-
Noise characterization for co-propagation of classical and CV-QKD signals over fiber and free-space link
Authors:
João dos Reis Frazão,
Vincent van Vliet,
Kadir Gümüş,
Menno van den Hout,
Sjoerd van der Heide,
Aaron Albores-Mejia,
Boris Škorić,
Chigo Okonkwo
Abstract:
Real-time CV-QKD receiver achieves peak 2.9 Mbit/s secret-key-rates over 12.8 km of fiber, while co-propagating 15 classical channels, separated 1 nm from the quantum signal. Performance degrades at higher launch powers due to crosstalk.
Real-time CV-QKD receiver achieves peak 2.9 Mbit/s secret-key-rates over 12.8 km of fiber, while co-propagating 15 classical channels, separated 1 nm from the quantum signal. Performance degrades at higher launch powers due to crosstalk.
△ Less
Submitted 25 April, 2024;
originally announced June 2024.
-
Implementation of Entropically Secure Encryption: Securing Personal Health Data
Authors:
Mehmet Hüseyin Temel,
Boris Skoric,
Idelfonso Tafur Monroy
Abstract:
Entropically Secure Encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. In this paper, we present the first implementation of ESE for bulk encryption. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. We have implemented polynomial mul…
▽ More
Entropically Secure Encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. In this paper, we present the first implementation of ESE for bulk encryption. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. We have implemented polynomial multiplication based on the gf2x library, with some modifications that avoid inputs of vastly different length, thus improving speed. Additionally, we have implemented a recently proposed efficient reduction algorithm that works for any polynomial degree. We investigate two use cases: X-ray images of patients and human genome data. We conduct entropy estimation using compression methods whose results determine the key lengths required for ESE. We report running times for all steps of the encryption. We discuss the potential of ESE to be used in conjunction with Quantum Key Distribution (QKD), in order to achieve full information-theoretic security of QKD-protected links for these use cases.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Continuous-variable Quantum Position Verification secure against entangled attackers
Authors:
Rene Allerstorfer,
Llorenç Escolà-Farràs,
Arpan Akash Ray,
Boris Skoric,
Florian Speelman
Abstract:
Motivated by the fact that coherent states may offer practical advantages it was recently shown that a continuous-variable (CV) quantum position verification (QPV) protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement. In the discrete-variable (DV) analogue of that protocol it was shown that modifying how the classical input informa…
▽ More
Motivated by the fact that coherent states may offer practical advantages it was recently shown that a continuous-variable (CV) quantum position verification (QPV) protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement. In the discrete-variable (DV) analogue of that protocol it was shown that modifying how the classical input information is sent from the verifiers to the prover leads to a favourable scaling in the resource requirements for a quantum attack. In this work, we show that similar conclusions can be drawn for CV-QPV. By adding extra classical information of size $n$ to a CV-QPV protocol, we show that the protocol, which uses a coherent state and classical information, remains secure, even if the quantum information travels arbitrarily slow, against attackers who pre-share CV (entangled) states with a linear (in $n$) cutoff at the photon number. We show that the protocol remains secure for certain attenuation and excess noise.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Average entropy of Gaussian mixtures
Authors:
Basheer Joudeh,
Boris Škorić
Abstract:
We calculate the average differential entropy of a $q$-component Gaussian mixture in $\mathbb R^n$. For simplicity, all components have covariance matrix $σ^2 {\mathbf 1}$, while the means $\{\mathbf{W}_i\}_{i=1}^{q}$ are i.i.d. Gaussian vectors with zero mean and covariance $s^2 {\mathbf 1}$. We obtain a series expansion in $μ=s^2/σ^2$ for the average differential entropy up to order…
▽ More
