-
1
-
-
0001215428
-
-
RSINAK 0034-6748 10.1063/1.1150518
-
T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and A. Zeilinger, Rev. Sci. Instrum. RSINAK 0034-6748 10.1063/1.1150518 71, 1675 (2000).
-
(2000)
Rev. Sci. Instrum.
, vol.71
, pp. 1675
-
-
Jennewein, T.1
Achleitner, U.2
Weihs, G.3
Weinfurter, H.4
Zeilinger, A.5
-
2
-
-
0034689102
-
-
10.1080/09500340008233380
-
A. Stefanov, N. Gisin, O. Guinnard, L. Guinnard, and H. Zbinden, J. Mod. Opt. 10.1080/09500340008233380 47, 595 (2000).
-
(2000)
J. Mod. Opt.
, vol.47
, pp. 595
-
-
Stefanov, A.1
Gisin, N.2
Guinnard, O.3
Guinnard, L.4
Zbinden, H.5
-
3
-
-
48249104395
-
-
APPLAB 0003-6951 10.1063/1.2961000
-
J. F. Dynes, Z. L. Yuan, A. W. Sharpe, and A. J. Shields, Appl. Phys. Lett. APPLAB 0003-6951 10.1063/1.2961000 93, 031109 (2008).
-
(2008)
Appl. Phys. Lett.
, vol.93
, pp. 031109
-
-
Dynes, J.F.1
Yuan, Z.L.2
Sharpe, A.W.3
Shields, A.J.4
-
4
-
-
33947680815
-
Secure self-calibrating quantum random-bit generator
-
DOI 10.1103/PhysRevA.75.032334
-
M. Fiorentino, C. Santori, S. M. Spillane, R. G. Beausoleil, and W. J. Munro, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.75.032334 75, 032334 (2007). (Pubitemid 46494669)
-
(2007)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.75
, Issue.3
, pp. 032334
-
-
Fiorentino, M.1
Santori, C.2
Spillane, S.M.3
Beausoleil, R.G.4
Munro, W.J.5
-
5
-
-
75749110605
-
-
OPLEDP 0146-9592 10.1364/OL.35.000312
-
B. Qi, Y.-M. Chi, H.-K. Lo, and L. Qian, Opt. Lett. OPLEDP 0146-9592 10.1364/OL.35.000312 35, 312 (2010).
-
(2010)
Opt. Lett.
, vol.35
, pp. 312
-
-
Qi, B.1
Chi, Y.-M.2
Lo, H.-K.3
Qian, L.4
-
6
-
-
77953607020
-
-
OPEXFF 1094-4087 10.1364/OE.18.013029
-
M. Fürst, H. Weier, S. Nauerth, D. G. Marangon, C. Kurtsiefer, and H. Weinfurter, Opt. Express OPEXFF 1094-4087 10.1364/OE.18.013029 12, 13029 (2010).
-
(2010)
Opt. Express
, vol.12
, pp. 13029
-
-
Fürst, M.1
Weier, H.2
Nauerth, S.3
Marangon, D.G.4
Kurtsiefer, C.5
Weinfurter, H.6
-
7
-
-
77952020607
-
-
OPEXFF 1094-4087 10.1364/OE.18.009351
-
M. A. Wayne and P. G. Kwiat, Opt. Express OPEXFF 1094-4087 10.1364/OE.18.009351 18, 9351 (2010).
-
(2010)
Opt. Express
, vol.18
, pp. 9351
-
-
Wayne, M.A.1
Kwiat, P.G.2
-
8
-
-
62349115065
-
-
in edited by Ç Koç (Springer, New York
-
W. Schindler, in Cryptographic Engineering, edited by, Ç Koç, (Springer, New York, 2009), p. 25.
-
(2009)
