Results 31 to 40 of about 4,651 (153)

Device-independent randomness generation with sublinear shared quantum resources [PDF]

open access: yesQuantum, 2018
In quantum cryptography, device-independent (DI) protocols can be certified secure without requiring assumptions about the inner workings of the devices used to perform the protocol.
Cédric Bamps   +2 more
doaj   +1 more source

Quantum Information with Continuous Variables [PDF]

open access: yes, 2004
Preface. About the Editors. Part I: Quantum Computing. 1. Quantum computing with qubits S.L. Braunstein, A.K. Pati. 2. Quantum computation over continuous variables S. Lloyd, S.L. Braunstein. 3.
S. Braunstein, P. Loock
semanticscholar   +1 more source

Device-independent quantum key distribution secure against collective attacks [PDF]

open access: yes, 2009
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual ...
Stefano Pironio   +5 more
semanticscholar   +1 more source

Bounding the set of quantum correlations. [PDF]

open access: yesPhysical Review Letters, 2006
We introduce a hierarchy of conditions necessarily satisfied by any distribution P_{alphabeta} representing the probabilities for two separate observers to obtain outcomes alpha and beta when making local measurements on a shared quantum state.
M. Navascués, Stefano Pironio, A. Acín
semanticscholar   +1 more source

Nonlocal correlations as an information-theoretic resource [PDF]

open access: yes, 2004
It is well known that measurements performed on spatially separated entangled quantum systems can give rise to correlations that are nonlocal, in the sense that a Bell inequality is violated. They cannot, however, be used for superluminal signaling.
J. Barrett   +5 more
semanticscholar   +1 more source

Secure device-independent quantum key distribution with causally independent measurement devices. [PDF]

open access: yesNature Communications, 2010
Device-independent quantum key distribution (QKD) aims to provide key distribution schemes, the security of which is based on the laws of quantum physics, but which does not require any assumptions about the internal working of the devices used in the ...
L. Masanes, Stefano Pironio, A. Acín
semanticscholar   +1 more source

Certified randomness in quantum physics [PDF]

open access: yes, 2016
The concept of randomness plays an important role in many disciplines. On one hand, the question of whether random processes exist is fundamental for our understanding of nature.
Acín, Antonio, Masanes, Lluis
core   +2 more sources

Gadget structures in proofs of the Kochen-Specker theorem [PDF]

open access: yesQuantum, 2020
The Kochen-Specker theorem is a fundamental result in quantum foundations that has spawned massive interest since its inception. We show that within every Kochen-Specker graph, there exist interesting subgraphs which we term $01$-gadgets, that capture ...
Ravishankar Ramanathan   +5 more
doaj   +1 more source

Necessary detection efficiencies for secure quantum key distribution and bound randomness [PDF]

open access: yes, 2016
In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies.
Acín, Antonio   +4 more
core   +2 more sources

Randomness versus nonlocality and entanglement. [PDF]

open access: yesPhysical Review Letters, 2011
The outcomes obtained in Bell tests involving two-outcome measurements on two subsystems can, in principle, generate up to 2 bits of randomness. However, the maximal violation of the Clauser-Horne-Shimony-Holt inequality guarantees the generation of only
A. Acín, S. Massar, Stefano Pironio
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy