Device-independent security of quantum cryptography against collective attacks.
about
Genuine Multipartite Einstein-Podolsky-Rosen SteeringLarge Violation of Bell Inequalities with Low EntanglementExperimental demonstration of nonbilocal quantum correlationsFeasible attack on detector-device-independent quantum key distribution.Quantum key distribution with hacking countermeasures and long term field trial.All pure bipartite entangled states can be self-tested.Near-space flight of a correlated photon system.Contextuality supplies the 'magic' for quantum computation.Detection of entanglement in asymmetric quantum networks and multipartite quantum steering.Guaranteed violation of a Bell inequality without aligned reference frames or calibrated devices.Security of quantum key distribution with multiphoton componentsSecurity of Semi-Device-Independent Random Number Expansion Protocols.Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacksW-state Analyzer and Multi-party Measurement-device-independent Quantum Key Distribution.High-speed and high-efficiency travelling wave single-photon detectors embedded in nanophotonic circuits.Experimental realization of an entanglement access network and secure multi-party computation.Quantum steering of Gaussian states via non-Gaussian measurementsN-dimensional measurement-device-independent quantum key distribution with N + 1 un-characterized sources: zero quantum-bit-error-rate case.Loophole-free Bell test using electron spins in diamond: second experiment and additional analysisQuantum key distribution with prepare-and-measure Bell test.A universal test for gravitational decoherence.Experimental temporal quantum steeringExperimental test of genuine multipartite nonlocality under the no-signalling principle.A kind of universal quantum secret sharing protocol.Simulating of the measurement-device independent quantum key distribution with phase randomized general sources.Extreme violation of local realism with a hyper-entangled four-photon-eight-qubit Greenberger-Horne-Zelinger stateBright nanoscale source of deterministic entangled photon pairs violating Bell's inequality.Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.Certified randomness in quantum physics.Turing, ciphers and quanta.Secure and robust transmission and verification of unknown quantum states in Minkowski space.Long-distance distribution of genuine energy-time entanglement.Maximal violation of Bell inequalities under local filtering.Quantum discord as a resource for quantum cryptography.Highly efficient entanglement swapping and teleportation at telecom wavelength.Classical command of quantum systems.Realistic loophole-free Bell test with atom-photon entanglement.Plug-and-play round-robin differential phase-shift quantum key distribution.Practical device-independent quantum cryptography via entropy accumulation.The ultimate physical limits of privacy.
P2860
Q27450032-45E8A8ED-F55B-4587-8ABF-9B6B85419871Q29010984-20AC0479-D955-4591-990A-F6945FB50EC2Q33615695-99AEC2EC-E66D-4EB5-B809-15A030CBFD9EQ33673143-8EAA98D9-F89E-4F43-8D40-2700DC5D8B33Q33694738-373BFD0E-ED62-497D-B615-D9D05ADB878EQ33763001-4AB28F60-B47B-4462-8AD6-B59E929D8001Q34178807-9364366B-9892-4093-A4F5-BE387992661AQ34424224-114703A0-BA36-43B9-B8A5-B3152A69BC78Q35941811-D5CE707F-6E96-4B0A-8FD6-C49479405AB2Q36054451-1CE6E023-8C55-4406-ABA1-36605EFAB91CQ36068793-22294881-2080-44D9-9E74-EB121161864BQ36211580-55EE0FCA-1DB8-4AFE-A83D-A0528B4A0445Q36266893-8AD0C083-72A0-4DB9-B3BA-D86FF99FA189Q36353612-F0E471CB-8494-408C-A373-8C3157EC9029Q36503523-07E59B35-5545-4282-9521-FE683FFAC0BDQ37086747-942FFCAA-3963-48BF-B942-7D2D020F95EAQ37093592-5064153B-A80F-495B-868F-E054D5A5A83FQ37121647-4C2E45CF-BA54-42A6-9154-05964EBC9227Q37166828-563F6B6E-1507-4C3F-B2B2-2491815C0828Q37335487-23357A5E-6880-496F-9569-F4F761C30BEAQ37338853-28536500-09C4-4AA3-BCEF-34EA76133891Q37454380-9D5F936A-A0CA-4C5A-8F62-94505AA7ABE4Q37518472-A92E1C1D-5E1A-4F15-859F-B56B64BF7BAAQ37581579-93C5729E-6A4D-4066-B260-051C59AD6FEAQ37700350-6F0D8D82-088C-4F9B-8C14-D3ACE0601434Q38516951-9EF8813F-7F53-4D60-ABCF-7803A2C3B87EQ38793634-92AAEE81-9DF5-4860-9ECC-BA0CA713B416Q38914687-E103A96E-A33F-4655-B28D-23547DDD3F84Q39032683-D3D6818D-3E98-4635-A6C2-B65EE590B4FAQ39600220-A9F5A7B5-D31C-4C55-B232-50262BA9233EQ41810297-0B31E8D3-FCDE-4F1F-8572-1AD76AD5FB5FQ41976874-5244E91F-A720-49AF-90C7-FE8B749C6353Q41986280-19C039E0-927C-467C-B68B-82316DEBA870Q42984371-B3CD75C4-84AB-458F-A58B-E9B445C5871FQ43194932-92AB1AF5-437E-4978-A926-88C3F164687AQ44167856-038A365A-2E44-420C-8499-89F85CE8371EQ44192123-3E35CC63-09AF-40EC-9D29-A2F1A88AB323Q47147127-0FD67DCC-ED45-4764-AF03-E3EC4C55BAFCQ47554014-34602B17-A7AF-4AA7-927E-517F5EC025FDQ47659255-5924EE25-735D-4A3E-8CB1-D436C92874ED
P2860
Device-independent security of quantum cryptography against collective attacks.
description
2007 nî lūn-bûn
@nan
2007年の論文
@ja
2007年学术文章
@wuu
2007年学术文章
@zh
2007年学术文章
@zh-cn
2007年学术文章
@zh-hans
2007年学术文章
@zh-my
2007年学术文章
@zh-sg
2007年學術文章
@yue
2007年學術文章
@zh-hant
name
Device-independent security of quantum cryptography against collective attacks.
@en
Device-independent security of quantum cryptography against collective attacks.
@nl
type
label
Device-independent security of quantum cryptography against collective attacks.
@en
Device-independent security of quantum cryptography against collective attacks.
@nl
prefLabel
Device-independent security of quantum cryptography against collective attacks.
@en
Device-independent security of quantum cryptography against collective attacks.
@nl
P2093
P50
P1476
Device-independent security of quantum cryptography against collective attacks.
@en
P2093
Antonio Acín
Serge Massar
Stefano Pironio
P304
P356
10.1103/PHYSREVLETT.98.230501
P407
P577
2007-06-04T00:00:00Z
P698
P818
quant-ph/0702152