<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-14T07:51:34Z</responseDate><request verb="GetRecord" identifier="oai:www.recercat.cat:2117/78576" metadataPrefix="oai_dc">https://recercat.cat/oai/request</request><GetRecord><record><header><identifier>oai:recercat.cat:2117/78576</identifier><datestamp>2025-07-17T03:14:43Z</datestamp><setSpec>com_2072_1033</setSpec><setSpec>col_2072_452950</setSpec></header><metadata><oai_dc:dc xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
   <dc:title>Detection loophole attacks on semi-device-independent quantum and classical protocols</dc:title>
   <dc:creator>Dall’Arno, Michele</dc:creator>
   <dc:creator>Passaro, Elsa</dc:creator>
   <dc:creator>Gallego, Rodrigo</dc:creator>
   <dc:creator>Pawlowski, Marcin</dc:creator>
   <dc:creator>Acín dal Maschio, Antonio</dc:creator>
   <dc:contributor>Universitat Politècnica de Catalunya. Institut de Ciències Fotòniques</dc:contributor>
   <dc:subject>Àrees temàtiques de la UPC::Física</dc:subject>
   <dc:subject>Quantum optics</dc:subject>
   <dc:subject>quantum protocols</dc:subject>
   <dc:subject>Òptica quàntica</dc:subject>
   <dc:description>Semi-device-independent quantum protocols realize information tasks – e.g. secure key&#xd;
distribution, random access coding, and randomness generation – in a scenario where no&#xd;
assumption on the internal working of the devices used in the protocol is made, except&#xd;
their dimension. These protocols offer two main advantages: first, their implementation&#xd;
is often less demanding than fully-device-independent protocols. Second, they are more&#xd;
secure than their device-dependent counterparts. Their classical analogous is represented&#xd;
by random access codes, which provide a general framework for describing one-sided classical&#xd;
communication tasks. We discuss conditions under which detection inefficiencies can&#xd;
be exploited by a malicious provider to fake the performance of semi-device-independent&#xd;
quantum and classical protocols – and how to prevent it.</dc:description>
   <dc:description>Postprint (author’s final draft)</dc:description>
   <dc:date>2015-01-01</dc:date>
   <dc:type>Article</dc:type>
   <dc:identifier>1533-7146</dc:identifier>
   <dc:identifier>https://hdl.handle.net/2117/78576</dc:identifier>
   <dc:language>eng</dc:language>
   <dc:relation>http://www.rintonpress.com/journals/qiconline.html#v15n12</dc:relation>
   <dc:rights>http://creativecommons.org/licenses/by-nc-nd/3.0/es/</dc:rights>
   <dc:rights>Open Access</dc:rights>
   <dc:rights>Attribution-NonCommercial-NoDerivs 3.0 Spain</dc:rights>
   <dc:format>13 P.</dc:format>
   <dc:format>application/pdf</dc:format>
   <dc:publisher>Rinton Press</dc:publisher>
</oai_dc:dc></metadata></record></GetRecord></OAI-PMH>