewa, mają dostęp do systemów kwantowych przygotowanych w stanie rho_ABE. Ponadto Alicja i Bob mogą używać lokalnych operacji i uwiarygodnionej komunikacji publicznej. Celem Alicji i Boba jest ustanowienie klucza, który nie będzie znany Ewie. Nasze badania inicjują podejście do wspomnianego zagadnienia oparte na unifikacji dwóch standardowych...

  • General paradigm for distilling classical key from quantum states

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Full text to download in external service

  • On the distillation of cryptographic key from multipartie entangled quantum states

    Publication

    - Year 2008

    Celem pracy było uzupełnienie ogólnego paradygmatu destylacji bezpiecznego klucza kryptograficznego z dwucząstkowych stanów splątanych, a w szczegolności znalezienie nowych konstrukcji stanów kwantowych o splątaniu związanym z niezerowym destylowanym kluczem kryptograficznym. Kolejnym celem pracy było uogólnienie powyższego paradygmatu dwucząstkowego na przypadek wielu cząstek. W szczególności sformułowanie definicji wielocząstkowych...

  • Applications of semi-definite optimization in quantum information protocols

    Publication

    - Year 2016

    This work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...

  • Progress towards a unified approach to entanglement distribution

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Entanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...

    Full text available to download

  • Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing

    Publication
    • P. A. Mironowicz
    • A. Tavakoli
    • A. Hameedi
    • B. Marques
    • M. Pawłowski
    • M. Bourennane

    - NEW JOURNAL OF PHYSICS - Year 2016

    Quantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...

    Full text available to download

  • Elemental and tight monogamy relations in nonsignaling theories

    Publication

    - PHYSICAL REVIEW A - Year 2014

    Physical principles constrain the way nonlocal correlations can be distributed among distant parties. These constraints are usually expressed by monogamy relations that bound the amount of Bell inequality violation observed among a set of parties by the violation observed by a different set of parties. We prove here that much stronger monogamy relations are possible for nonsignaling correlations by showing how nonlocal correlations...

    Full text available to download

  • Quantum privacy witness

    Publication

    - PHYSICAL REVIEW A - Year 2012

    While it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...

    Full text available to download

  • Efficient bounds on quantum-communication rates via their reduced variants

    Publication

    - PHYSICAL REVIEW A - Year 2010

    We investigate one-way communication scenarios where Bob operating on his component can transfer some subsystem to the environment. We define reduced versions of quantum-communication rates and, further, prove upper bounds on a one-way quantum secret key, distillable entanglement, and quantum-channel capacity by means of their reduced versions. It is shown that in some cases they drastically improve their estimation.

    Full text available to download

  • The symmetric extendibility of quantum states

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...

    Full text to download in external service

  • Multipartite secret key distillation and bound entanglement

    Publication

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...

    Full text available to download

  • Quantum randomness protected against detection loophole attacks

    Publication
    • P. A. Mironowicz
    • G. Cañas
    • J. Cariñe
    • E. S. Gómez
    • J. F. Barra
    • A. Cabello
    • G. B. Xavier
    • G. Lima
    • M. Pawłowski

    - Quantum Information Processing - Year 2021

    Device and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....

    Full text to download in external service

  • No-local-broadcasting theorem for multipartite quantum correlations

    Publication

    We prove that the correlations present in a multipartite quantum state have an operational quantum character even if the state is unentangled, as long as it does not simply encode a multipartite classical probability distribution. Said quantumness is revealed by the new task of local broadcasting, i.e., of locally sharing preestablished correlations, which is feasible if and only if correlations are stricly classical. Our operational...

    Full text to download in external service

  • Analytical studies of spectrum broadcast structures in quantum Brownian motion

    Spectrum broadcast structures are a new and fresh concept in the quantum-to-classical transition, introduced recently in the context of decoherence and the appearance of objective features in quantum mechanics. These are specific quantum state structures, responsible for the objectivization of the decohered state of a system. Recently, they have been demonstrated by means of the well-known quantum Brownian motion model of the recoilless...

    Full text to download in external service

  • Convex set of quantum states with positive partial transpose analysed by hit and run algorithm

    Publication
    • K. Szymański
    • B. Collins
    • T. Szarek
    • K. Życzkowski

    - Journal of Physics A-Mathematical and Theoretical - Year 2017

    The convex set of quantum states of a composite K×K system with positive partial transpose is analysed. A version of the hit and run algorithm is used to generate a sequence of random points covering this set uniformly and an estimation for the convergence speed of the algorithm is derived. For K >3 or K=3 this algorithm works faster than sampling over the entire set of states and verifying whether the partial transpose is positive....

    Full text to download in external service

  • Key Engineering Materials

    Journals

    ISSN: 1662-9795

  • Quantum Coherence as a Resource

    Publication
    • A. Streltsov
    • G. Adesso
    • M. B. Plenio

    - REVIEWS OF MODERN PHYSICS - Year 2017

    The coherent superposition of states, in combination with the quantization of observables, represents one of the most fundamental features that mark the departure of quantum mechanics from the classical realm. Quantum coherence in many-body systems embodies the essence of entanglement and is an essential ingredient for a plethora of physical phenomena in quantum optics, quantum information, solid state physics, and nanoscale thermodynamics....

    Full text available to download

  • Quantum entanglement

    Publication

    - REVIEWS OF MODERN PHYSICS - Year 2009

    All our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...

    Full text to download in external service