Continuous variables teleportation
In  I introduced a method for teleportation of quantum states of continuous variables. The method was implemented with squeezed light and became a basic theoretical and experimental tool in quantum information (close to one thousand citations in GS) complementing the teleportation protocol for discrete variables which was discovered one year before.
Elitzur-Vaidman bomb tester
In  we introduced an interaction-free measurement: a method for finding an object without being near it. This bizarre effect (named once as one of the seven wonders of the quantum world) led to many experiments, theoretical analyses, improvements and applications. In  I clarified the subtle meaning of its "interaction-free" property.
The impossibility of counterfactual communication
The interaction-free measurement  led to a counterfactual key distribution and to a limited counterfactual computation. In ,  and  I argued against counterfactuality of the unconstrained "counterfactual" computation and several "counterfactual" communication protocols which were proposed and implemented recently.
The Aharonov-Albert-Vaidman Effect
In  the concepts of weak measurements and weak values were introduced and their use for amplification of the precision of measurements was suggested. A few years ago it was implemented in several experiments with unprecedented precision. Currently, there is a very extensive discussion regarding the efficiency of the AAV effect. In [R17] I explained in which situations it definetely provides a huge advantage.
The impact of  goes far beyond the precision measurement method. Weak value is a universal concept describing pre- and post-selected quantum systems which explains many of their surprising properties. Numerous analyses, applications and controversies regarding the meaning of the weak value continue to appear. (More than one thousand citations in GS). In , , , , , and  we continued the analysis and currently I arrived at a novel understanding of weak value: it is a property of the system and not a conditional average, as it usually presented [R18].
The past of a photon
While Bohr preached that one should not talk about quantum particles between detections, Wheeler proposed that the trajectory of the photon in the past is known when there is only one allowed path connecting the source and the detector. In  I contested this claim showing that this view does not explain the weak trace which the photon leaves. I argue that a consistent way of describing the past of the photon is to say that it was in the overlap of the forward and backward evolving quantum states. This is where it leaves a weak trace. This approach created a large controversy because it suggests that one cannot talk about photon trajectories and because in this picture the photon can be in places through which it cannot pass. To support my approach, I, together with a team of experimentalists at Tel-Aviv university, performed a highly discussed experiment "Asking photons where have they been"  which continues to get much attention.
The two-state vector formalism
This is the framework for a large part of my research. It is developed in , , , ,  and reviewed in . It led to the concept of weak measurements and weak values, to the 3-box paradox, to the conceptual design of a quantum time-translation machine , , to a novel approach to the past of particles inside interferometers , and much more.
Defence of time-symmetric quantum mechanics
A large part of my research relies on time-symmetric approach to quantum theory originated by Aharonov at 1964. The approach attracted extensive criticism to which I tried to reply in several (published and unpublished) works [R10], , , , [R14].
The mean king problem
You give an electron to the king who measures spin x, spin y or spin z and returns it to you. The task is to find a method such that you can tell the king, without mistakes, what was the result of his measurement for these three possible choices, otherwise, you will be executed. Surprisingly, it is possible to meet the challenge of the king. In  we explained how to do this. We found that this task is possible after formulating the concept of a generalized two-state vector , which was published later in . The mean king problem continues to generate novel quantum information protocols and extensive mathematical analyses.
The 3-box paradox
In  we introduced a quantum protocol in which a single particle can be found with certainty in box A and also in box B. Numerous works analyzed various aspects of this strange behavior based on different interpretations ranging from classical physics to the consistent histories interpretation of quantum mechanics. In  and  the paradox was transformed into the Aharon-Vaidman game, an example of a local classical task, in which quantum technology has an advantage in performing a classical task.
The failure of the product rule
If A=a and B=b with certainty, then AB=ab. This is a true statement for quantum observables. In  I realized that it is not true in general for pre- and post-selected quantum systems. This, in turn, explains various quantum paradoxes.
More paradoxical features of pre-and post-selected quantum systems
Quantum systems behave very differently than classical systems, and pre- and post-selected quantum systems behave in an even more bizarre way, as seen in some of the above examples. But there are more paradoxes. One shutter can close any number of slits for a single classical or quantum particle . We can simulate Popescu-Rohrlich boxes exhibiting stronger than quantum correlations . We can put three particles in two boxes such that no pair is present in one box . If we look at "weak measurement reality" , things become even more surprising: the particle can act as if it is in one place, but its magnetic moment appears in another place .
In  we introduced a modular value, a novel concept of a pre- and post-selected quantum system which fully characterizes its coupling to a projection operator variable. It is related to a weak value, but it can be measured in ordinary, strong, measurements.
Time-symmetric quantum counterfactuals
The common approach to counterfactuals is that they are asymmetric relative to the arrow of time. In [R10], , ,  and [R14] I introduced and defended the concept of time-symmetric quantum counterfactuals which is important for building a philosophical basis for the two-state vector formalism.
In  we introduced a method which allows measurement of a (protected) quantum state of a single quantum system. This was surprising, because the common belief is that we need an ensemble for measuring a quantum state. In  and  I clarified the meaning of this proposal. Protective measurements continue to generate a conceptual debate.
The physical origin of topological phases
In  and  we showed how a naive argument explaining the Aharonov-Casher effect using classical lag fails due to a subtle concept of the "hidden momentum". The neutron feels the force but does not accelerate. However, recently I came to the conclusion that Aharonov-Casher and Aharonov-Bohm effects can be explained by the lag of the wave packets, when we take into account the source of the electromagnetic field which becomes entangled with the particle during the process .