Cryptographic Engineering
, pp. 25
-
-
Schindler, W.1
-
10
-
-
0037141032
-
-
PYLAAG 0375-9601 10.1016/S0375-9601(02)00438-3
-
A. Valentini, Phys. Lett. A PYLAAG 0375-9601 10.1016/S0375-9601(02)00438- 3 297, 273 (2002).
-
(2002)
Phys. Lett. A
, vol.297
, pp. 273
-
-
Valentini, A.1
-
11
-
-
27144477301
-
No signaling and quantum key distribution
-
DOI 10.1103/PhysRevLett.95.010503, 010503
-
J. Barrett, L. Hardy, and A. Kent, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.95.010503 95, 010503 (2005). (Pubitemid 41506418)
-
(2005)
Physical Review Letters
, vol.95
, Issue.1
, pp. 1-4
-
-
Barrett, J.1
Hardy, L.2
Kent, A.3
-
12
-
-
33144457111
-
General properties of nonsignaling theories
-
DOI 10.1103/PhysRevA.73.012112
-
Ll. Masanes, A. Acin, and N. Gisin, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.73.012112 73, 012112 (2006). (Pubitemid 43270068)
-
(2006)
Physical Review A - Atomic, Molecular, and Optical Physics
, vol.73
, Issue.1
, pp. 012112
-
-
Masanes, Ll.1
Acin, A.2
Gisin, N.3
-
13
-
-
84873175000
-
-
Ph.D. dissertation, University of Cambridge
-
R. Colbeck, Ph.D. dissertation, University of Cambridge, 2007.
-
(2007)
-
-
Colbeck, R.1
-
14
-
-
79951824304
-
-
1751-8113 10.1088/1751-8113/44/9/095305
-
R. Colbeck and A. Kent, J. Phys. A 1751-8113 10.1088/1751-8113/44/9/ 095305 44, 095305 (2011).
-
(2011)
J. Phys. A
, vol.44
, pp. 095305
-
-
Colbeck, R.1
Kent, A.2
-
15
-
-
77951110792
-
-
NATUAS 0028-0836 10.1038/nature09008
-
S. Pironio, Nature (London) NATUAS 0028-0836 10.1038/nature09008 464, 1021 (2010).
-
(2010)
Nature (London)
, vol.464
, pp. 1021
-
-
Pironio, S.1
-
16
-
-
0343152990
-
-
PRLTAO 0031-9007 10.1103/PhysRevLett.67.661
-
A. K. Ekert, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.67.661 67, 661 (1991).
-
(1991)
Phys. Rev. Lett.
, vol.67
, pp. 661
-
-
Ekert, A.K.1
-
18
-
-
33748942504
-
From Bell's theorem to secure quantum key distribution
-
DOI 10.1103/PhysRevLett.97.120405
-
A. Acín, N. Gisin, and L. Masanes, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.97.120405 97, 120405 (2006). (Pubitemid 44434927)
-
(2006)
Physical Review Letters
, vol.97
, Issue.12
, pp. 120405
-
-
Acin, A.1
Gisin, N.2
Masanes, L.3
-
19
-
-
34547380185
-
-
PRLTAO 0031-9007 10.1103/PhysRevLett.98.230501
-
A. Acín, N. Brunner, N. Gisin, S. Massar, S. Pironio, and V. Scarani, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.98.230501 98, 230501 (2007).
-
(2007)
Phys. Rev. Lett.
, vol.98
, pp. 230501
-
-
Acín, A.1
Brunner, N.2
Gisin, N.3
Massar, S.4
Pironio, S.5
Scarani, V.6
-
20
-
-
79960685121
-
-
PRLTAO 0031-9007 10.1103/PhysRevLett.106.220501
-
J. Silman, A. Chailloux, N. Aharon, I. Kerenidis, S. Pironio, and S. Massar, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.106.220501 106, 220501 (2011).
-
(2011)
Phys. Rev. Lett.
, vol.106
, pp. 220501
-
-
Silman, J.1
Chailloux, A.2
Aharon, N.3
Kerenidis, I.4
Pironio, S.5
Massar, S.6
-
21
-
-
72149101238
-
-
PLRAAN 1050-2947 10.1103/PhysRevA.80.062327
-
C. E. Bardyn, T. C. H. Liew, S. Massar, M. McKague, and V. Scarani, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.80.062327 80, 062327 (2009).
-
(2009)
Phys. Rev. A
, vol.80
, pp. 062327
-
-
Bardyn, C.E.1
Liew, T.C.H.2
Massar, S.3
McKague, M.4
Scarani, V.5
-
22
-
-
79960637380
-
-
PRLTAO 0031-9007 10.1103/PhysRevLett.106.250404
-
J.-D. Bancal, N. Gisin, Y.-C. Liang, and S. Pironio, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.106.250404 106, 250404 (2011).
