A. Annexe, Code MATLAB pour l'optimisation de l'information mutuelle entre Alice et Eve M2=X

C. Simon, Hugues de Riedmatten et Nicolas Gisin. Multimode quantum memory based on atomic frequency combs, Phys. Rev. A, vol.79, p.52329, 2009.

D. Aharonov, A. Ta-shma, V. Umesh, A. C. Vazirani, and . Yao, Quantum bit escrow, Proceedings of the thirty-second annual ACM symposium on Theory of computing , STOC '00, pp.705-714, 2000.
DOI : 10.1145/335305.335404

]. M. Ballester, S. Wehner, and A. Winter, State Discrimination With Post-Measurement Information. Information Theory, IEEE Transactions on, vol.54, issue.9, pp.4183-4198, 2008.

]. H. Bechmann-pasquinucci, N. Bechmann-pasquinucci, and . Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography, Physical Review A, vol.59, issue.6, pp.4238-4248, 1999.
DOI : 10.1103/PhysRevA.59.4238

]. C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, Quantum Cryptography, or Unforgeable Subway Tokens, Advances in Cryptography : Proceedings of Crypto 82 Plenum, pp.267-275, 1983.
DOI : 10.1007/978-1-4757-0602-4_26

C. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, IEEE Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp.175-179, 1984.
DOI : 10.1016/j.tcs.2014.05.025

H. Charles, G. Bennett, N. Brassard, and . David-mermin, Quantum cryptography without Bell's theorem, Phys. Rev. Lett, vol.68, issue.5, pp.557-559, 1992.

]. M. Berta, F. Brandao, M. Christandl, and S. Wehner, Entanglement Cost of Quantum Channels. ArXiv e-prints, 2011.

]. Boller, A. Imamolu, and S. E. Harris, Observation of electromagnetically induced transparency, Physical Review Letters, vol.66, issue.20, pp.2593-2596, 1991.
DOI : 10.1103/PhysRevLett.66.2593

N. Branciard, B. Gisin, V. Kraus, and . Scarani, Security of two quantum cryptography protocols using the same four qubit states, Physical Review A, vol.72, issue.3, pp.32301-61, 2005.
DOI : 10.1103/PhysRevA.72.032301

]. G. Brassard and C. Crépeau, Quantum Bit Commitment and Coin Tossing Protocols, Advances in Cryptology : Proceedings of Crypto '90, pp.49-61, 1991.
DOI : 10.1007/3-540-38424-3_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.2188

]. Brassard, R. Jozsa, and D. Langlois, A quantum bit commitment scheme provably unbreakable by both parties, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, pp.362-371, 1993.
DOI : 10.1109/SFCS.1993.366851

]. Brassard, N. Lütkenhaus, T. Mor, C. Barry, and . Sanders, Limitations on Practical Quantum Cryptography, Physical Review Letters, vol.85, issue.6, pp.1330-1333, 2000.
DOI : 10.1103/PhysRevLett.85.1330

D. Bruß, Optimal Eavesdropping in Quantum Cryptography with Six States, Physical Review Letters, vol.81, issue.14, pp.3018-3021, 1998.
DOI : 10.1103/PhysRevLett.81.3018

]. D. Budker, D. F. Kimball, S. M. Rochester, and V. V. Yashchuk, Nonlinear Magneto-optics and Reduced Group Velocity of Light in Atomic Vapor with Slow Ground State Relaxation, Physical Review Letters, vol.83, issue.9, pp.1767-1770, 1999.
DOI : 10.1103/PhysRevLett.83.1767

C. Christian-cachin, J. Crepeau, and . Marcil, Oblivious Transfer with a Memory-Bounded Receiver, nov 1998, 1998.

J. Lawrence, . Carter, N. Mark, and . Wegman, Universal classes of hash functions, Proceedings of the ninth annual ACM symposium on Theory of computing, pp.106-112, 1977.

]. J. Cirac and R. Renner, de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography, Phys. Rev. Lett, vol.102, issue.11, p.110504, 2009.

M. Thomas, J. A. Cover, and . Thomas, Elements of Information Theory, 2006.

C. Crepeau, Equivalence Between Two Flavours of Oblivious Transfers, 1987.
DOI : 10.1007/3-540-48184-2_30

C. Crépeau and J. Kilian, Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended Abstract), 29th annual IEEE, pp.42-52, 1988.

]. C. Crépeau, Quantum Oblivious Transfer, Journal of Modern Optics, vol.41, issue.12, pp.2445-2454, 1994.
DOI : 10.1007/3-540-46416-6_9

]. I. Csiszar and J. Korner, Broadcast channels with confidential messages Information Theory, IEEE Transactions on, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/tit.1978.1055892

I. Damgaard, S. Fehr, L. Salvail, and C. Schaffner, Cryptography In the Bounded Quantum-Storage Model, Proceedings of the 46th IEEE Symposium on Foundations of Computer Science -FOCS 2005, p.449, 2005.

