Nicky Kai Hong Li
YOU?
Author Swipe
View article: Detecting genuine multipartite entanglement in multi-qubit devices with restricted measurements
Detecting genuine multipartite entanglement in multi-qubit devices with restricted measurements Open
Detecting genuine multipartite entanglement (GME) is a state-characterization task that benchmarks coherence and experimental control in quantum systems. Existing GME tests often require joint measurements on many qubits, posing experiment…
View article: High-dimensional entanglement witnessed by correlations in arbitrary bases
High-dimensional entanglement witnessed by correlations in arbitrary bases Open
Certifying entanglement is an important step in the development of many quantum technologies, especially for higher-dimensional systems, where entanglement promises increased capabilities for quantum communication and computation. A key fe…
View article: High-dimensional entanglement witnessed by correlations in arbitrary bases
High-dimensional entanglement witnessed by correlations in arbitrary bases Open
Certifying entanglement is an important step in the development of many quantum technologies, especially for higher-dimensional systems, where entanglement promises increased capabilities for quantum communication and computation. A key fe…
View article: Identifying families of multipartite states with non-trivial local entanglement transformations
Identifying families of multipartite states with non-trivial local entanglement transformations Open
The study of state transformations by spatially separated parties with local operations assisted by classical communication (LOCC) plays a crucial role in entanglement theory and its applications in quantum information processing. Transfor…
View article: Identifying families of multipartite states with non-trivial local entanglement transformations
Identifying families of multipartite states with non-trivial local entanglement transformations Open
The study of state transformations by spatially separated parties with local operations assisted by classical communication (LOCC) plays a crucial role in entanglement theory and its applications in quantum information processing. Transfor…
View article: Application of the Flag-State Squashing Model to Numerical Quantum Key Distribution Security Analysis
Application of the Flag-State Squashing Model to Numerical Quantum Key Distribution Security Analysis Open
The squashing model proof technique is a powerful tool in proving security of quantum key distribution (QKD) protocols since it reduces the dimension of the associated computational problem from infinite to finite. In the first half of thi…