We calculate the average differential entropy of a $q$-component Gaussian mixture in $\mathbb R^n$. For simplicity, all components have covariance matrix $σ^2 {\mathbf 1}$, while the means $\{\mathbf{W}_i\}_{i=1}^{q}$ are i.i.d. Gaussian vectors with zero mean and covariance $s^2 {\mathbf 1}$. We obtain a series expansion in $μ=s^2/σ^2$ for the average differential entropy up to order $\mathcal{O}(μ^2)$, and we provide a recipe to calculate higher order terms. Our result provides an analytic approximation with a quantifiable order of magnitude for the error, which is not achieved in previous literature.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Continuous-Variable QKD with key rates far above Devetak-Winter
Authors:
Arpan Akash Ray,
Boris Skoric
Abstract:
Continuous-Variable Quantum Key Distribution (CVQKD) at large distances has such high noise levels that the employed error-correcting codes must have very low rate. In this regime it becomes feasible to implement random-codebook error correction, which is known to perform close to capacity. We propose a random-codebook reverse reconciliation scheme for CVQKD that is inspired by spread-spectrum wat…
▽ More
Continuous-Variable Quantum Key Distribution (CVQKD) at large distances has such high noise levels that the employed error-correcting codes must have very low rate. In this regime it becomes feasible to implement random-codebook error correction, which is known to perform close to capacity. We propose a random-codebook reverse reconciliation scheme for CVQKD that is inspired by spread-spectrum watermarking. Our scheme has a novel way of achieving statistical decoupling between the publicly sent reconciliation data and the secret key. We provide a theoretical analysis of the secret key rate and we present numerical results. The best performance is obtained when the message size exceeds the mutual information I(X;Y) between Alice and Bob's measurements. This somewhat counter-intuitive result is understood from a tradeoff between code rate and frame rejection rate, combined with the fact that error correction for QKD needs to reconcile only random data. We obtain secret key lengths that lie far above the Devetak-Winter value I(X;Y)-I(E;Y).
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Co-propagation of Classical and Continuous-variable QKD Signals over a Turbulent Optical Channel with a Real-time QKD Receiver
Authors:
João dos Reis Frazão,
Vincent van Vliet,
Sjoerd van der Heide,
Menno van den Hout,
Kadir Gümüş,
Aaron Albores-Mejía,
Boris Škorić,
Chigo Okonkwo
Abstract:
We demonstrate classical and quantum signal co-propagation over a turbulent free-space channel with 3 Tbit/s throughput and record 2.7 Mbit/s secret-key rate. Our real-time GPU-based receiver assessed quantum signal integrity under different turbulence scenarios for the first time.
We demonstrate classical and quantum signal co-propagation over a turbulent free-space channel with 3 Tbit/s throughput and record 2.7 Mbit/s secret-key rate. Our real-time GPU-based receiver assessed quantum signal integrity under different turbulence scenarios for the first time.
△ Less
Submitted 19 January, 2024;
originally announced January 2024.
-
Security of a Continuous-Variable based Quantum Position Verification Protocol
Authors:
Rene Allerstorfer,
Llorenç Escolà-Farràs,
Arpan Akash Ray,
Boris Škorić,
Florian Speelman,
Philip Verduyn Lunel
Abstract:
In this work we study quantum position verification with continuous-variable quantum states. In contrast to existing discrete protocols, we present and analyze a protocol that utilizes coherent states and its properties. Compared to discrete-variable photonic states, coherent states offer practical advantages since they can be efficiently prepared and manipulated with current technology. We prove…
▽ More
In this work we study quantum position verification with continuous-variable quantum states. In contrast to existing discrete protocols, we present and analyze a protocol that utilizes coherent states and its properties. Compared to discrete-variable photonic states, coherent states offer practical advantages since they can be efficiently prepared and manipulated with current technology. We prove security of the protocol against any unentangled attackers via entropic uncertainty relations, showing that the adversary has more uncertainty than the honest prover about the correct response as long as the noise in the quantum channel is below a certain threshold. Additionally, we show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
△ Less
Submitted 8 August, 2023;
originally announced August 2023.
-
A simpler security proof for 6-state quantum key distribution
Authors:
Kaan Akyuz,
Boris Skoric
Abstract:
Six-state Quantum Key Distribution (QKD) achieves the highest key rate in the class of qubit-based QKD schemes. The standard security proof, which has been developed since 2005, invokes complicated theorems involving smooth Renyi entropies. In this paper we present a simpler security proof for 6-state QKD that entirely avoids Renyi entropies. This is achieved by applying state smoothing directly i…
▽ More
Six-state Quantum Key Distribution (QKD) achieves the highest key rate in the class of qubit-based QKD schemes. The standard security proof, which has been developed since 2005, invokes complicated theorems involving smooth Renyi entropies. In this paper we present a simpler security proof for 6-state QKD that entirely avoids Renyi entropies. This is achieved by applying state smoothing directly in the Bell basis. We furthermore show that the same proof technique can be used for 6-state quantum key recycling.
△ Less
Submitted 6 May, 2023;
originally announced May 2023.
-
Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications
Authors:
E. Marakis,
U. Rührmair,
M. Lachner,
R. Uppu,
B. Škorić,
P. W. H. Pinkse
Abstract:
Physical unclonable functions (PUFs), physical objects that are practically unclonable because of their andom and uncontrollable manufacturing variations, are becoming increasingly popular as security primitives and unique identifiers in a fully digitized world. One of the central PUF premises states that both friends and foes, both legitimate manufacturers and external attackers alike, cannot clo…
▽ More
Physical unclonable functions (PUFs), physical objects that are practically unclonable because of their andom and uncontrollable manufacturing variations, are becoming increasingly popular as security primitives and unique identifiers in a fully digitized world. One of the central PUF premises states that both friends and foes, both legitimate manufacturers and external attackers alike, cannot clone a PUF, producing two instances that are the same. Using the latest nanofabrication techniques, we show that this premise is not always met: We demonstrate the possibility of effective PUF duplication through sophisticated manufacturers by producing 63 copies of a non-trivial optical scattering structure which exhibit essentially the same scattering behavior. The remaining minuscule differences are close to or below noise levels, whence the duplicates have to be considered fully equivalent from a PUF perspective. The possibility for manufacturer-based optical PUF duplication has positive and negative consequences at the same time: While fully breaking the security of certain schemes, it enables new applications, too. For example, it facilitates unforgeable labels for valuable items; the first key-free group identification schemes over digital networks; or new types of encryption/decryption devices that do not contain secret keys.
△ Less
Submitted 23 December, 2022;
originally announced December 2022.
-
Collusion-resistant fingerprinting of parallel content channels
Authors:
Basheer Joudeh,
Boris Škorić
Abstract:
The fingerprinting game is analysed when the coalition size $k$ is known to the tracer, but the colluders can distribute themselves across $L$ TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely rela…
▽ More
The fingerprinting game is analysed when the coalition size $k$ is known to the tracer, but the colluders can distribute themselves across $L$ TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely related to the fingerprinting capacity. For the binary alphabet case under the marking assumption, and the restriction of access to one TV channel per person per segment, we derive the asymptotic behavior of the payoff functional. We find that the value of the maximin game for our payoff is asymptotically equal to $L^2/k^2 2 \ln 2$, with optimal strategy for the tracer being the arcsine distribution, and for the coalition being the interleaving attack across all TV channels, as well as assigning an equal number of colluders across the $L$ TV channels.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
Entropically secure encryption with faster key expansion
Authors:
Mehmet Huseyin Temel,
Boris Skoric
Abstract:
Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a certain sense circumventing Shannon's result that perfect encryption requires the key to be at least as long as the entropy of the plaintext. Entropically secure encryption is not perfect, and it works only if a lower bound is known on the entropy of the pl…
▽ More
Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a certain sense circumventing Shannon's result that perfect encryption requires the key to be at least as long as the entropy of the plaintext. Entropically secure encryption is not perfect, and it works only if a lower bound is known on the entropy of the plaintext. The typical implementation is to expand the short key to the size of the plaintext, e.g. by multiplication with a public random string, and then use one-time pad encryption. This works in the classical as well as the quantum setting. In this paper, we introduce a new key expansion method that is faster than existing ones. We prove that it achieves the same security. The speed gain is most notable when the key length is a sizeable fraction of the message length. In particular, a factor of 2 is gained in the case of approximate randomization of quantum states.