I. B. Damgaard, S. Fehr, and R. Renner, A Tight High-Order Entropic Quantum Uncertainty Relation with Applications, Advances in Cryptology?CRYPTO '07, pp.360-378, 2007.
DOI : 10.1007/978-3-540-74143-5_20

A. Datta, A. Derek, J. Mitchell, A. Ramanathan, and A. Scedrov, Games and the Impossibility of Realizable Ideal Functionality, Theory of Cryptography, pp.360-379, 2006.
DOI : 10.1007/11681878_19

URL : https://hal.archives-ouvertes.fr/inria-00080683

]. I. Devetak and A. Winter, Distillation of secret key and entanglement from quantum states, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.461, issue.2053, pp.207-235, 2005.
DOI : 10.1098/rspa.2004.1372

Y. Zong-ding, D. Harnik, A. Rosen, and R. Shaltiel, Constant-Round Oblivious Transfer in the Bounded Storage Model, Journal of Cryptology, vol.20, issue.2, pp.165-202, 2007.
DOI : 10.1007/s00145-006-0438-1

]. T. Durt, B. Englert, I. Bengtsson, and K. Zyczkowski, On mutually unbiased bases. ArXiv e-prints, 2010.

A. K. Ekert, Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, pp.661-663, 1991.
DOI : 10.1103/PhysRevLett.67.661

N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Quantum cryptography, Reviews of Modern Physics, vol.74, issue.1, pp.145-195, 2002.
DOI : 10.1103/RevModPhys.74.145

]. N. Gisin, G. Ribordy, H. Zbinden, D. Stucki, N. Brunner et al., Towards practical and fast Quantum Cryptography. eprint arXiv :quant- ph/0411022, 2004.

S. Goldreich, A. Micali, and . Wigderson, How to Solve any Protocol Problem, Proc.of STOC, 1987.

]. M. Grant, S. Boyd, V. Blondel, S. Boyd, and H. Kimura, Graph Implementations for Nonsmooth Convex Programs, Recent Advances in Learning and Control, Lecture Notes in Control and Information Sciences, pp.95-110, 2008.
DOI : 10.1007/978-1-84800-155-8_7

]. M. Grant and S. Boyd, CVX : Matlab Software for Disciplined Convex Programming, version 1.21, 2011.

]. Hajiaghayi, J. H. Kim, T. Leighton, and H. Räcke, Oblivious routing in directed graphs with random demands, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , STOC '05, pp.193-201, 2005.
DOI : 10.1145/1060590.1060619

]. C. Helstrom, Quantum detection and estimation theory, Journal of Statistical Physics, vol.15, issue.1, pp.231-252, 1969.
DOI : 10.1007/BF01007479

]. L. Hughston, R. Jozsa, and W. K. Wootters, A complete classification of quantum ensembles having a given density matrix, Physics Letters A, vol.183, issue.1, pp.14-18, 1993.
DOI : 10.1016/0375-9601(93)90880-9

]. B. Julsgaard, J. Sherson, J. I. Cirac, J. Fiurá?ek, and E. S. Polzik, Experimental demonstration of quantum memory for light, Nature, vol.6, issue.7016, pp.482-486, 2004.
DOI : 10.1103/PhysRevLett.85.5639

]. A. Kasapi, M. Jain, G. Y. Yin, and S. E. Harris, Electromagnetically Induced Transparency: Propagation Dynamics, Physical Review Letters, vol.74, issue.13, pp.2447-2450, 1995.
DOI : 10.1103/PhysRevLett.74.2447

]. J. Kilian, Founding cryptography on oblivious transfer, Proceedings of 20th ACM STOC, pp.20-31, 1988.

]. C. King, Additivity for a class of unital qubit channels, 2001.

]. Koenig, R. Renner, and C. Schaffner, The Operational Meaning of Min- and Max-Entropy, IEEE Transactions on Information Theory, vol.55, issue.9, 2008.
DOI : 10.1109/TIT.2009.2025545

]. R. Koenig and S. Wehner, A Strong Converse for Classical Channel Coding Using Entangled Inputs, Physical Review Letters, vol.103, issue.7, pp.51-52, 2009.
DOI : 10.1103/PhysRevLett.103.070504

]. R. Koenig, S. Wehner, and J. Wullschleger, Unconditional security from noisy quantum storage. ArXiv e-prints, p.49, 2009.

