Search results for "QUANTUM CRYPTOGRAPHY"
showing 10 items of 11 documents
Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding
2014
Quantum zero-knowledge proofs and quantum proofs of knowledge are inherently difficult to analyze because their security analysis uses rewinding. Certain cases of quantum rewinding are handled by the results by Watrous (SIAM J Comput, 2009) and Unruh (Eurocrypt 2012), yet in general the problem remains elusive. We show that this is not only due to a lack of proof techniques: relative to an oracle, we show that classically secure proofs and proofs of knowledge are insecure in the quantum setting. More specifically, sigma-protocols, the Fiat-Shamir construction, and Fischlin's proof system are quantum insecure under assumptions that are sufficient for classical security. Additionally, we show…
Universal N -Partite d -Level Pure-State Entanglement Witness Based on Realistic Measurement Settings
2019
Entanglement witnesses are operators that are crucial for confirming the generation of specific quantum systems, such as multipartite and high-dimensional states. For this reason, many witnesses have been theoretically derived which commonly focus on establishing tight bounds and exhibit mathematical compactness as well as symmetry properties similar to that of the quantum state. However, for increasingly complex quantum systems, established witnesses have lacked experimental achievability, as it has become progressively more challenging to design the corresponding experiments. Here, we present a universal approach to derive entanglement witnesses that are capable of detecting the presence …
Entanglement transfer, accumulation and retrieval via quantum-walk-based qubit-qudit dynamics
2020
The generation and control of quantum correlations in high-dimensional systems is a major challenge in the present landscape of quantum technologies. Achieving such non-classical high-dimensional resources will potentially unlock enhanced capabilities for quantum cryptography, communication and computation. We propose a protocol that is able to attain entangled states of $d$-dimensional systems through a quantum-walk-based {\it transfer \& accumulate} mechanism involving coin and walker degrees of freedom. The choice of investigating quantum walks is motivated by their generality and versatility, complemented by their successful implementation in several physical systems. Hence, given t…
Entanglement swapping in a Franson interferometer setup
2007
We propose a simple scheme to swap the non local correlations, characteristic of a Franson interferometric setup, between pairs of frequency entangled photons emitted by distinct non linear crystals in a parametric down conversion process. Our scheme consists of two distinct sources of frequency entangled photons. One photon of each pair is sent to a separate Mach - Zender interferometer while the other photons of the pairs are mixed by a beam splitter and then detected in a Ou - Mandel interferometer. For suitably postselected joint measuremetns, the photons sent at the Mach -Zender show a coincidence photocount statistics which depends non locally on the settings of the two interferometer…
Entanglement Swapping between Discrete and Continuous Variables
2014
We experimentally realize "hybrid" entanglement swapping between discrete-variable (DV) and continuous-variable (CV) optical systems. DV two-mode entanglement as obtainable from a single photon split at a beam splitter is robustly transferred by means of efficient CV entanglement and operations, using sources of squeezed light and homodyne detections. The DV entanglement after the swapping is verified without post-selection by the logarithmic negativity of up to 0.28$\pm$0.01. Furthermore, our analysis shows that the optimally transferred state can be post-selected into a highly entangled state that violates a Clauser-Horne-Shimony-Holt inequality by more than four standard deviations, and …
Quantum repeaters and quantum key distribution: analysis of secret key rates
2012
We analyze various prominent quantum repeater protocols in the context of long-distance quantum key distribution. These protocols are the original quantum repeater proposal by Briegel, D\"ur, Cirac and Zoller, the so-called hybrid quantum repeater using optical coherent states dispersively interacting with atomic spin qubits, and the Duan-Lukin-Cirac-Zoller-type repeater using atomic ensembles together with linear optics and, in its most recent extension, heralded qubit amplifiers. For our analysis, we investigate the most important experimental parameters of every repeater component and find their minimally required values for obtaining a nonzero secret key. Additionally, we examine in det…
Eavesdropping on quantum-cryptographical systems
1994
Quantum cryptography cannot prevent eavesdropping, but any eavesdropping attempt can be detected by the legitimate users of the communication channel. This is because eavesdropping affects the quantum state of the information carriers and results in an abnormal error rate. In this paper, we analyze various eavesdropping techniques, which may be either translucent or opaque to the transmitted photons, and we estimate the error rate above which the key distribution is deemed unsafe and should be abandoned. © 1994 The American Physical Society.
Quantum Security Proofs Using Semi-classical Oracles
2019
We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.
A single photon source based on NV centers in diamond nanocrystals
2009
The development of reliable devices to generate single photons is crucial for applications in quantum cryptography, as well as for fundamental quantum optics experiments. Due to their extremely high photostability at room temperature, optically active defects in solids, the so called color centers, are among the most promising candidates. Single NV(nitrogen-vacancy) centers in diamond have been demonstrated to be able to generate single photons and have already shown advantages compared to attenuated laser pulses in a quantum cryptography experiment [1]. The nitrogen-vacancy center (NV center) in diamond consists of a substitutional nitrogen atom and an adjacent vacancy. This complex exhibi…
Non-commutative Ring Learning with Errors from Cyclic Algebras
2022
AbstractThe Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. However, schemes based on LWE are often impractical, so Ring LWE was introduced as a form of ‘structured’ LWE, trading off a hard to quantify loss of security for an increase in efficiency by working over a well-chosen ring. Another popular variant, Module LWE, generalizes this exchange by implementing a module structure over a ring. In this work, we introduce a novel variant of LWE over cyclic algebras (CLWE) to replicate the addition of the ring structure taking LWE to Ring LWE by add…