△ Less
Submitted 23 October, 2022; v1 submitted 1 January, 2022;
originally announced January 2022.
-
Diagrammatic security proof for 8-state encoding
Authors:
Boris Skoric,
Zef Wolffs
Abstract:
Dirac notation is the most common way to describe quantum states and operations on states. It is very convenient and allows for quick visual distinction between vectors, scalars and operators. For quantum processes that involve interactions of multiple systems an even better visualisation has been proposed by Coecke and Kissinger, in the form of a diagrammatic formalism [CK2017]. Their notation ex…
▽ More
Dirac notation is the most common way to describe quantum states and operations on states. It is very convenient and allows for quick visual distinction between vectors, scalars and operators. For quantum processes that involve interactions of multiple systems an even better visualisation has been proposed by Coecke and Kissinger, in the form of a diagrammatic formalism [CK2017]. Their notation expresses formulas in the form of diagrams, somewhat similar to Feynman diagrams, and is more general than the circuit notation for quantum computing.
This document consists of two parts. (1) We give a brief summary of the diagrammatic notation of quantum processes, tailored to readers who already know quantum physics and are not interested in general process theory. For this audience our summary is less daunting than the encyclopaedic book by Coecke and Kissinger [CK2017], and on the other hand more accessible than the ultra-compact introduction of [KTW2017]. We deviate a somewhat from [CK2017,KTW2017] in that we do not assume basis states to equal their own complex conjugate; this means that we do not use symmetric notation for basis states, and it leads us to explicitly show arrows on wires where they are usually omitted.
(2) We extend the work of Kissinger, Tull and Westerbaan [KTW2017] which gives a diagrammatic security proof for BB84 and 6-state Quantum Key Distribution. Their proof is based on a sequence of diagrammatic manipulations that works when the bases used in the protocol are mutually unbiased. We extend this result to 8-state encoding, which has been proposed as a tool in quantum key recycling protocols [SdV2017,LS2018], and which does not have mutually unbiased bases.
△ Less
Submitted 2 March, 2021;
originally announced March 2021.
-
Optimization of the Variational Quantum Eigensolver for Quantum Chemistry Applications
Authors:
R. J. P. T. de Keijzer,
V. E. Colussi,
B. Škorić,
S. J. J. M. F. Kokkelmans
Abstract:
This work studies the variational quantum eigensolver algorithm, designed to determine the ground state of a quantum mechanical system by combining classical and quantum hardware. Methods of reducing the number of required qubit manipulations, prone to induce errors, for the variational quantum eigensolver are studied. We formally justify the qubit removal process as sketched by Bravyi, Gambetta,…
▽ More
This work studies the variational quantum eigensolver algorithm, designed to determine the ground state of a quantum mechanical system by combining classical and quantum hardware. Methods of reducing the number of required qubit manipulations, prone to induce errors, for the variational quantum eigensolver are studied. We formally justify the qubit removal process as sketched by Bravyi, Gambetta, Mezzacapo and Temme [arXiv:1701.08213 (2017)]. Furthermore, different classical optimization and entangling methods, both gate based and native, are surveyed by computing ground state energies of H$_2$ and LiH. This paper aims to provide performance-based recommendations for entangling methods and classical optimization methods. Analyzing the VQE problem is complex, where the optimization algorithm, the method of entangling, and the dimensionality of the search space all interact. In specific cases however, concrete results can be shown, and an entangling method or optimization algorithm can be recommended over others. In particular we find that for high dimensionality (many qubits and/or entanglement depth) certain classical optimization algorithms outperform others in terms of energy error.
△ Less
Submitted 28 February, 2022; v1 submitted 2 February, 2021;
originally announced February 2021.