-
(2011)
Phys. Rev. Lett.
, vol.106
, pp. 250404
-
-
Bancal, J.-D.1
Gisin, N.2
Liang, Y.-C.3
Pironio, S.4
-
23
-
-
59249089833
-
-
in Springer, Berlin
-
F. Magniez, in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, (Springer, Berlin, 2006), p. 72.
-
(2006)
Proceedings of the 33rd International Colloquium on Automata, Languages and Programming
, pp. 72
-
-
Magniez, F.1
-
24
-
-
84873182077
-
-
Specifically, the problem lies with Eqs. (3) and (A9) of the Supplementary Information of Ref. and with the final steps leading to these equations.
-
Specifically, the problem lies with Eqs. (3) and (A9) of the Supplementary Information of Ref. and with the final steps leading to these equations.
-
-
-
-
25
-
-
84873157979
-
-
PLRAAN 1050-2947 10.1103/PhysRevA.87.012335
-
S. Fehr, R. Gelles, and C. Schaffner, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.87.012335 87, 012335 (2013).
-
(2013)
Phys. Rev. A
, vol.87
, pp. 012335
-
-
Fehr, S.1
Gelles, R.2
Schaffner, C.3
-
27
-
-
84873101988
-
-
Note that previous versions of these results claimed security against quantum side information, but both proofs were incorrect.
-
Note that previous versions of these results claimed security against quantum side information, but both proofs were incorrect.
-
-
-
-
29
-
-
77957566438
-
-
1749-4885 10.1038/nphoton.2010.214
-
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, Nat. Photonics 1749-4885 10.1038/nphoton.2010.214 4, 686 (2010).
-
(2010)
Nat. Photonics
, vol.4
, pp. 686
-
-
Lydersen, L.1
Wiechers, C.2
Wittmann, C.3
Elser, D.4
Skaar, J.5
Makarov, V.6
-
30
-
-
55049100546
-
-
PLRAAN 1050-2947 10.1103/PhysRevA.78.042333
-
Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.78.042333 78, 042333 (2008).
-
(2008)
Phys. Rev. A
, vol.78
, pp. 042333
-
-
Zhao, Y.1
Fung, C.-H.F.2
Qi, B.3
Chen, C.4
Lo, H.-K.5
-
31
-
-
78650161554
-
-
NJOPFM 1367-2630 10.1088/1367-2630/12/11/113026
-
F. Xu, B. Qi, and H.-K. Lo, New J. Phys. NJOPFM 1367-2630 10.1088/1367-2630/12/11/113026 12, 113026 (2010).
-
(2010)
New J. Phys.
, vol.12
, pp. 113026
-
-
Xu, F.1
Qi, B.2
Lo, H.-K.3
-
32
-
-
84873187462
-
-
Note in particular that it is highly unlikely that the attack reported in Ref. would spontaneously occur in nonmalicious devices.
-
Note in particular that it is highly unlikely that the attack reported in Ref. would spontaneously occur in nonmalicious devices.
-
-
-
-
33
-
-
84873159757
-
-
HotBits: Genuine random numbers, generated by radioactive decay
-
HotBits: Genuine random numbers, generated by radioactive decay, http://www.fourmilab.ch/hotbits.
-
-
-
-
34
-
-
84873192752
-
-
Random.org
-
Random.org, http://www.random.org.
-
-
-
-
35
-
-
84873198760
-
-
entropypool and entropy filter
-
entropypool and entropy filter, http://random.hd.org/index.html.
-
-
-
-
36
-
-
79959939914
-
-
Springer, Berlin
-
R. Shaltiel, An Introduction to Randomness Extractors, Automata, Languages and Programming, Lecture Notes in Computer Science, Vol. 6756 (Springer, Berlin, 2011), p. 21.
-
(2011)
An Introduction to Randomness Extractors, Automata, Languages and Programming
, pp. 21
-
-
Shaltiel, R.1
-
37
-
-
84866427032
-
-
0097-5397 10.1137/100813683
-
A. De, C. Portmann, T. Vidick, and R. Renner, SIAM J. Comput. 0097-5397 10.1137/100813683 41, 915 (2012).
-
(2012)
SIAM J. Comput.
