Shlok Nahar
YOU?
Author Swipe
View article: Phase error rate estimation in QKD with imperfect detectors
Phase error rate estimation in QKD with imperfect detectors Open
We present a finite-size security proof of the decoy-state BB84 QKD protocol against coherent attacks, using entropic uncertainty relations, for imperfect detectors. We apply this result to the case of detectors with imperfectly characteri…
View article: Phase error estimation for passive detection setups with imperfections and memory effects
Phase error estimation for passive detection setups with imperfections and memory effects Open
We develop a generic framework to bound the phase error rate for quantum key distribution protocols using passive detection setups with imperfections and memory effects. This framework can be used in proof techniques based on the entropic …
View article: Incorporating device characterization into security proofs
Incorporating device characterization into security proofs Open
Typical security proofs for quantum key distribution (QKD) rely on having some model for the devices, with the security guarantees implicitly relying on the values of various parameters of the model, such as dark count rates or detector ef…
View article: Security of quantum key distribution with source and detector imperfections through phase-error estimation
Security of quantum key distribution with source and detector imperfections through phase-error estimation Open
Quantum key distribution (QKD) promises information-theoretic security based on quantum mechanics, but practical implementations face security vulnerabilities due to device imperfections. Recent advances have separately addressed source an…
View article: Imperfect detectors for adversarial tasks with applications to quantum key distribution
Imperfect detectors for adversarial tasks with applications to quantum key distribution Open
Security analyses in quantum key distribution (QKD) and other adversarial quantum tasks often assume perfect device models. However, real-world implementations often deviate from these models. Thus, it is important to develop security proo…
View article: QKD security proofs for decoy-state BB84: protocol variations, proof techniques, gaps and limitations
QKD security proofs for decoy-state BB84: protocol variations, proof techniques, gaps and limitations Open
We review the current status of security proofs for practical decoy-state Quantum Key Distribution using the BB84 protocol, focusing on optical implementations with weak coherent pulses and threshold photodetectors. The primary aim of this…
View article: Postselection Technique for Optical Quantum Key Distribution with Improved de Finetti Reductions
Postselection Technique for Optical Quantum Key Distribution with Improved de Finetti Reductions Open
The postselection technique is an important proof technique for proving the security of quantum key distribution protocols against coherent attacks via the uplift of any security proof against independent identically distributed collective…
View article: Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions
Postselection technique for optical Quantum Key Distribution with improved de Finetti reductions Open
The postselection technique is an important proof technique for proving the security of quantum key distribution protocols against coherent attacks. In this work, we go through multiple steps to rigorously apply the postselection technique…
View article: Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution
Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution Open
An on-demand source of bright entangled photon pairs is desirable for quantum key distribution (QKD) and quantum repeaters. The leading candidate to generate such pairs is based on spontaneous parametric down-conversion (SPDC) in non-linea…
View article: Security of quantum key distribution with imperfect phase randomisation
Security of quantum key distribution with imperfect phase randomisation Open
The performance of quantum key distribution (QKD) is severely limited by multiphoton emissions, due to the photon-number-splitting attack. The most efficient solution, the decoy-state method, requires that the phases of all transmitted pul…
View article: Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution
Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution Open
An on-demand source of bright entangled photon pairs is desirable for quantum key distribution (QKD) and quantum repeaters. The leading candidate to generate entangled photon pairs is based on spontaneous parametric down-conversion (SPDC) …
View article: Imperfect Phase-Randomisation and Generalised Decoy-State Quantum Key Distribution
Imperfect Phase-Randomisation and Generalised Decoy-State Quantum Key Distribution Open
Decoy-state methods [1-3] are essential to perform quantum key distribution (QKD) at large distances in the absence of single photon sources. However, the standard techniques apply only if laser pulses are used that are independent and ide…
View article: Security of quantum key distribution with imperfect phase randomisation
Security of quantum key distribution with imperfect phase randomisation Open
The performance of quantum key distribution (QKD) is severely limited by multiphoton emissions, due to the photon-number-splitting attack. The most efficient solution, the decoy-state method, requires that the phases of all transmitted pul…
View article: Preparations and weak-field phase control can witness initial correlations
Preparations and weak-field phase control can witness initial correlations Open
The dynamics of a system that is correlated with an environment is almost always non-Markovian. Hence, it is important to characterize such correlations experimentally and witness them in physically realistic settings. One such setting is …