-
Quantum digital signatures with smaller public keys
Authors:
Boris Skoric
Abstract:
We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. The public keys are fingerprinting states, just as in the scheme of Gottesman and Chuang, but we allow for multiple ways to reveal the private key partially. The effect of this modification is a reduction of the number of qubits expended per message bit. We give a security proof and we present numer…
▽ More
We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. The public keys are fingerprinting states, just as in the scheme of Gottesman and Chuang, but we allow for multiple ways to reveal the private key partially. The effect of this modification is a reduction of the number of qubits expended per message bit. We give a security proof and we present numerical results that show how the improvement in public key size depends on the message length.
△ Less
Submitted 23 May, 2021; v1 submitted 31 December, 2020;
originally announced December 2020.
-
Two-way Unclonable Encryption with a vulnerable sender
Authors:
Daan Leermakers,
Boris Skoric
Abstract:
Unclonable Encryption, introduced by Gottesman in 2003, is a quantum protocol that guarantees the secrecy of a successfully transferred classical message even when all keys leak at a later time. We propose an Unclonable Encryption protocol with the additional property that the sender's key material is allowed to leak even in the case of an unsuccessful run. This extra feature makes it possible to…
▽ More
Unclonable Encryption, introduced by Gottesman in 2003, is a quantum protocol that guarantees the secrecy of a successfully transferred classical message even when all keys leak at a later time. We propose an Unclonable Encryption protocol with the additional property that the sender's key material is allowed to leak even in the case of an unsuccessful run. This extra feature makes it possible to achieve secure quantum encryption even when one of the parties is unable to protect its keys against after-protocol theft. Such an asymmetry occurs e.g. in case of server-client scenarios, where the client device is resource-constrained and/or located in a hostile environment.
Our protocol makes use of a bidirectional quantum channel in a manner similar to the two-way protocol LM05. Bob sends random qubit states to Alice. Alice flips the states in a way that depends on the message and a shared key, and sends the resulting states back to Bob. Bob recovers Alice's message by measuring the flips. We prove that our protocol satisfies the definition of unclonable encryption and additionally that the message remains secure even if all of Alice's keys leak after the protocol. Furthermore, we show that some of the key material can be safely re-used. Our security proof is formulated in terms of diamond norms, which makes it composable, and allows for noisy quantum channels. We work out the details only for the asymptotics in the limit of long messages.
As a side result we construct a two-way QKD scheme with a high key rate. We show that its key rate is higher than the rate of the two-way QKD scheme LM05 proven for the case of independent channel noise.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees
Authors:
Milan Lopuhaä-Zwakenberg,
Haochen Tong,
Boris Škorić
Abstract:
In the Open Data approach, governments and other public organisations want to share their datasets with the public, for accountability and to support participation. Data must be opened in such a way that individual privacy is safeguarded. The Privacy Funnel is a mathematical approach that produces a sanitised database that does not leak private data beyond a chosen threshold. The downsides to this…
▽ More
In the Open Data approach, governments and other public organisations want to share their datasets with the public, for accountability and to support participation. Data must be opened in such a way that individual privacy is safeguarded. The Privacy Funnel is a mathematical approach that produces a sanitised database that does not leak private data beyond a chosen threshold. The downsides to this approach are that it does not give worst-case privacy guarantees, and that finding optimal sanitisation protocols can be computationally prohibitive. We tackle these problems by using differential privacy metrics, and by considering local protocols which operate on one entry at a time. We show that under both the Local Differential Privacy and Local Information Privacy leakage metrics, one can efficiently obtain optimal protocols. Furthermore, Local Information Privacy is both more closely aligned to the privacy requirements of the Privacy Funnel scenario, and more efficiently computable. We also consider the scenario where each user has multiple attributes, for which we define Side-channel Resistant Local Information Privacy, and we give efficient methods to find protocols satisfying this criterion while still offering good utility. Finally, we introduce Conditional Reporting, an explicit LIP protocol that can be used when the optimal protocol is infeasible to compute, and we test this protocol on real-world and synthetic data. Experiments on real-world and synthetic data confirm the validity of these methods.
