LIP6 - Équipe QI
LIP6 - Équipe QI
Recherche
Candidatures
Équipe
Actualités
Publications
Contact
Intranet
Français
English
0
Complete ZX-calculi for the stabiliser fragment in odd prime dimensions
We introduce a family of ZX-calculi which axiomatise the stabiliser fragment of quantum theory in odd prime dimensions. These calculi …
Robert Ivan Booth
,
Titouan Carette
DOI
HAL
Quantum Local Differential Privacy and Quantum Statistical Query Model
The problem of private learning has been extensively studied in classical computer science. Notably, a striking equivalence between …
Armando Angrisani
,
Elham Kashefi
PDF
HAL
Private network parameter estimation with quantum sensors
Networks of quantum sensors are a central application of burgeoning quantum networks. A key question for the use of such networks will …
Nathan Shettell
,
Majid Hassani
,
Damian Markham
HAL
QMA-Hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge
Anne Broadbent
,
Alex Bredariol Grilo
DOI
HAL
Experimental Demonstration of Discrete Modulation Formats for Continuous Variable Quantum Key Distribution
François Roumestan
,
Amirhossein Ghazisaeidi
,
Jeremie Renaudier
,
Luis Trigo Vidarte
,
Anthony Leverrier
,
Eleni Diamanti
,
Philippe Grangier
PDF
DOI
HAL
A Versatile CV-QKD system with a PIC-based receiver
Yoann Piétri
,
Luis Trigo Vidarte
,
Matteo Schiavon
,
Philippe Grangier
,
Amine Rhouni
,
Eleni Diamanti
HAL
Quantum Protocol for Electronic Voting without Election Authorities
Electronic voting is a very useful but challenging internet-based protocol that despite many theoretical approaches and various …
Federico Centrone
,
Eleni Diamanti
,
Iordanis Kerenidis
DOI
HAL
Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses
Luka Music
,
Céline Chevalier
,
Elham Kashefi
DOI
HAL
Bridging the gap between technology and policy in GDPR compliance: the role of differential privacy
Asmaa Belghiti
,
Armando Angrisani
HAL
Dispelling myths on superposition attacks: formal security model and attack analyses
Luka Music
,
Céline Chevalier
,
Elham Kashefi
DOI
HAL
«
»
Citation
×