Preprints

Quantum Cryptography

Year Content Icon
Tom Vergoossen, Sergio Loarte, R. Bedington, Hans Kuiper, A. Ling Satellite constellations for trusted node QKD networks.
Tom Vergoossen, R. Bedington, James A Grieve, A. Ling Satellite quantum communications when man-in-the-middle attacks are excluded.
Shihan Sajeed, Nigar Sultana, C.C.W. Lim, Vadim Makarov An optimal local model to practically emulate Bell inequalities.
Nurul T. Islam, C.C.W. Lim, Clinton Cahall, Bing Qi, Jungsang Kim, Daniel J. Gauthier Scalable high-rate, high-dimensional quantum key distribution.
Tom Vergoossen, R. Bedington, J. Grieve, A. Ling Satellite quantum communications when man-in-the-middle attacks are excluded.
I.W. Primaatmaja, E. Lavie, K.T. Goh, W. Chao, C.C.W. Lim Almost-tight and versatile security analysis of measurement-device-independent quantum key distribution.
J. Grieve, Y. Shi, H.S. Poh, C. Kurtsiefer, A. Ling Characterizing nonlocal dispersion compensation in deployed telecommunications fiber.
J. Ryu, Jinhyoung Lee, P. Kurzynski, D. Kaszlikowski Wringing Out Better No-signaling Monogamies.
A. Anshu, M. Hayashi, NA Warsi Secure communication over fully quantum Gelfand-Pinsker wiretap channel.
M. SanthaT. LeeD. AggarwalMarco TomamichelGavin K. Brennen Quantum attacks on Bitcoin, and how to protect against them.
Chandrasekara C.M.R.B., R. Bedington, B.Xueliang, K. Ilangovan, Y.S. Yau, Denis Naughton, Simon Barraclough, Douglas Griffin, Russell Boyce, A. Ling Demonstrating Miniaturised, entangled photon-pair sources on board nano satellites to enable future QKD missions.
Valerio Scarani QKD: a million signal task.
Jian-Yu Guan, J.M. Arrazola, Ryan Amiri, Weijun Zhang, Hao Li, Lixing You, Zhen Wang, Qiang Zhang, Jian-Wei Pan Experimental preparation and verification of quantum money.
J.M. Arrazola, Ryan Amiri Secret key expansion from covert communication.
I. Kerenidis, S. Zhang A quantum protocol for sampling correlated equilibria unconditionally and without a mediator.
P. Kurzynski, Marcin Markiewicz, D. Kaszlikowski Cryptographic security of the quantum key distribution from the triangle inequality.
Mario Berta, Matthias Christandl, Fabian Furrer, Volkher B. Scholz, M. Tomamichel Continuous Variable Entropic Uncertainty Relations in the Presence of Quantum Memory.
M.E. McKague, L. Sheridan Insider-proof encryption with applications for quantum key distribution.
P. Coles, Fabian Furrer Entropic Formulation of Heisenberg\'s Error-Disturbance Relation.
Rotem Arnon Friedman, E. Hänggi, Amnon Ta-Shma Towards the impossibility of non-signalling privacy amplification from time-like ordering constraints.
M. Tomamichel, Jesus Martinez-Mateo, Christoph Pacher, David Elkouss Fundamental Finite Key Limits for Information Reconciliation in Quantum Key Distribution.
Yang Liu, J.M. Arrazola, Wei-Zhao Liu, Weijun Zhang, Ignatius William Primaatmaja, Hao Li, Lixing You, Zhen Wang, V. Scarani, Qiang Zhang, Jian-Wei Pan Experimental unconditionally secure covert communication in dense wavelength-division multiplexing networks.
A. Ling, Christoph Wildfeuer, V. Scarani A note on quantum safe symmetric key growing.
C. Pfister, P. Coles, S. Wehner, Norbert Lutkenhaus Sifting attacks in finite-size quantum key distribution.
R. Jain, Carl A. Miller, Yaoyun Shi Parallel Device-Independent Quantum Key Distribution.