Publications

Journal papers, published/accepted

[1] A. Ortu, A. Tiranov, S. Welinski, F. Fröwis, N. Gisin, A. Ferrier, P. Goldner, and M. Afzelius, Simultaneous coherence enhancement of optical and microwave transitions in solid-state electronic spins, Nature Materials 17, 671–675 (2018).

[2] F. Grünenfelder, A. Boaron, D. Rusca, A. Martin, and H. Zbinden, Simple and high-speed polarization-based QKD, Appl. Phys. Lett. 112 (5), 051108 (2018).

[3] D. Rusca, A. Boaron, F. Grünenfelder, A. Martin, and H. Zbinden, Finite-key analysis for the 1-decoy state QKD protocol, Appl. Phys. Lett. 112, 171104 (2018).

[4] A. Boaron, B. Korzh, R. Houlmann, G. Boso, D. Rusca, S. Gray, M.-J. Li, D. Nolan, A. Martin, and H. Zbinden, Simple 2.5 GHz time-bin quantum key distribution, Appl. Phys. Lett. 112, 171108 (2018).

[5]M. Bozzio, A. Orieux, L. T. Vidarte, I. Zaquine, I. Kerenidis, and E. Diamanti, Experimental investigation of practical unforgeable quantum money, npj Quantum Information 4, 5 (2018).

[6] Á. Navarrete, W. Wang, F. Xu, and M. Curty, Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors, New J. Phys. 20, 043018 (2018).

[7] N. Lo Piparo, N. Sinclair and M. Razavi, Memory-assisted quantum key distribution resilient against multiple-excitation effects, Quantum Science and Technology 3, 014009 (2018).

[8] W. Wang, K. Tamaki, M. Curty, “Finite-key security analysis for quantum key distribution with leaky sources”, New J. Phys. 20, 083027 (2018).

[9] K. Tamaki, H.-K. Lo, A. Mizutani, G. Kato, C. C. W. Lim, K. Azuma, M. Curty, Security of quantum key distribution with iterative sifting, Quantum Science and Technology 3, 014002 (2017)

[10] N. Lo Piparo, M. Razavi, and W. J. Munro, Memory-assisted quantum key distribution with a single nitrogen-vacancy center, Phys. Rev. A  96, 052313 (2017).

[11] G. L. Roberts, M. Lucamarini, Z. L. Yuan, J. F. Dynes, L. C. Comandar, A. W. Sharpe, A. J. Shields, M. Curty, I. V. Puthoor, E. Andersson, Experimental measurement-device-independent quantum digital signatures, Nature Communications 8, 1098 (2017).

[12] H.-L. Yin, W.-L. Wang, Y.-L. Tang, Q. Zhao, H. Liu, X.-X. Sun, W.-J. Zhang, H. Li, I. V. Puthoor, L.-X. You, E. Andersson, Z. Wang, Y. Liu, X. Jiang, X. Ma, Q. Zhang, M. Curty, T.-Y. Chen, J.-W. Pan, Experimental measurement-device-independent quantum digital signatures over a metropolitan network, Phys. Rev. A 95, 042338 (2017).

Journal papers, under review

 

[13] M. Minder, M. Pittaluga, G. L. Roberts, M. Lucamarini, J. F. Dynes, Z. L. YuanA. J. Shields  TBA, submitted to Nature Photonics.

[14] T. Paraiso, I. De Marco, T. Roger, D. Marangon, J. Dynes, M. LucamariniZ. L. YuanA. J. Shields, TBA, submitted to Nature Photonics.

[15] F Grasselli, Hermann Kampermann, D Bruß, Finite-key effects in multi-partite quantum key distribution protocols, submitted to New Journal of Physics, available as preprint at arXiv:1807.04472

[16] G. L. Roberts, M. Pittaluga, M. Minder, M. Lucamarini, J. F. Dynes, Z. L. Yuan, A. J. Shields, Patterning-effect-free intensity modulator for secure decoy-state quantum key distribution, arXiv:1807.07414.

[17] A. Boaron, G. Boso, D. Rusca, C. Vulliez, C. Autebert, M. Caloz, M. Perrenoud, G. Gras, F. Bussières, M.-J. Li, D. Nolan, A. Martin, H. Zbinden, Secure quantum key distribution over 421 km of optical fiber, arXiv:1807.03222.

[18] S. Ghorai, E. Diamanti, A. Leverrier, Composable security of two-way continuous-variable quantum key distribution, arXiv:1806.11356.

[19] A Tiranov, A Ortu, S Welinski, A Ferrier, P Goldner, N Gisin, M Afzelius, Spectroscopic study of hyperfine properties in 171Yb3+:Y2SiO5, submitted to Phys. Rev. B, available as preprint at arXiv:1712.08616v1

[20] M. Curty and H. K. Lo, Foiling covert channels and malicious classical post-processing units in quantum key distribution, submitted to npj Quantum Information., available as preprint at arXiv:1711.08724.

[21] S Ghorai, E Diamanti, A Leverrier, Composable security of two-way continuous-variable quantum key distribution, submitted to Physical Review Letters, available as preprint at arXiv: 1806.11356

[22] D. Rusca, A. Boaron, M. Curty, A. Martin, H. Zbinden, “Security proof for a simplified BB84-like QKD protocol”, submitted to Physical Review A, preprint arXiv:1808.08259 (2018).

[23] A. Mizutani, G. Kato, K. Azuma, M. Curty, R. Ikuta, T. Yamamoto, N. Imoto, H.-K. Lo, K. Tamaki, “Quantum key distribution with setting-choice-independently correlated light sources”, submitted to npj Quantum Information (2018), available as preprint arXiv:1803.09484.

