Skip to main content

Showing 1–2 of 2 results for author: Gisin, N

Searching in archive cs. Search in all archives.
.
  1. A neural network oracle for quantum nonlocality problems in networks

    Authors: Tamás Kriváchy, Yu Cai, Daniel Cavalcanti, Arash Tavakoli, Nicolas Gisin, Nicolas Brunner

    Abstract: Characterizing quantum nonlocality in networks is a challenging, but important problem. Using quantum sources one can achieve distributions which are unattainable classically. A key point in investigations is to decide whether an observed probability distribution can be reproduced using only classical resources. This causal inference task is challenging even for simple networks, both analytically… ▽ More

    Submitted 7 September, 2020; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: This is a pre-print of an article published in npj Quantum Information. The final authenticated version is available online at: https://doi.org/10.1038/s41534-020-00305-x Implementation can be found at: https://github.com/tkrivachy/neural-network-for-nonlocality-in-networks

    Journal ref: npj Quantum Inf 6, 70 (2020)

  2. arXiv:quant-ph/0701168  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Using quantum key distribution for cryptographic purposes: a survey

    Authors: Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger

    Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the… ▽ More

    Submitted 4 December, 2014; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81

    Journal ref: Theoretical Computer Science, 560 (2014), pp. 62-81