Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization<sup>1</sup> to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard sche...
Main Authors: | Nadlinger, DP, Drmota, P, Nichol, BC, Araneda, G, Main, D, Srinivas, R, Lucas, DM, Ballance, CJ, Ivanov, K, Tan, EY-Z, Sekatski, P, Urbanke, RL, Renner, R, Sangouard, N, Bancal, J-D |
---|---|
Format: | Journal article |
Language: | English |
Published: |
Springer Nature
2022
|
Similar Items
-
An elementary quantum network of entangled optical atomic clocks
by: Nichol, BC, et al.
Published: (2022) -
Robust quantum memory in a trapped-ion quantum network node
by: Drmota, P, et al.
Published: (2022) -
Verifiable blind quantum computing with trapped ions and single photons
by: Drmota, P, et al.
Published: (2024) -
Robust quantum memory in a trapped-ion quantum network node
by: Drmota, P, et al.
Published: (2023) -
What is the minimum CHSH score certifying that a state resembles the singlet?
by: Xavier Valcarce, et al.
Published: (2020-03-01)