From Bell’s Theorem to Secure Quantum Key Distribution
The first step in any quantum key distribution (QKD) protocol consists of sequences of measurements that produce correlated classical data. We show that these correlation data m...
The first step in any quantum key distribution (QKD) protocol consists of sequences of measurements that produce correlated classical data. We show that these correlation data m...
A new purification scheme is proposed which applies to arbitrary dimensional\nbipartite quantum systems. It is based on the repeated application of a special\nclass of nonlinear...
Here we present experimental realizations of two new entanglement detection methods: a three-measurement Bell inequality inequivalent to the Clauser-Horne-Shimony-Holt inequalit...
It is shown that (i) all entangled states can be mapped by single-copy measurements into probability distributions containing secret correlations, and (ii) if a probability dist...
We construct a Bell inequality for coincidence probabilities on a three three-dimensional (qutrit) system. We show that this inequality is violated when each observer measures t...
Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the rece...
All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the 6 state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal ...
A pulsed source of energy-time entangled photon pairs pumped by a standard\nlaser diode is proposed and demonstrated. The basic states can be distinguished\nby their time of arr...
Abstract An all-fibre quantum cryptography set-up based on the polarization of single photon pulses is described. The feasibility of establishing a key over more than 1 km has b...
A new interferometric setup using a 3 x 3 coupler and two Faraday mirrors is presented. It has the advantages of being built only with passive components, of freedom from the po...
We consider the Bennett-Brassard cryptographic scheme, which uses two conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits sent in one of the ba...
h-index: Number of publications with at least h citations each.