Generalised entropy accumulation

T Metger, O Fawzi, D Sutter, R Renner - Communications in Mathematical …, 2024 - Springer
Consider a sequential process in which each step outputs a system A i and updates a side
information register E. We prove that if this process satisfies a natural “non-signalling” …

Quantum key distribution rates from non-symmetric conic optimization

AG Lorente, PV Parellada, M Castillo-Celeita… - arXiv preprint arXiv …, 2024 - arxiv.org
Computing key rates in quantum key distribution (QKD) numerically is essential to unlock
more powerful protocols, that use more sophisticated measurement bases or quantum …

Discrete-modulated continuous-variable quantum key distribution secure against general attacks

IW Primaatmaja, WY Kon, C Lim - arXiv preprint arXiv:2409.02630, 2024 - arxiv.org
In recent years, discrete-modulated continuous-variable quantum key distribution (DM-CV-
QKD) has gained traction due to its practical advantages: cost-effectiveness, simple state …

Mutual information chain rules for security proofs robust against device imperfections

A Arqand, T Metger, EYZ Tan - arXiv preprint arXiv:2407.20396, 2024 - arxiv.org
In this work we derive a number of chain rules for mutual information quantities, suitable for
analyzing quantum cryptography with imperfect devices that leak additional information to …

Quantum Conditional Entropies

R Rubboli, MM Goodarzi, M Tomamichel - arXiv preprint arXiv:2410.21976, 2024 - arxiv.org
Fully quantum conditional entropies play a central role in quantum information theory and
cryptography, where they measure the uncertainty about a quantum system from the …

Finite-size analysis of prepare-and-measure and decoy-state QKD via entropy accumulation

L Kamin, A Arqand, I George, N Lütkenhaus… - arXiv preprint arXiv …, 2024 - arxiv.org
An important goal in quantum key distribution (QKD) is the task of providing a finite-size
security proof without the assumption of collective attacks. For prepare-and-measure QKD …

Bounds on Petz-R\'enyi Divergences and their Applications for Device-Independent Cryptography

TA Hahn, EYZ Tan, P Brown - arXiv preprint arXiv:2408.12313, 2024 - arxiv.org
Variational techniques have been recently developed to find tighter bounds on the von
Neumann entropy in a completely device-independent (DI) setting. This, in turn, has led to …

A Note on Prior Selection in Bayesian Estimation

M Seliem, AR Kamel, IM Taha… - Statistics, Optimization & …, 2024 - iapress.org
The parameter according to the Bayesian approach is handled as a variable that is random
and with a probability distribution, rather than an unknown and fixed number. Statistical …