△ Less
Submitted 30 August, 2020;
originally announced August 2020.
-
Can't Touch This: unconditional tamper evidence from short keys
Authors:
Bart van der Vecht,
Xavier Coiteux-Roy,
Boris Skoric
Abstract:
Storing data on an external server with information-theoretic security, while using a key shorter than the data itself, is impossible. As an alternative, we propose a scheme that achieves information-theoretically secure tamper evidence: The server is able to obtain information about the stored data, but not while staying undetected. Moreover, the client only needs to remember a key whose length i…
▽ More
Storing data on an external server with information-theoretic security, while using a key shorter than the data itself, is impossible. As an alternative, we propose a scheme that achieves information-theoretically secure tamper evidence: The server is able to obtain information about the stored data, but not while staying undetected. Moreover, the client only needs to remember a key whose length is much shorter than the data.
We provide a security proof for our scheme, based on an entropic uncertainty relation, similar to QKD proofs. Our scheme works if Alice is able to (reversibly) randomise the message to almost-uniformity with only a short key. By constructing an explicit attack we show that short-key unconditional tamper evidence cannot be achieved without this randomisability.
△ Less
Submitted 24 January, 2022; v1 submitted 3 June, 2020;
originally announced June 2020.
-
The Blob: provable incompressibility and traceability in the whitebox model
Authors:
Boris Skoric,
Wil Michiels
Abstract:
We introduce a scheme for distributing and storing software with cryptographic functionality in the whitebox attacker model. Our scheme satisfies two relevant properties: incompressibility and traceability. The main idea is to store a large amount of random data (a `blob'), some of which will be randomly sampled in the future to serve as key material, and some of which serves as a watermark. We st…
▽ More
We introduce a scheme for distributing and storing software with cryptographic functionality in the whitebox attacker model. Our scheme satisfies two relevant properties: incompressibility and traceability. The main idea is to store a large amount of random data (a `blob'), some of which will be randomly sampled in the future to serve as key material, and some of which serves as a watermark. We study two variants: with and without re-use of key material. For both variants we analyse how many decryptions can be performed with the blob, taking into account collusion attacks against the watermark. Our results show that application of blob schemes in the context of pay-TV is feasible.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Qubit-based Unclonable Encryption with Key Recycling
Authors:
Daan Leermakers,
Boris Skoric
Abstract:
We re-visit Unclonable Encryption as introduced by Gottesman in 2003. We look at the combination of Unclonable Encryption and Key Recycling, while aiming for low communication complexity and high rate. We introduce a qubit-based prepare-and-measure Unclonable Encryption scheme with re-usable keys. Our scheme consists of a single transmission by Alice and a single classical feedback bit from Bob. T…
▽ More
We re-visit Unclonable Encryption as introduced by Gottesman in 2003. We look at the combination of Unclonable Encryption and Key Recycling, while aiming for low communication complexity and high rate. We introduce a qubit-based prepare-and-measure Unclonable Encryption scheme with re-usable keys. Our scheme consists of a single transmission by Alice and a single classical feedback bit from Bob. The transmission from Alice to Bob consists entirely of qubits. The rate, defined as the message length divided by the number of qubits, is higher than what can be achieved using Gottesman's scheme. We provide a security proof based on the diamond norm distance, taking noise into account.
△ Less
Submitted 28 April, 2020; v1 submitted 8 April, 2020;
originally announced April 2020.
-
Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication
Authors:
Daan Leermakers,
Boris Skoric
Abstract:
We answer an open question about Quantum Key Recycling (QKR): Is it possible to put the message entirely in the qubits without increasing the number of qubits? We show that this is indeed possible. We introduce a prepare-and-measure QKR protocol where the communication from Alice to Bob consists entirely of qubits. As usual, Bob responds with an authenticated one-bit accept/reject classical messag…
▽ More
We answer an open question about Quantum Key Recycling (QKR): Is it possible to put the message entirely in the qubits without increasing the number of qubits? We show that this is indeed possible. We introduce a prepare-and-measure QKR protocol where the communication from Alice to Bob consists entirely of qubits. As usual, Bob responds with an authenticated one-bit accept/reject classical message. Compared to Quantum Key Distribution (QKD), QKR has reduced round complexity. Compared to previous qubit-wise QKR protocols, our scheme has far less classical communication. We provide a security proof in the universal composability framework and find that the communication rate is asymptotically the same as for QKD with one-way postprocessing.
