
The efficient certification of classically intractable quantum devices has
been a central research question for some time. However, to observe a "quantum
advantage", it is believed that one does not need to build a large scale
universal quantum computer, a task which has proven extremely challenging.
Intermediate quantum models that are easier to implement, but which also
exhibit this quantum advantage over classical computers, have been proposed. In
this work, we present a certification technique for such a subuniversal
quantum server which only performs commuting gates and requires very limited
quantum memory. By allowing a verifying client to manipulate single qubits, we
exploit properties of measurement based blind quantum computing to give them
the tools to test the "quantum superiority" of the server.

In this work, we demonstrate a new way to perform classical multiparty
computing amongst parties with limited computational resources. Our method
harnesses quantum resources to increase the computational power of the
individual parties. We show how a set of clients restricted to linear classical
processing are able to jointly compute a nonlinear multivariable function that
lies beyond their individual capabilities. The clients are only allowed to
perform classical XOR gates and singlequbit gates on quantum states. We also
examine the type of security that can be achieved in this limited setting.
Finally, we provide a proofofconcept implementation using photonic qubits,
that allows four clients to compute a specific example of a multiparty
function, the pairwise AND.

Quantum computing has seen tremendous progress in the past years. However,
due to limitations in scalability of quantum technologies, it seems that we are
far from constructing universal quantum computers for everyday users. A more
feasible solution is the delegation of computation to powerful quantum servers
on the network. This solution was proposed in previous studies of Blind Quantum
Computation, with guarantees for both the secrecy of the input and of the
computation being performed. In this work, we further develop this idea of
computing over encrypted data, to propose a multiparty delegated quantum
computing protocol in the measurementbased quantum computing framework.

We propose a new composable and informationtheoretically secure protocol to
verify that a server has the power to sample from a subuniversal quantum
machine implementing only commuting gates. By allowing the client to manipulate
single qubits, we exploit properties of Measurement based Blind Quantum
Computing to prove security against a malicious Server and therefore certify
quantum supremacy without the need for a universal quantum computer.

The security of quantum communication using a weak coherent source requires
an accurate knowledge of the source's mean photon number. Finite calibration
precision or an active manipulation by an attacker may cause the actual emitted
photon number to deviate from the known value. We model effects of this
deviation on the security of three quantum communication protocols: the
BennettBrassard 1984 (BB84) quantum key distribution (QKD) protocol without
decoy states, ScaraniAcinRibordyGisin 2004 (SARG04) QKD protocol, and a
cointossing protocol. For QKD, we model both a strong attack using technology
possible in principle, and a realistic attack bounded by today's technology. To
maintain the mean photon number in twoway systems, such as plugandplay and
relativistic quantum cryptography schemes, bright pulse energy incoming from
the communication channel must be monitored. Implementation of a monitoring
detector has largely been ignored so far, except for ID Quantique's commercial
QKD system Clavis2. We scrutinize this implementation for security problems,
and show that designing a hackproof pulseenergymeasuring detector is far
from trivial. Indeed the first implementation has three serious flaws confirmed
experimentally, each of which may be exploited in a cleverly constructed
Trojanhorse attack. We discuss requirements for a loopholefree implementation
of the monitoring detector.

Nonlocality enables two parties to win specific games with probabilities
strictly higher than allowed by any classical theory. Nevertheless, all known
such examples consider games where the two parties have a common interest,
since they jointly win or lose the game. The main question we ask here is
whether the nonlocal feature of quantum mechanics can offer an advantage in a
scenario where the two parties have conflicting interests. We answer this in
the affirmative by presenting a simple conflicting interest game, where quantum
strategies outperform classical ones. Moreover, we show that our game has a
fair quantum equilibrium with higher payoffs for both players than in any fair
classical equilibrium. Finally, we play the game using a commercial entangled
photon source and demonstrate experimentally the quantum advantage.

Simply and reliably detecting and quantifying entanglement outside laboratory
conditions will be essential for future quantum information technologies. Here
we address this issue by proposing a method for generating expressions which
can perform this task between two parties who do not share a common reference
frame. These reference frame independent expressions only require simple local
measurements, which allows us to experimentally test them using an
offtheshelf entangled photon source. We show that the values of these
expressions provide bounds on the concurrence of the state, and demonstrate
experimentally that these bounds are more reliable than values obtained from
state tomography since characterizing experimental errors is easier in our
setting. Furthermore, we apply this idea to other quantities, such as the Renyi
and von Neumann entropies, which are also more reliably calculated directly
from the raw data than from a tomographically reconstructed state. This
highlights the relevance of our approach for practical quantum information
applications that require entanglement.

Performing complex cryptographic tasks will be an essential element in future
quantum communication networks. These tasks are based on a handful of
fundamental primitives, such as coin flipping, where two distrustful parties
wish to agree on a randomly generated bit. Although it is known that quantum
versions of these primitives can offer informationtheoretic security
advantages with respect to classical protocols, a demonstration of such an
advantage in a practical communication scenario has remained elusive. Here, we
experimentally implement a quantum coin flipping protocol that performs
strictly better than classically possible over a distance suitable for
communication over metropolitan area optical networks. The implementation is
based on a practical plug&play system, designed for quantum key distribution.
We also show how to combine our protocol with coin flipping protocols that are
almost perfectly secure against bounded adversaries, hence enhancing them with
a level of informationtheoretic security. Our results offer a powerful toolbox
for future secure quantum communications.

Future quantum information networks will likely consist of quantum and
classical agents, who have the ability to communicate in a variety of ways with
trusted and untrusted parties and securely delegate computational tasks to
untrusted largescale quantum computing servers. Multipartite quantum
entanglement is a fundamental resource for such a network and hence it is
imperative to study the possibility of verifying a multipartite entanglement
source in a way that is efficient and provides strong guarantees even in the
presence of multiple dishonest parties. In this work, we show how an agent of a
quantum network can perform a distributed verification of a multipartite
entangled source with minimal resources, which is, nevertheless, resistant
against any number of dishonest parties. Moreover, we provide a tight tradeoff
between the level of security and the distance between the state produced by
the source and the ideal maximally entangled state. Last, by adding the
resource of a trusted common random source, we can further provide security
guarantees for all honest parties in the quantum network simultaneously.

In this article we show for the first time that quantum coin flipping with
security guarantees that are strictly better than any classical protocol is
possible to implement with current technology. Our protocol takes into account
all aspects of an experimental implementation like losses, multiphoton pulses
emitted by practical photon sources, channel noise, detector dark counts and
finite quantum efficiency. We calculate the abort probability when both players
are honest, as well as the probability of one player forcing his desired
outcome. For channel length up to 21 km, we achieve a cheating probability that
is better than in any classical protocol. Our protocol is easy to implement
using attenuated laser pulses, with no need for entangled photons or any other
specific resources.