I firmly believe that there is no action at a distance and that everything can be explained in local terms and entanglement which is the only nonlocal ingredient of Nature. In ,  , we analyzed the nonlocal features of the quantum formalism. In  I found a local explanation for the Aharonov-Bohm effect which opens the way to undo the half-century old revolution in understanding the role of potentials in physics. The general applicability of my result is, in my view, an important open problem .
Measurements of nonlocal variables
A and B are variables of two systems separated in space. The question is: which variables f(A,B) can, and which cannot be measured instantaneously in a nondemolition way? In  and  we showed that essentially, the only measurable variables are A+B and (A+B)modC. Thus, the product of local variables at different places is unmeasurable, while the Bell operator with maximally entangled states is measurable. In  I found that measurement of all nonlocal variables is possible, when we allow to destroy the eigenstates of the measured variable. This surprising result has a far reaching consequences in quantum information, including novel quantum cryptographic protocols.
Pseudo-telepathy quantum games
In  I proposed a game with an advantage of a quantum team of the type later called pseudo-telepathy. In  I proposed another game of this type. In  I argued that pseudo-telepathy games are the way to rule out local realistic theories.
Advantages of qubits versus bits
Although we need infinitely more information to specify a qubit relative to a bit, Holevo has shown that using a qubit we cannot transfer more information than using a bit. Using the idea of dense coding, with the help of an ancilla, we can gain a factor of 2. However, we found some specific tasks  and  in which qubits are exponentially more powerful than bits.
Error prevention method
Shor's error correction method requires 9 physical qubits to encode one qubit of information. More complicated schemes reduce the number of physical qubits to 5. In  we applied the Zeno effect to simplify the method. We use only 4 physical qubits and we do not need the correction process: the act of frequent measurements prevents the errors.
Cryptography with orthogonal states
In  we introduced a quantum method for secure key distribution which, unlike previous methods, does not rely on the no-cloning theorem. This became the basis for conceptually new protocols. It was apparently the first direct communication protocol, as well as the first relativistic quantum protocol.
Alice and Bob are equipped with a quantum channel. They want to gamble, but they do not trust each other. In  we showed how they can do this. It opened a new direction for quantum protocols. In particular, it was apparently the first quantum protocol for coin tossing.
Practically secure quantum bit commitment
After the celebrated discovery of the quantum secure key distribution method, it was claimed that one can make an unconditionally secure bit commitment. Entanglement allowed to break the security of this protoclol. In  we introduced a protocol whose security is based on current experimental limitations on nondemolition measurements and on the storage of quantum information. Each one of the limitations is enough for the security of our protocol. The protocol is very simple: any high-fidelity one-way quantum key distribution device can be used to implement it.
The bit commitment protocol  is the first work in which I took part in performing a real experiment. (The fidelity was hardly satisfactory and it should be repeated with a better equipment.) In  we were the first to suggest a concrete design of the weak measurement procedure. Recently, I joined a Chinese experimental team for analyzing their state of the art weak measurement experiment . But my first significant experimental work is the demonstration of the past of the photon , where I invented a new techniques: tagging the location of photons by adding disturbances with various frequencies, followed by a spectral analysis of the signal. The method proved to be very robust: we could see the effect which otherwise was screened by noise.
Development of the Many-Worlds Interpretation of Quantum Mechanics
I am arguably the strongest proponent of the many-worlds interpretation. In my view, it is by far the best approach to foundations of quantum theory because it removes randomness and action at a distance from physics. In  I provided the motivation, and in  ,  ,  , , and  I developed my version of the MWI. I am still working on it, in the hope of making it the leading interpretation of quantum mechanics.
Measure of existence of a world
In  I presented my main contribution to the MWI. I introduced the measure of existence of a world and the Born-Vaidman rule which specifies the probability of self location in a particular world. I refined it in  and . This solution of the probability problem of the MWI has been used in  for resolving the Sleeping Beauty problem, a hotly debated philosophical probability puzzle.
Analysis of the Ghirardi-Riminy-Weber-Pearle collapse proposal
In  we constructed a Stern-Gerlach experiment in which the GRWP model does not lead to a single outcome even when a macroscopic number of atoms evolve into a superposition of macroscopically different states, showing a weakness of their approach. On the other hand, in  I resolved the "tails problem" of the GRWP collapse model, by pointing out that "tail worlds" of GRWP are not only "tiny" in some sense, but also do not resemble the world we know.
Conditions for "surrealistic" trajectories in Bohmian mechanics
In , , and  we analyzed Bohmian trajectories of in various situations. We found that position detectors, characterized by slow robust recordings of the results, record trajectories which are very different from actual Bohmian trajectories.
Duality relation between path distinguishability and fringe visibility D2 +V2≤1
In  we derived a tight duality relation for particles in an interferometer. It provides a useful bound for practical applications. The relation also led to several conceptual claims regarding the particle-wave duality (which I do not necessarily support).
Aharonov-Vaidman Formula A Ψ = <A> Ψ + ΔAΨ⊥
In  we introduced this formula to simplify the calculation of the result of a weak measurement. In  and  it was applied for the simplest (to my knowledge) derivations of uncertainty relations and bounds on the speed of evolution of a quantum state.