Skip to main content

Showing 1–11 of 11 results for author: Van Himbeeck, T

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2502.01611  [pdf, other

    quant-ph math-ph math.FA math.OA

    Additivity and chain rules for quantum entropies via multi-index Schatten norms

    Authors: Omar Fawzi, Jan Kochanowski, Cambyse Rouzé, Thomas Van Himbeeck

    Abstract: The primary entropic measures for quantum states are additive under the tensor product. In the analysis of quantum information processing tasks, the minimum entropy of a set of states, e.g., the minimum output entropy of a channel, often plays a crucial role. A fundamental question in quantum information and cryptography is whether the minimum output entropy remains additive under the tensor produ… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

    Comments: 38 pages, 1 figure, comments are welcome

  2. arXiv:2404.17079  [pdf, other

    quant-ph cs.CR

    Improving device-independent weak coin flipping protocols

    Authors: Atul Singh Arora, Jamie Sikora, Thomas Van Himbeeck

    Abstract: Weak coin flipping is the cryptographic task where Alice and Bob remotely flip a coin but want opposite outcomes. This work studies this task in the device-independent regime where Alice and Bob neither trust each other, nor their quantum devices. The best protocol was devised over a decade ago by Silman, Chailloux, Aharon, Kerenidis, Pironio, and Massar with bias $\varepsilon \approx 0.33664$, wh… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: 25 pages, 7 figures

  3. Impossibility of adversarial self-testing and secure sampling

    Authors: Akshay Bansal, Atul Singh Arora, Thomas Van Himbeeck, Jamie Sikora

    Abstract: Self-testing is the task where spatially separated Alice and Bob cooperate to deduce the inner workings of untrusted quantum devices by interacting with them in a classical manner. We examine the task above where Alice and Bob do not trust each other which we call adversarial self-testing. We show that adversarial self-testing implies secure sampling -- a simpler task that we introduce where distr… ▽ More

    Submitted 23 August, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: Substantial revision. 6 pages, 2 Figures

    Journal ref: Phys. Rev. Research 6, L032039, 2024

  4. arXiv:2210.14296  [pdf, other

    quant-ph

    An Improved Correction Term for Dimension Reduction in Quantum Key Distribution

    Authors: Twesh Upadhyaya, Thomas van Himbeeck, Norbert Lütkenhaus

    Abstract: The dimension reduction method enables security proofs of quantum key distribution (QKD) protocols that are originally formulated in infinite dimensions via reduction to a tractable finite-dimensional optimization. The reduction of dimensions is associated with a correction term in the secret key rate calculation. The previously derived correction term is loose when the protocol measurements are n… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

    Comments: 6 pages, 1 figure

  5. arXiv:2203.06554  [pdf, other

    quant-ph

    Finite-Key Analysis of Quantum Key Distribution with Characterized Devices Using Entropy Accumulation

    Authors: Ian George, Jie Lin, Thomas van Himbeeck, Kun Fang, Norbert Lütkenhaus

    Abstract: The Entropy Accumulation Theorem (EAT) was introduced to significantly improve the finite-size rates for device-independent quantum information processing tasks such as device-independent quantum key distribution (QKD). A natural question would be whether it also improves the rates for device-dependent QKD. In this work, we provide an affirmative answer to this question. We present new tools for a… ▽ More

    Submitted 12 March, 2022; originally announced March 2022.

    Comments: 40+32 pages, 7 figures

  6. Dimension Reduction in Quantum Key Distribution for Continuous- and Discrete-Variable Protocols

    Authors: Twesh Upadhyaya, Thomas van Himbeeck, Jie Lin, Norbert Lütkenhaus

    Abstract: We develop a method to connect the infinite-dimensional description of optical continuous-variable quantum key distribution (QKD) protocols to a finite-dimensional formulation. The secure key rates of the optical QKD protocols can then be evaluated using recently-developed reliable numerical methods for key rate calculations. We apply this method to obtain asymptotic key rates for discrete-modulat… ▽ More

    Submitted 24 May, 2021; v1 submitted 14 January, 2021; originally announced January 2021.

    Comments: 25 pages, 9 figures

    Journal ref: PRX Quantum 2, 020325 (2021)

  7. arXiv:2010.03442  [pdf, other

    quant-ph

    Tagging idea in continuous variable quantum key distribution and its application

    Authors: Chenyang Li, Thomas Van Himbeeck, Li Qian, Hoi-Kwong Lo

    Abstract: Despite tremendous theoretical and experimental progress in continuous variable (CV) quantum key distribution (QKD), its security has not been rigorously established for practical systems with multiple imperfections. The idea of tagging is widely used in security proofs of discrete variable quantum key distribution with imperfect devices. In this paper, we generalize the tagging idea from discrete… ▽ More

    Submitted 7 October, 2020; originally announced October 2020.

    Comments: 8pages, 3 figures

  8. arXiv:1905.09117  [pdf, other

    quant-ph

    Correlations and randomness generation based on energy constraints

    Authors: Thomas Van Himbeeck, Stefano Pironio

    Abstract: In a previous paper, we introduced a semi-device-independent scheme consisting of an untrusted source sending quantum states to an untrusted measuring device, with the sole assumption that the average energy of the states emitted by the source is bounded. Given this energy constraint, we showed that certain correlations between the source and the measuring device can only occur if the outcomes of… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  9. Practical self-testing quantum random number generator based on an energy bound

    Authors: Davide Rusca, Thomas van Himbeeck, Anthony Martin, Jonatan Bohr Brask, Weixu Shi, Stefano Pironio, Nicolas Brunner, Hugo Zbinden

    Abstract: We present a scheme for a self-testing quantum random number generator. Compared to the fully device-independent model, our scheme requires an extra natural assumption, namely that the mean energy per signal is bounded. The scheme is self-testing, as it allows the user to verify in real-time the correct functioning of the setup, hence guaranteeing the continuous generation of certified random bits… ▽ More

    Submitted 11 April, 2019; v1 submitted 9 April, 2019; originally announced April 2019.

    Journal ref: Phys. Rev. A 100, 062338 (2019)

  10. Quantum violations in the Instrumental scenario and their relations to the Bell scenario

    Authors: Thomas Van Himbeeck, Jonatan Bohr Brask, Stefano Pironio, Ravishankar Ramanathan, Ana Belén Sainz, Elie Wolfe

    Abstract: The causal structure of any experiment implies restrictions on the observable correlations between measurement outcomes, which are different for experiments exploiting classical, quantum, or post-quantum resources. In the study of Bell nonlocality, these differences have been explored in great detail for more and more involved causal structures. Here, we go in the opposite direction and identify t… ▽ More

    Submitted 9 September, 2019; v1 submitted 11 April, 2018; originally announced April 2018.

    Comments: 12 pages, 3 figures. Comments welcome! v4: published version in Quantum journal

    Journal ref: Quantum 3, 186 (2019)

  11. Semi-device-independent framework based on natural physical assumptions

    Authors: Thomas Van Himbeeck, Erik Woodhead, Nicolas J. Cerf, Raúl García-Patrón, Stefano Pironio

    Abstract: The semi-device-independent approach provides a framework for prepare-and-measure quantum protocols using devices whose behavior must not be characterized nor trusted, except for a single assumption on the dimension of the Hilbert space characterizing the quantum carriers. Here, we propose instead to constrain the quantum carriers through a bound on the mean value of a well-chosen observable. This… ▽ More

    Submitted 16 November, 2017; v1 submitted 20 December, 2016; originally announced December 2016.

    Comments: 26 pages, 10 figures

    Journal ref: Quantum 1, 33 (2017)