Search results for "QUANTUM CRYPTOGRAPHY"

showing 10 items of 11 documents

Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding

2014

Quantum zero-knowledge proofs and quantum proofs of knowledge are inherently difficult to analyze because their security analysis uses rewinding. Certain cases of quantum rewinding are handled by the results by Watrous (SIAM J Comput, 2009) and Unruh (Eurocrypt 2012), yet in general the problem remains elusive. We show that this is not only due to a lack of proof techniques: relative to an oracle, we show that classically secure proofs and proofs of knowledge are insecure in the quantum setting. More specifically, sigma-protocols, the Fiat-Shamir construction, and Fischlin's proof system are quantum insecure under assumptions that are sufficient for classical security. Additionally, we show…

FOS: Computer and information sciencesQuantum PhysicsQuantum networkComputer Science - Cryptography and SecurityTheoretical computer scienceFOS: Physical sciencesQuantum capacityQuantum cryptographyQuantum error correctionQuantum algorithmQuantum informationQuantum Physics (quant-ph)Cryptography and Security (cs.CR)Quantum computerQuantum complexity theoryMathematicsComputer Science::Cryptography and Security
researchProduct

Universal N -Partite d -Level Pure-State Entanglement Witness Based on Realistic Measurement Settings

2019

Entanglement witnesses are operators that are crucial for confirming the generation of specific quantum systems, such as multipartite and high-dimensional states. For this reason, many witnesses have been theoretically derived which commonly focus on establishing tight bounds and exhibit mathematical compactness as well as symmetry properties similar to that of the quantum state. However, for increasingly complex quantum systems, established witnesses have lacked experimental achievability, as it has become progressively more challenging to design the corresponding experiments. Here, we present a universal approach to derive entanglement witnesses that are capable of detecting the presence …

MultipartiteQuantum cryptographyQuantum state0103 physical sciencesQuantum systemGeneral Physics and AstronomyQuantum entanglementStatistical physics010306 general physics01 natural sciencesQuantumEntanglement witnessQuantum computerPhysical Review Letters
researchProduct

Entanglement transfer, accumulation and retrieval via quantum-walk-based qubit-qudit dynamics

2020

The generation and control of quantum correlations in high-dimensional systems is a major challenge in the present landscape of quantum technologies. Achieving such non-classical high-dimensional resources will potentially unlock enhanced capabilities for quantum cryptography, communication and computation. We propose a protocol that is able to attain entangled states of $d$-dimensional systems through a quantum-walk-based {\it transfer \& accumulate} mechanism involving coin and walker degrees of freedom. The choice of investigating quantum walks is motivated by their generality and versatility, complemented by their successful implementation in several physical systems. Hence, given t…

Physical systemGeneral Physics and AstronomyFOS: Physical sciencesQuantum entanglementPhysics and Astronomy(all)Topology01 natural sciences010305 fluids & plasmasquantum information/dk/atira/pure/subjectarea/asjc/31000103 physical sciencesquantum walksQuantum walkentanglement accumulationQuantum information010306 general physicsQuantumPhysicsQuantum Physicsentanglement accumulation; entanglement transfer; high-dimensional entanglement; quantum walksTheoryofComputation_GENERALentanglement transferQuantum technologyQuantum cryptographyQubitentanglement transfer; entanglement accumulation; high-dimensional entanglement; quantum walksQuantum Physics (quant-ph)entanglementhigh-dimensional entanglement
researchProduct

Entanglement swapping in a Franson interferometer setup

2007

We propose a simple scheme to swap the non local correlations, characteristic of a Franson interferometric setup, between pairs of frequency entangled photons emitted by distinct non linear crystals in a parametric down conversion process. Our scheme consists of two distinct sources of frequency entangled photons. One photon of each pair is sent to a separate Mach - Zender interferometer while the other photons of the pairs are mixed by a beam splitter and then detected in a Ou - Mandel interferometer. For suitably postselected joint measuremetns, the photons sent at the Mach -Zender show a coincidence photocount statistics which depends non locally on the settings of the two interferometer…

PhysicsINTERFERENCEQuantum PhysicsPhotonbusiness.industryFOS: Physical sciencesPhysics::OpticsQuantum entanglementQuantum PhysicsAtomic and Molecular Physics and OpticsCoincidencelaw.inventionInterferometryOpticsPhoton entanglementSpontaneous parametric down-conversionlawAstronomical interferometerQUANTUM CRYPTOGRAPHYbusinessQuantum Physics (quant-ph)2-PHOTON INTERFEROMETRYBeam splitter
researchProduct