[24] C. Li, M. Curty, F. Xu, O. Bedroya, H.-K. Lo, “Secure quantum communication in the presence of phase and polarization dependent loss”, submitted to PRA (2018), available as preprint arXiv:1807.04377 (2018).

[25] M. Curty, K. Azuma, H.-K. Lo, “Simple security proof of twin-field type quantum key distribution protocol”, submitted to Physical Review Letters (2018), available as preprint arXiv:1807.07667.

Conference papers, presented/accepted

Talks

[26] N Vyas, Hybrid quantum cryptography: everlasting security with performances beyond QKD, Journées Informatique Quantique, Bordeaux, France (2017)

[27] D. Rusca, G Gras, A Boaron, J  Brask, A Martin, N Brunner and H Zbinden,  Recent developments in Quantum Key Distribution and Random Number Generation, 7th NCCR QSIT Winter School & 8th NCCR QSIT General Meeting, Arosa (2018)

[28] A Ortu, Broadband Raman heterodyne spectroscopy of Rare Earth-doped crystals, NCCR QSIT Junior Meeting, Passugg (2017)

[29] G Currás Lorenzo and M Razavi, Finite-key analysis for memory-assisted quantum key distribution, 24th Young Atom Opticians Conference, Glasgow, UK (2018).

[30] S. Bahrani, O Elmabrok, G Currás Lorenzo and M Razavi, Finite-Key Effects in Quantum Access Networks with Wireless links, IEEE GLOBECOM 2018 Workshops: Quantum Communications and Information Technology, Abu Dhabi, UAE (2018).

Posters

[31] A Ortu, A Tiranov, E Zambrini Cruzeiro, N Gisin and M Afzelius, Broadband Raman heterodyne spectroscopy of Rare Earth-doped crystals, NCCR QSIT Junior Meeting, Passugg (2017)

[32] G Currás Lorenzo and M Razavi, Finite-key analysis for memory-assisted quantum key distribution, International Conference on Challenges in Quantum Information Science, Tokyo, Japan (2018)

[33] G Currás Lorenzo and M Razavi, Finite-key analysis for memory-assisted decoy-state quantum key distribution, 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

 [34] D. Rusca, A Boaron, F Grünenfelder, A Martin and H Zbinden. The 1-decoy state protocol: the best choice for practical QKD, 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[35] Y Jing, Resource analysis of future quantum repeater networks, 24th Young Atom Opticians Conference, Glasgow, UK (2018)

[36] Y Jing and M Razavi, Resource analysis of future quantum repeater networks, 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[37] F Grasselli, Hermann Kampermann and D Bruss, Finite-key effects in multi-partite quantum key distribution protocols, DPG Spring Meeting, Erlangen, Germany (2018) and 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[38] G Roberts, M Pittaluga, M Minder, J F. Dynes, Z Yuan, M Lucamarini and A J. Shields, Patterning-effect-free intensity modulator for decoy-state quantum key distribution, 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[39] M Pereira, M Curty and K Tamaki, Loss-tolerant quantum cryptography with leaky sources, 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[40] C Liorni, Hermann Kampermann and D Bruß, Satellite-based quantum links for QKD: beam effects and weather dependence, DPG Spring Meeting, Erlangen, Germany (2018) and 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[41] N Vyas and  R Alléaume, Quantum Computational Hybrid Cryptography, 8th International Conference on Quantum Cryptography, Shanghai, China (2018)

[42] A Ortu, A Tiranov, S Welinski, F Fröwis, A Ferrier, P Goldner,  N Gisin, and M Afzelius, Simultaneous coherence enhancement of optical and microwave transitions in solid-state electronic spins, 7th NCCR QSIT Winter School & 8th NCCR QSIT General Meeting, Arosa (2018)

Invited talks by QCALL supervisors (partial list)

[43] E. Diamanti, Quantum cryptography using practical photonic systems, Invited talk at the COST Nanoscale Quantum Optics Early Stage Researcher Workshop, Budapest, Hungary, Oct 2017.

[44] M. Razavi, From theory to practice: What it takes for quantum repeaters to prove useful? invited paper, 2nd Workshop for Quantum Repeaters and Networks, Seefeld, Austria, Sept 2017.

[45] E. Diamanti, Continuous-variable quantum cryptography on silicon, Invited talk at the International Conference on Integrated Quantum Photonics, Rome, Italy, Sept 2017.

[46] E. Diamanti, Practical secure quantum communications, Invited talk at the Central European Workshop on Quantum Optics (CEWQO), Copenhagen, Denmark, June 2017.

[47] E. Diamanti, Practical secure quantum communications, Invited talk at the OSA Quantum Information and Measurement IV: Quantum Technologies Conference, Paris, France, April 2017.

[48] D. Bruss, Quantum cryptography, Invited Talk at International Workshop on Secure Communication via Quantum Channels, ZiF Bielefeld, Germany, April 2017.

[49] D. Bruss, Large-scale quantum networks based on graphs, Invited Talk at 31. Umbrella Symposium on Quantum Information and Technology, RWTH Aachen, Germany, July 2017.

[50] D. Bruss, Multi-partite entanglement can speed up quantum key distribution in networks, Invited talk at International Symposium on New Frontiers in Quantum Correlations, Kolkata, India, January 2018.

[51] R. Alléaume, Can We Accelerate Quantum Cryptography Take-Off ? Invited talk at the Central European Workshop on Quantum Optics (CEWQO) Industry Session, Copenhagen, Denmark, June 2017.

[52] R. Alléaume, Quantum Technologies: Impact on Cybersecurity, Invited Talk at the Cisco – Polytechnique Annual Symposium, Paris, France – April 9-10 2018

 

[53] R. Alléaume, Quantum Cryptography at the Computational Frontier, Invited talk at the Workshop « The Quantum Internet, Charting the Critical Path , Toronto, Canada, June 21-23 2018.