Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, ie, the task of transmitting …
In the past 20 years, impressive progress has been made both experimentally and theoretically in superconducting quantum circuits, which provide a platform for manipulating …
Twisted photons can be used as alphabets to encode information beyond one bit per single photon. This ability offers great potential for quantum information tasks, as well as for the …
Local realism is the worldview in which physical properties of objects exist independently of measurement and where physical influences cannot travel faster than the speed of light …
We present a loophole-free violation of local realism using entangled photon pairs. We ensure that all relevant events in our Bell test are spacelike separated by placing the parties …
The security of quantum key distribution (QKD) usually relies on that the users' devices are well characterized according to the security models made in the security proofs. In contrast …
M Herrero-Collantes, JC Garcia-Escartin - Reviews of Modern Physics, 2017 - APS
Random numbers are a fundamental resource in science and engineering with important applications in simulation and cryptography. The inherent randomness at the core of …
According to quantum theory the energy exchange between physical systems is quantized. As a direct consequence, measurement sensitivities are fundamentally limited by …
More than 50 years ago, John Bell proved that no theory of nature that obeys locality and realism can reproduce all the predictions of quantum theory: in any local-realist theory, the …