, vol.41
, pp. 915
-
-
De, A.1
Portmann, C.2
Vidick, T.3
Renner, R.4
-
38
-
-
84873208463
-
-
Note that the definition of (classical) extractors does not usually involve side information, but the definition given here and the conventional one can be shown to be essentially equivalent.
-
Note that the definition of (classical) extractors does not usually involve side information, but the definition given here and the conventional one can be shown to be essentially equivalent.
-
-
-
-
39
-
-
84858033972
-
-
PRLTAO 0031-9007 10.1103/PhysRevLett.108.100402
-
A. Acin, S. Massar, and S. Pironio, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.108.100402 108, 100402 (2012).
-
(2012)
Phys. Rev. Lett.
, vol.108
, pp. 100402
-
-
Acin, A.1
Massar, S.2
Pironio, S.3
-
40
-
-
33846400098
-
Bounding the set of quantum correlations
-
DOI 10.1103/PhysRevLett.98.010401
-
M. Navascués, S. Pironio, and A. Acín, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.98.010401 98, 010401 (2007); (Pubitemid 46135119)
-
(2007)
Physical Review Letters
, vol.98
, Issue.1
, pp. 010401
-
-
Navascues, M.1
Pironio, S.2
Acin, A.3
-
41
-
-
47349117564
-
-
NJOPFM 1367-2630 10.1088/1367-2630/10/7/073013
-
M. Navascués, S. Pironio, and A. Acín, New J. Phys. NJOPFM 1367-2630 10.1088/1367-2630/10/7/073013 10, 073013 (2008).
-
(2008)
New J. Phys.
, vol.10
, pp. 073013
-
-
Navascués, M.1
Pironio, S.2
Acín, A.3
-
43
-
-
84873191367
-
-
This is the novel ingredient that fixes the issue in Ref..
-
This is the novel ingredient that fixes the issue in Ref..
-
-
-
-
47
-
-
24144445587
-
-
Springer, Berlin
-
M. Ben-Or, M. Horodecki, D. W. Leung, D. Mayers, and J. Oppenheim, The Universal Composable Security of Quantum Key Distribution, Lecture Notes in Computer Science, Vol. 3378 (Springer, Berlin, 2005), pp. 386-406.
-
(2005)
The Universal Composable Security of Quantum Key Distribution
, pp. 386-406
-
-
Ben-Or, M.1
Horodecki, M.2
Leung, D.W.3
Mayers, D.4
Oppenheim, J.5
-
48
-
-
84856702807
-
-
2041-1723 10.1038/ncomms1631
-
M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Nat. Commun. 2041-1723 10.1038/ncomms1631 3, 634 (2012).
-
(2012)
Nat. Commun.
, vol.3
, pp. 634
-
-
Tomamichel, M.1
Lim, C.C.W.2
Gisin, N.3
Renner, R.4
-
49
-
-
84873156354
-
-
Note, however, that even in a trusted provider situation, condition may fail if the adversary can modify the behavior of the devices by controlling external parameters such as the power supply of the devices.
-
Note, however, that even in a trusted provider situation, condition may fail if the adversary can modify the behavior of the devices by controlling external parameters such as the power supply of the devices.
-
-
-
-
50
-
-
84871796284
-
-
PRLTAO 0031-9007 10.1103/PhysRevLett.110.010503
-
J. Barrett, R. Colbeck, and A. Kent, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.110.010503 110, 010503 (2013).
-
(2013)
Phys. Rev. Lett.
, vol.110
, pp. 010503
-
-
Barrett, J.1
Colbeck, R.2
Kent, A.3
-
51
-
-
39849104298
-
The bounded-storage model in the presence of a quantum adversary
-
DOI 10.1109/TIT.2007.913245
-
R. Koenig and B. Terhal, IEEE Trans. Inf. Theory 0018-9448 10.1109/TIT.2007.913245 54, 749 (2008). (Pubitemid 351314663)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.2
, pp. 749-762
-
-
Konig, R.T.1
Terhal, B.M.2
|