Entanglement Swapping between Discrete and Continuous Variables

2014

We experimentally realize "hybrid" entanglement swapping between discrete-variable (DV) and continuous-variable (CV) optical systems. DV two-mode entanglement as obtainable from a single photon split at a beam splitter is robustly transferred by means of efficient CV entanglement and operations, using sources of squeezed light and homodyne detections. The DV entanglement after the swapping is verified without post-selection by the logarithmic negativity of up to 0.28$\pm$0.01. Furthermore, our analysis shows that the optimally transferred state can be post-selected into a highly entangled state that violates a Clauser-Horne-Shimony-Holt inequality by more than four standard deviations, and …

PhysicsQuantum PhysicsFOS: Physical sciencesGeneral Physics and AstronomyQuantum PhysicsQuantum entanglementSquashed entanglementMultipartite entanglementQuantum cryptographyPostselectionQuantum mechanicsQuantum Physics (quant-ph)Quantum information scienceQuantum teleportationSqueezed coherent statePhysical Review Letters
researchProduct

Quantum repeaters and quantum key distribution: analysis of secret key rates

2012

We analyze various prominent quantum repeater protocols in the context of long-distance quantum key distribution. These protocols are the original quantum repeater proposal by Briegel, D\"ur, Cirac and Zoller, the so-called hybrid quantum repeater using optical coherent states dispersively interacting with atomic spin qubits, and the Duan-Lukin-Cirac-Zoller-type repeater using atomic ensembles together with linear optics and, in its most recent extension, heralded qubit amplifiers. For our analysis, we investigate the most important experimental parameters of every repeater component and find their minimally required values for obtaining a nonzero secret key. Additionally, we examine in det…

PhysicsQuantum networkQuantum PhysicsFOS: Physical sciencesQuantum entanglementQuantum PhysicsQuantum key distributionTopologyAtomic and Molecular Physics and OpticsQuantum technologyOpen quantum systemQuantum cryptographyQuantum mechanicsQubitQuantum Physics (quant-ph)Quantum information science
researchProduct

Eavesdropping on quantum-cryptographical systems

1994

Quantum cryptography cannot prevent eavesdropping, but any eavesdropping attempt can be detected by the legitimate users of the communication channel. This is because eavesdropping affects the quantum state of the information carriers and results in an abnormal error rate. In this paper, we analyze various eavesdropping techniques, which may be either translucent or opaque to the transmitted photons, and we estimate the error rate above which the key distribution is deemed unsafe and should be abandoned. © 1994 The American Physical Society.

PhysicsQuantum networkQuantum cryptographyQuantum mechanicsEavesdroppingQuantumAtomic and Molecular Physics and OpticsPhysical Review A
researchProduct

Quantum Security Proofs Using Semi-classical Oracles

2019

We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.

Provable securityFlexibility (engineering)Post-quantum cryptographyTheoretical computer scienceComputer sciencebusiness.industry0102 computer and information sciences02 engineering and technologyMathematical proofEncryption01 natural sciencesPublic-key cryptographyUnruh effect010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringParallelism (grammar)020201 artificial intelligence & image processingbusiness
researchProduct

A single photon source based on NV centers in diamond nanocrystals

2009

The development of reliable devices to generate single photons is crucial for applications in quantum cryptography, as well as for fundamental quantum optics experiments. Due to their extremely high photostability at room temperature, optically active defects in solids, the so called color centers, are among the most promising candidates. Single NV(nitrogen-vacancy) centers in diamond have been demonstrated to be able to generate single photons and have already shown advantages compared to attenuated laser pulses in a quantum cryptography experiment [1]. The nitrogen-vacancy center (NV center) in diamond consists of a substitutional nitrogen atom and an adjacent vacancy. This complex exhibi…

Quantum opticsMaterials sciencePhotonbusiness.industryDiamondengineering.materialLaserlaw.inventionQuantum cryptographylawSingle-photon sourceengineeringOptoelectronicsPhotonicsbusinessNitrogen-vacancy center
researchProduct

Non-commutative Ring Learning with Errors from Cyclic Algebras

2022

AbstractThe Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. However, schemes based on LWE are often impractical, so Ring LWE was introduced as a form of ‘structured’ LWE, trading off a hard to quantify loss of security for an increase in efficiency by working over a well-chosen ring. Another popular variant, Module LWE, generalizes this exchange by implementing a module structure over a ring. In this work, we introduce a novel variant of LWE over cyclic algebras (CLWE) to replicate the addition of the ring structure taking LWE to Ring LWE by add…

algebraic number theorylukuteoriaApplied Mathematicsparantaminen (paremmaksi muuttaminen)algebrapost-quantum cryptographykryptografiaComputer Science Applicationsnon-commutative algebralatticessalausvirheetvirheanalyysiSoftwarelearning with errorstietojärjestelmätJournal of Cryptology
researchProduct