Strange IndiaStrange India


  • Mayers, D. and Yao, A. Quantum cryptography with imperfect apparatus. In Proc. 39th Annual Symposium on Foundations of Computer Science 503–509 (IEEE, 1998).

  • Acn, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).

    ADS 
    Article 

    Google Scholar 

  • Pironio, S. Device-independent quantum key distribution secure against collective attacks. New J. Phys. 11, 045021 (2009).

    ADS 
    Article 

    Google Scholar 

  • Barrett, J., Hardy, L. & Kent, A. No signaling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005).

    ADS 
    Article 

    Google Scholar 

  • Reichardt, B. W., Unger, F. & Vazirani, U. Classical command of quantum systems. Nature 496, 456–460 (2013).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Lim, C. C. W., Portmann, C., Tomamichel, M., Renner, R. & Gisin, N. Device-independent quantum key distribution with local Bell test. Phys. Rev. X 3, 031006 (2013).

    CAS 

    Google Scholar 

  • Vazirani, U. & Vidick, T. Fully device-independent quantum key distribution. Phys. Rev. Lett. 113, 140501 (2014).

    ADS 
    Article 

    Google Scholar 

  • Miller, C. A. & Shi, Y. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. J. ACM 63, 1–63 (2016).

    MathSciNet 
    Article 

    Google Scholar 

  • Arnon-Friedman, R. et al. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 9, 459 (2018).

    ADS 
    Article 

    Google Scholar 

  • Bell, J. S. On the Einstein Podolsky Rosen paradox. Phys. Phys. Fizik. 1, 195–200 (1965).

    MathSciNet 
    Article 

    Google Scholar 

  • Brunner, N., Cavalcanti, D., Pironio, S., Scarani, V. & Wehner, S. Bell nonlocality. Rev. Mod. Phys. 86, 419–478 (2014).

    ADS 
    Article 

    Google Scholar 

  • Scarani, V. Bell Nonlocality (Oxford Univ. Press, 2019).

  • Xu, F., Ma, X., Zhang, Q., Lo, H.-K. & Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).

    ADS 
    MathSciNet 
    CAS 
    Article 

    Google Scholar 

  • Rosenfeld, W. et al. Event-ready Bell test using entangled atoms simultaneously closing detection and locality loopholes. Phys. Rev. Lett. 119, 010402 (2017).

    ADS 
    Article 

    Google Scholar 

  • Schwonnek, R. et al. Device-independent quantum key distribution with random key basis. Nat. Commun. 12, 2880 (2021).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014).

    MathSciNet 
    Article 

    Google Scholar 

  • Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661663 (1991).

    MathSciNet 
    Article 

    Google Scholar 

  • Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009).

    ADS 
    Article 

    Google Scholar 

  • Hensen, B. et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature 526, 682–686 (2015).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Giustina, M. et al. Significant-loophole-free test of Bell’s theorem with entangled photons. Phys. Rev. Lett. 115, 250401 (2015).

    ADS 
    Article 

    Google Scholar 

  • Shalm, L. K. et al. Strong loophole-free test of local realism. Phys. Rev. Lett. 115, 250402 (2015).

    ADS 
    Article 

    Google Scholar 

  • Murta, G. et al. Towards a realization of device-independent quantum key distribution. Quantum Sci. Technol. 4, 035011 (2019).

    ADS 
    Article 

    Google Scholar 

  • Ho, M. et al. Noisy preprocessing facilitates a photonic realization of device-independent quantum key distribution. Phys. Rev. Lett. 124, 230502 (2020).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Xu, F., Zhang, Y.-Z., Zhang, Q. & Pan, J.-W. Device-independent quantum key distribution with random postselection. Phys. Rev. Lett. 128, 110506 (2022).

    ADS 
    MathSciNet 
    CAS 
    Article 

    Google Scholar 

  • Nadlinger, D. P. et al. Experimental quantum key distribution certified by Bell’s theorem. Nature https://doi.org/10.1038/s41586-022-04941-5 (2002).

  • Liu, W.-Z. et al. Photonic verification of device-independent quantum key distribution against collective attacks. Preprint at https://arxiv.org/abs/2110.01480 (2021).

  • Arnon-Friedman, R., Renner, R. & Vidick, T. Simple and tight device-independent security proofs. SIAM J. Comput. 48, 181–225 (2019).

    MathSciNet 
    Article 

    Google Scholar 

  • Clauser, J. F. et al. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880884 (1969).

    ADS 
    Article 

    Google Scholar 

  • Renner, R. Security of quantum key distribution. Int. J. Quantum Inf. 6, 1–127 (2008).

    Article 

    Google Scholar 

  • Tan, E. Y. Z. et al. Improved DIQKD protocols with finite-size analysis. Preprint at https://arxiv.org/abs/2012.08714 (2020).

  • Hofmann, J. et al. Heralded entanglement between widely separated atoms. Science 337, 72–75 (2012).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • van Leent, T. et al. Long-distance distribution of atom-photon entanglement at telecom wavelength. Phys. Rev. Lett. 124, 010510 (2020).

    Article 

    Google Scholar 

  • Fürst, M. High speed optical quantum random number generation. Opt. Express 18, 1302913037 (2010).

    ADS 
    Article 

    Google Scholar 

  • Braunstein, S. L. & Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012).

    ADS 
    Article 

    Google Scholar 

  • van Leent, T. et al. Entangling single atoms over 33 km telecom fibre. Nature https://doi.org/10.1038/s41586-022-04764-4 (2022).

  • Portmann, C. & Renner, R. Security in quantum cryptography. Preprint at https://arxiv.org/abs/2102.00021 (2021).

  • Endres, M. et al. Atom-by-atom assembly of defect-free one-dimensional cold atom arrays. Science 354, 1024–1027 (2016).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Barredo, D., De Léséleuc, S., Lienhard, V., Lahaye, T. & Browaeys, A. An atom-by-atom assembler of defect-free arbitrary two-dimensional atomic arrays. Science 354, 1021–1023 (2016).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Ohl de Mello, D. et al. Defect-free assembly of 2D clusters of more than 100 single-atom quantum systems. Phys. Rev. Lett. 122, 203601 (2019).

    ADS 
    CAS 
    Article 

    Google Scholar 

  • Schupp, J. et al. Interface between trapped-ion qubits and traveling photons with close-to-optimal efficiency. PRX Quantum 2, 020331 (2021).

    ADS 
    Article 

    Google Scholar 

  • Volz, J. et al. Observation of entanglement of a single photon with a trapped atom. Phys. Rev. Lett. 96, 030404 (2006).

    ADS 
    Article 

    Google Scholar 

  • Rosenfeld, W. Experiments with an Entangled System of a Single Atom and a Single Photon. PhD thesis, Ludwig-Maximilians-Universität München (2008).



  • Source link

    By AUTHOR

    Leave a Reply

    Your email address will not be published. Required fields are marked *