△ Less
Submitted 26 March, 2020;
originally announced March 2020.
-
Estimating Numerical Distributions under Local Differential Privacy
Authors:
Zitao Li,
Tianhao Wang,
Milan Lopuhaä-Zwakenberg,
Boris Skoric,
Ninghui Li
Abstract:
When collecting information, local differential privacy (LDP) relieves the concern of privacy leakage from users' perspective, as user's private information is randomized before sent to the aggregator. We study the problem of recovering the distribution over a numerical domain while satisfying LDP. While one can discretize a numerical domain and then apply the protocols developed for categorical d…
▽ More
When collecting information, local differential privacy (LDP) relieves the concern of privacy leakage from users' perspective, as user's private information is randomized before sent to the aggregator. We study the problem of recovering the distribution over a numerical domain while satisfying LDP. While one can discretize a numerical domain and then apply the protocols developed for categorical domains, we show that taking advantage of the numerical nature of the domain results in better trade-off of privacy and utility. We introduce a new reporting mechanism, called the square wave SW mechanism, which exploits the numerical nature in reporting. We also develop an Expectation Maximization with Smoothing (EMS) algorithm, which is applied to aggregated histograms from the SW mechanism to estimate the original distributions. Extensive experiments demonstrate that our proposed approach, SW with EMS, consistently outperforms other methods in a variety of utility metrics.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Improving Frequency Estimation under Local Differential Privacy
Authors:
Milan Lopuhaä-Zwakenberg,
Zitao Li,
Boris Škorić,
Ninghui Li
Abstract:
Local Differential Privacy protocols are stochastic protocols used in data aggregation when individual users do not trust the data aggregator with their private data. In such protocols there is a fundamental tradeoff between user privacy and aggregator utility. In the setting of frequency estimation, established bounds on this tradeoff are either nonquantitative, or far from what is known to be at…
▽ More
Local Differential Privacy protocols are stochastic protocols used in data aggregation when individual users do not trust the data aggregator with their private data. In such protocols there is a fundamental tradeoff between user privacy and aggregator utility. In the setting of frequency estimation, established bounds on this tradeoff are either nonquantitative, or far from what is known to be attainable. In this paper, we use information-theoretical methods to significantly improve established bounds. We also show that the new bounds are attainable for binary inputs. Furthermore, our methods lead to improved frequency estimators, which we experimentally show to outperform state-of-the-art methods.
△ Less
Submitted 1 September, 2020; v1 submitted 24 November, 2019;
originally announced November 2019.
-
Information-theoretic metrics for Local Differential Privacy protocols
Authors:
Milan Lopuhaä-Zwakenberg,
Boris Škorić,
Ninghui Li
Abstract:
Local Differential Privacy (LDP) protocols allow an aggregator to obtain population statistics about sensitive data of a userbase, while protecting the privacy of the individual users. To understand the tradeoff between aggregator utility and user privacy, we introduce new information-theoretic metrics for utility and privacy. Contrary to other LDP metrics, these metrics highlight the fact that th…
▽ More
Local Differential Privacy (LDP) protocols allow an aggregator to obtain population statistics about sensitive data of a userbase, while protecting the privacy of the individual users. To understand the tradeoff between aggregator utility and user privacy, we introduce new information-theoretic metrics for utility and privacy. Contrary to other LDP metrics, these metrics highlight the fact that the users and the aggregator are interested in fundamentally different domains of information. We show how our metrics relate to $\varepsilon$-LDP, the \emph{de facto} standard privacy metric, giving an information-theoretic interpretation to the latter. Furthermore, we use our metrics to quantitatively study the privacy-utility tradeoff for a number of popular protocols.
