Preprints

Quantum Cryptography

Year Content Icon
Jiawei Wu, Yanglin Hu, Akshay Bansal, M. Tomamichel On the composable security of weak coin flipping.
E. Cervero, M. Tomamichel Device independent security of quantum key distribution from monogamy-of-entanglement games.
Antonio Acin, V. Scarani, Mate Farkas, Victoria J. Wright, Gabriel Senno, Fionnuala Curran, S. Meng Maximal intrinsic randomness of a quantum state.
Christoph F. Wildfeuer, A. Ling, Willi Meier, Tanvirul Islam, Ayesha Reezwana, Simon M. Burkhardt First demonstration of a post-quantum key-exchange with a nanosatellite.
A. Ling, Thomas Jennewein, Daniel K. L. Oi, Tom Vergoossen, Thomas Brougham, Brendon L. Higgins, Jasminder S. Sidhu, Tanvirul Islam Finite resource performance of small satellite-based quantum key distribution missions.
Sonali Mohapatra, Markus Krutzik, Luca Mazzarella, David Lowndes, Thomas Brougham, Mustafa Gundogan, Siddarth K. Joshi, Daniel K. L. Oi, Jasminder S. Sidhu, Stefano Pirandola, Ivette Fuentes, John Rarity, Makan Mohageg, Thomas Jennewein, A. Ling, Paolo Villoresi, Giuseppe Vallone, Daniele Dequal Advances in Space Quantum Communications.
Clarence Liu, A. Ling, Moritz Mihm, Srihari Sivankaran A CubeSat platform for space based quantum key distribution.
Shen Lijiong, C. Kurtsiefer Countering detector manipulation attacks in quantum communication through detector self-testing.
Y. Ouyang, Cosmo Lupo Quantum key distribution with non-ideal heterodyne detection.
S.Kundu, Ernest Tan Composably secure device-independent encryption with certified deletion.
N.G. Boddu, Upendra Kapshikar Tamper Detection against Unitary Operators.
Maciej Lukasz Obremski, N.G. Boddu, R. Jain, D. Aggarwal Quantum Measurement Adversary.
K. Bharti, Maharshi Ray, Zhen-Peng Xu, M. Hayashi, L.C. Kwek, Adán Cabello Graph-Theoretic Framework for Self-Testing in Bell Scenarios.
H. Shrotriya, K. Bharti, L.C. Kwek Robust Self Testing of All Pure Bipartite Maximally Entangled States via Quantum Steering.
Kon Wen Yu, C.C.W. Lim Provably-secure symmetric private information retrieval with quantum cryptography.
Ernest Y. -Z. Tan, R. Schwonnek , K.T. Goh, I.W. Primaatmaja, C.C.W. Lim Computing secure key rates for quantum key distribution with untrusted devices.
Joseph C. Chapman, C.C.W. Lim, Paul G. Kwiat Hyperentangled Time-bin and Polarization Quantum Key Distribution.
Maciej Lukasz Obremski, D. Aggarwal Inception makes non-malleable codes shorter as well!.
Ernest Y. -Z. Tan, C.C.W. Lim, Renato Renner Advantage distillation for device-independent quantum key distribution.
Shihan Sajeed, Nigar Sultana, C.C.W. Lim, Vadim Makarov An optimal local model to practically emulate Bell inequalities.
J. Ryu, Jinhyoung Lee, P. Kurzynski, D. Kaszlikowski Wringing Out Better No-signaling Monogamies.
A. Anshu, A. Anshu, M. Hayashi, NA Warsi Secure communication over fully quantum Gelfand-Pinsker wiretap channel.
Chandrasekara C.M.R.B., R. Bedington, B.Xueliang, K. Ilangovan, Y.S. Yau, Denis Naughton, Simon Barraclough, Douglas Griffin, Russell Boyce, A. Ling Demonstrating Miniaturised, entangled photon-pair sources on board nano satellites to enable future QKD missions.
Jian-Yu Guan, J.M. Arrazola, Ryan Amiri, Weijun Zhang, Hao Li, Lixing You, Zhen Wang, Qiang Zhang, Jian-Wei Pan Experimental preparation and verification of quantum money.
J.M. Arrazola, Ryan Amiri Secret key expansion from covert communication.
Yang Liu, J.M. Arrazola, Wei-Zhao Liu, Weijun Zhang, Ignatius William Primaatmaja, Hao Li, Lixing You, Zhen Wang, V. Scarani, Qiang Zhang, Jian-Wei Pan Experimental unconditionally secure covert communication in dense wavelength-division multiplexing networks.
A. Ling, Christoph Wildfeuer, V. Scarani A note on quantum safe symmetric key growing.
C. Pfister, P. Coles, S. Wehner, Norbert Lutkenhaus Sifting attacks in finite-size quantum key distribution.
P. Kurzynski, Marcin Markiewicz, D. Kaszlikowski Cryptographic security of the quantum key distribution from the triangle inequality.
P. Coles, Fabian Furrer Entropic Formulation of Heisenberg\'s Error-Disturbance Relation.
M.E. McKague, L. Sheridan Insider-proof encryption with applications for quantum key distribution.
Rotem Arnon Friedman, E. Hänggi, Amnon Ta-Shma Towards the impossibility of non-signalling privacy amplification from time-like ordering constraints.
I. Kerenidis, S. Zhang A quantum protocol for sampling correlated equilibria unconditionally and without a mediator.
Valerio Scarani QKD: a million signal task.