Filters








1,622 Hits in 4.6 sec

Fidelity of quantum strategies with applications to cryptography [article]

Gus Gutoski and Ansis Rosmanis and Jamie Sikora
2018 arXiv   pre-print
We illustrate an operational interpretation of the strategy fidelity in the spirit of Uhlmann's Theorem and discuss its application to the security analysis of quantum protocols for interactive cryptographic  ...  We introduce a definition of the fidelity function for multi-round quantum strategies, which we call the strategy fidelity, that is a generalization of the fidelity function for quantum states.  ...  Research at the Centre for Quantum Technologies at the National University of Singapore is partially funded by the Singapore Ministry of Education and the National Research Foundation, also through the  ... 
arXiv:1704.04033v2 fatcat:6rx3lo7e5zfldo6pru7yumulwq

Fidelity of quantum strategies with applications to cryptography

Gus Gutoski, Ansis Rosmanis, Jamie Sikora
2018 Quantum  
We illustrate an operational interpretation of the strategy fidelity in the spirit of Uhlmann's Theorem and discuss its application to the security analysis of quantum protocols for interactive cryptographic  ...  We introduce a definition of the fidelity function for multi-round quantum strategies, which we call the strategy fidelity, that is a generalization of the fidelity function for quantum states.  ...  Research at the Centre for Quantum Technologies at the National University of Singapore is partially funded by the Singapore Ministry of Education and the National Research Foundation, also through the  ... 
doi:10.22331/q-2018-09-03-89 fatcat:rx4g2kqu6nexjegoqrtc7gs7ty

Fidelity of Quantum Strategies with Applications to Cryptography * † 1 Introduction 1.1 Review of quantum strategies

Gus Gutoski, Ansis Rosmanis, Jamie Sikora
1998 Phys-ical Sciences and Engineering CC-BY 12th Conference on the Theory of Quantum Computation, Communication, and Cryptography   unpublished
We illustrate an operational interpretation of the strategy fidelity in the spirit of Uhlmann's Theorem and discuss its application to the security analysis of quantum protocols for interactive cryptographic  ...  We introduce a definition of the fidelity function for multi-round quantum strategies, which we call the strategy fidelity, that is a generalization of the fidelity function for quantum states.  ...  We would like to construct a generalization of the fidelity function that can serve as a useful distance measure for quantum strategies. 8:4 Fidelity of Quantum Strategies with Applications to Cryptography  ... 
fatcat:q3w27szbizb4ncdtlhorjjxbme

Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits [article]

Saiful Islam Salim, Adnan Quaium, Sriram Chellappan, A. B. M. Alim Al Islam
2020 arXiv   pre-print
Focusing on this issue, we propose a method to enhance the fidelity of quantum cryptography using maximally entangled qubit pairs.  ...  However, with rapidly developing powerful quantum technologies, conventional cryptography techniques are becoming more prone to attacks each day.  ...  Findings and conclusions are those of the authors alone, and do not reflect views of NSF.  ... 
arXiv:2009.04155v1 fatcat:ob3cegitfvfqlbto3gih2iktby

Memory-built-in quantum cloning in a hybrid solid-state spin register

W.-B. Wang, C. Zu, L. He, W.-G. Zhang, L.-M. Duan
2015 Scientific Reports  
Copying of quantum states to memory qubits provides an important strategy for eavesdropping in quantum cryptography.  ...  We report an experiment that realizes cloning of quantum states from an electron spin to a nuclear spin in a hybrid solid-state spin register with near-optimal fidelity.  ...  Acknowledgements This work was supported by the National Basic Research Program of China 2011CBA00300 and the quantum information project from the Ministry of Education of China.  ... 
doi:10.1038/srep12203 pmid:26178617 pmcid:PMC4503958 fatcat:trabctbusbhz5ggvrzquuplzvy

Why quantum bit commitment and ideal quantum coin tossing are impossible

Hoi-Kwong Lo, H.F. Chau
1998 Physica D : Non-linear phenomena  
This no-go theorem for ideal quantum coin tossing may help to shed some lights on the possibility of non-ideal protocols.  ...  The cheating strategy generally requires a quantum computer.  ...  Acknowledgments Numerous helpful discussions with M. Ardehali  ... 
doi:10.1016/s0167-2789(98)00053-0 fatcat:5t2xzfw42jcmjoa7yxzouryfte

Front Matter, Table of Contents, Preface, Conference Organization

Mark M. Wilde, Marc Herbstritt
2018 Theory of Quantum Computation, Communication, and Cryptography  
, and Michele Mosca . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7:1-7:15 Fidelity of Quantum Strategies with Applications to Cryptography Gus Gutoski, Ansis Rosmanis, and Jamie Sikora  ...  Quantum Computation, Communication, and Cryptography was organized by the Université Pierre et Marie Curie and the Paris Centre for Quantum Computing from the 14th to the 16th of June 2017.Quantum computation  ... 
doi:10.4230/lipics.tqc.2017.0 dblp:conf/tqc/X17 fatcat:axresie5szbhlj7ti2h3fnxroa

Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels

David Deutsch, Artur Ekert, Richard Jozsa, Chiara Macchiavello, Sandu Popescu, Anna Sanpera
1996 Physical Review Letters  
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel.  ...  We introduce the concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel.  ...  We would like to thank A. Barenco  ... 
doi:10.1103/physrevlett.77.2818 pmid:10062053 fatcat:nurggnojbrgzfnmsg5hmecqgee

Secure Long-Distance Quantum Communication over Optical Fiber Quantum Channels [chapter]

Laszlo Gyongyosi, Sandor Imre
2012 Optical Fiber Communications and Devices  
In quantum cryptography Eve cannot clone the sent qubits perfectly, thus she has to use an ancilla quantum state, interact with the sent quantum state.  ...  The safety of quantum cryptography relies on the no-cloning theorem.  ...  198 Acknowledgment The authors would like to thank the financial support from "Sandor Csibi" Ph.D.  ... 
doi:10.5772/26976 fatcat:p6blq6mzyzhztcaxz7iih5hkhi

Noisy three-player dilemma game: Robustness of the quantum advantage [article]

Pranav Kairon, Kishore Thapliyal, R. Srikanth, Anirban Pathak
2020 arXiv   pre-print
Specifically, experimental fidelity and error are observed not to be properly anti correlated, i.e., there are instances where a class of experiments with higher fidelity yields a greater error in the  ...  Games involving quantum strategies often yield higher payoff.  ...  We hope the present results will be helpful in the application of quantum strategies in game theory, and in turn in their applications in quantum technologies in general, and quantum cryptography in particular  ... 
arXiv:2004.04533v1 fatcat:d6t5sgg6g5f5hlkqr33n5xkzyq

Preface [chapter]

M.D. Al-Amri, D.L. Andrews, M. Babiker
2021 Structured Light for Optical Communication  
Practical strategies to optimize the fidelity of data transmission are clearly of key significance for the advantages of using structured light to be fully secured.  ...  The main aim of this book is to highlight the wide-ranging principles, new frontiers, and applications in this rapidly evolving field.  ... 
doi:10.1016/b978-0-12-821510-4.00006-6 fatcat:3kbubriw4zc6dlfbyefeimhrfi

Optimal Eavesdropping in Cryptography with Three-Dimensional Quantum States

D. Bruß, C. Macchiavello
2002 Physical Review Letters  
We generalize the according eavesdropping transformation to arbitrary dimensions, and discuss the connection with optimal quantum cloning.  ...  We study optimal eavesdropping in quantum cryptography with three-dimensional systems, and show that this scheme is more secure than protocols using two-dimensional states.  ...  -a Quantum cryptography, as first suggested by Bennett and Brassard (BB84) [1] , is the experimentally most advanced application of quantum information processing.  ... 
doi:10.1103/physrevlett.88.127901 pmid:11909501 fatcat:gptcwgxvizbafhw27iuqzcopli

Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis

L.-P. Lamoureux, H. Bechmann-Pasquinucci, N. J. Cerf, N. Gisin, C. Macchiavello
2006 Physical Review A. Atomic, Molecular, and Optical Physics  
A measured 3.3 % quantum bit error rate and a relative contrast loss of 8.4 % allow a 0.49 bit/pulse advantage to Bob.  ...  Time coding quantum key distribution with coherent faint pulses is experimentally demonstrated.  ...  ACKNOWLEDGMENTS The authors acknowledge financial support from the Action de Recherche Concertée de la Communauté Française de Belgique, from the IUAP program of the Belgian Federal Government under Grant  ... 
doi:10.1103/physreva.73.032304 fatcat:3dpi2wweq5hnzhmkfmiekhysrq

Insecurity of Quantum Secure Computations [article]

Hoi-Kwong Lo
1996 arXiv   pre-print
As corollaries to my results, quantum one-way oblivious password identification and the so-called quantum one-out-of-two oblivious transfer are impossible.  ...  Nevertheless, quantum cryptography remains useful in key distribution and can still provide partial security in "quantum money" proposed by Wiesner.  ...  In this paper I am, however, concerned with another class of applications of quantum cryptography-the protection of private information during public decision [8, 9] .  ... 
arXiv:quant-ph/9611031v1 fatcat:53incwxiurfavnou5eao4cpiny

Geometrical analysis of physically allowed quantum cloning transformations for quantum cryptography

Laszlo Gyongyosi, Sandor Imre
2014 Information Sciences  
The safety of quantum cryptography relies on the no-cloning theorem.  ...  Our method uses Delaunay tessellation and convex hull calculation, with respect to quantum relative entropy as distance measure.  ...  Attacks in Quantum Cryptography The incoherent quantum cloning based attack is the eavesdropper's most general strategy [8, 9] , thus in our geometrical based security analysis, we use the incoherent  ... 
doi:10.1016/j.ins.2014.07.010 fatcat:as5sbg3t4remtcxiojjwmsdtlm
« Previous Showing results 1 — 15 out of 1,622 results