]. B. Kraus, N. Gisin, and R. Renner, Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication, Physical Review Letters, vol.95, issue.8, pp.80501-67, 2005.
DOI : 10.1103/PhysRevLett.95.080501

J. Björn-lauritzen, . Miná?, M. Hugues-de-riedmatten, N. Afzelius, C. Sangouard et al., Telecommunication-Wavelength Solid-State Memory at the Single Photon Level, Physical Review Letters, vol.104, issue.8, p.80502, 2010.
DOI : 10.1103/PhysRevLett.104.080502

]. Lo and H. F. Chau, Is Quantum Bit Commitment Really Possible?, Physical Review Letters, vol.78, issue.17, pp.3410-3413, 1997.
DOI : 10.1103/PhysRevLett.78.3410

]. Lo, X. Ma, and K. Chen, Decoy State Quantum Key Distribution, Physical Review Letters, vol.94, issue.23, p.230504, 2005.
DOI : 10.1103/PhysRevLett.94.230504

]. L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar et al., Hacking commercial quantum cryptography systems by tailored bright illumination, Nature Photonics, vol.46, issue.10, pp.686-689, 2010.
DOI : 10.1038/nphoton.2010.214

M. Ueli and . Maurer, Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher, Journal of Cryptology, vol.5, pp.53-66, 1992.

M. Ueli and . Maurer, Secret Key Agreement by Public Discussion From Common Information, IEEE Transactions on Information Theory, vol.39, pp.733-742, 1993.

]. D. Mayers, The Trouble with Quantum Bit Commitment. eprint arXiv :quant-ph/9603015, Mars 1996, 1996.

]. Mayers, Unconditionally Secure Quantum Bit Commitment is Impossible, Physical Review Letters, vol.78, issue.17, p.3414, 1996.
DOI : 10.1103/PhysRevLett.78.3414

]. B. Odom, D. Hanneke, B. D. Urso, and G. Gabrielse, New Measurement of the Electron Magnetic Moment Using a One-Electron Quantum Cyclotron, Physical Review Letters, vol.97, issue.3, p.30801, 2006.
DOI : 10.1103/PhysRevLett.97.030801

O. Michael and . Rabin, How To Exchange Secrets with Oblivious Transfer. Cryptology ePrint Archive, Report, vol.187, 1981.

]. Renner, SECURITY OF QUANTUM KEY DISTRIBUTION, International Journal of Quantum Information, vol.06, issue.01, pp.28-113, 2005.
DOI : 10.1142/S0219749908003256

URL : https://hal.archives-ouvertes.fr/hal-00917115

]. Renner, N. Gisin, and B. Kraus, Information-theoretic security proof for quantum-key-distribution protocols, Physical Review A, vol.72, issue.1, pp.12332-76, 2005.
DOI : 10.1103/PhysRevA.72.012332

URL : http://archive-ouverte.unige.ch/unige:36758

R. Tom-richardson and . Urbanke, Modern coding theory, 2008.
DOI : 10.1017/CBO9780511791338

V. Scarani, A. Acín, G. Ribordy, and N. Gisin, Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations, Physical Review Letters, vol.92, issue.5, pp.57901-60, 2004.
DOI : 10.1103/PhysRevLett.92.057901

E. Claude and . Shannon, A mathematical theory of Communication. The Bell system technical journal, Juillet, vol.27, pp.379-423, 1948.

E. Claude and . Shannon, Communication Theory of Secrecy Systems. The Bell system technical journal, pp.656-715, 1949.

W. Peter, J. Shor, and . Preskill, Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Physical Review Letters, vol.85, pp.441-55, 2000.

]. K. Toh, M. J. Todd, and R. H. Tütüncü, SDPT3 ??? A Matlab software package for semidefinite programming, Version 1.3, Optimization Methods and Software, vol.79, issue.1-4, pp.545-581, 1999.
DOI : 10.1287/moor.19.1.53

M. Tomamichel and R. Renner, Uncertainty Relation for Smooth Entropies, Physical Review Letters, vol.106, issue.11, p.110506, 2011.
DOI : 10.1103/PhysRevLett.106.110506

]. Vandenberghe and S. Boyd, Semidefinite Programming, SIAM Review, vol.38, issue.1, pp.49-95, 1994.
DOI : 10.1137/1038003

]. M. Wegman, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981.
DOI : 10.1016/0022-0000(81)90033-7

]. Wehner, C. Schaffner, and B. Terhal, Cryptography from Noisy Storage, Physical Review Letters, vol.100, issue.22, pp.220502-220551, 2008.
DOI : 10.1103/PhysRevLett.100.220502

URL : http://arxiv.org/abs/0711.2895

]. W. Wootters and W. H. Zurek, A single quantum cannot be cloned, Nature, vol.15, issue.5886, pp.802-803, 1982.
DOI : 10.1038/299802a0