△ Less
Submitted 17 October, 2019;
originally announced October 2019.
-
Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation
Authors:
Behrooz Razeghi,
Taras Stanko,
Boris Škorić,
Slava Voloshynovskiy
Abstract:
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. This property is e.g. the sign or an indicator that a threshold is exceeded…
▽ More
We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. This property is e.g. the sign or an indicator that a threshold is exceeded.
We provide evidence that both approaches are able to protect such sensitive binary variables, and discuss how system parameters need to be set.
△ Less
Submitted 1 October, 2019; v1 submitted 15 July, 2019;
originally announced July 2019.
-
Locally Differentially Private Frequency Estimation with Consistency
Authors:
Tianhao Wang,
Milan Lopuhaä-Zwakenberg,
Zitao Li,
Boris Skoric,
Ninghui Li
Abstract:
Local Differential Privacy (LDP) protects user privacy from the data collector. LDP protocols have been increasingly deployed in the industry. A basic building block is frequency oracle (FO) protocols, which estimate frequencies of values. While several FO protocols have been proposed, the design goal does not lead to optimal results for answering many queries. In this paper, we show that adding p…
▽ More
Local Differential Privacy (LDP) protects user privacy from the data collector. LDP protocols have been increasingly deployed in the industry. A basic building block is frequency oracle (FO) protocols, which estimate frequencies of values. While several FO protocols have been proposed, the design goal does not lead to optimal results for answering many queries. In this paper, we show that adding post-processing steps to FO protocols by exploiting the knowledge that all individual frequencies should be non-negative and they sum up to one can lead to significantly better accuracy for a wide range of tasks, including frequencies of individual values, frequencies of the most frequent values, and frequencies of subsets of values. We consider 10 different methods that exploit this knowledge differently. We establish theoretical relationships between some of them and conducted extensive experimental evaluations to understand which methods should be used for different query tasks.
△ Less
Submitted 29 January, 2020; v1 submitted 20 May, 2019;
originally announced May 2019.
-
Fingerprint template protection using minutia-pair spectral representations
Authors:
Taras Stanko,
Bin Chen,
Boris Skoric
Abstract:
Storage of biometric data requires some form of template protection in order to preserve the privacy of people enrolled in a biometric database. One approach is to use a Helper Data System. Here it is necessary to transform the raw biometric measurement into a fixed-length representation. In this paper we extend the spectral function approach of Stanko and Skoric [WIFS2017], which provides such a…
▽ More
Storage of biometric data requires some form of template protection in order to preserve the privacy of people enrolled in a biometric database. One approach is to use a Helper Data System. Here it is necessary to transform the raw biometric measurement into a fixed-length representation. In this paper we extend the spectral function approach of Stanko and Skoric [WIFS2017], which provides such a fixed-length representation for fingerprints. First, we introduce a new spectral function that captures different information from the minutia orientations. It is complementary to the original spectral function, and we use both of them to extract information from a fingerprint image. Second, we construct a helper data system consisting of zero-leakage quantisation followed by the Code Offset Method. We show empirical data which demonstrates that applying our helper data system causes only a small performance penalty compared to fingerprint authentication based on the unprotected spectral functions.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Asymmetric Cryptography with Physical Unclonable Keys
Authors:
Ravitej Uppu,
Tom A. W. Wolterink,
Sebastianus A. Goorden,
Bin Chen,
Boris Škorić,
Allard P. Mosk,
Pepijn W. H. Pinkse
Abstract:
Secure communication is of paramount importance in modern society. Asymmetric cryptography methods such as the widely used RSA method allow secure exchange of information between parties who have not shared secret keys. However, the existing asymmetric cryptographic schemes rely on unproven mathematical assumptions for security. Further, the digital keys used in their implementation are susceptibl…
▽ More
Secure communication is of paramount importance in modern society. Asymmetric cryptography methods such as the widely used RSA method allow secure exchange of information between parties who have not shared secret keys. However, the existing asymmetric cryptographic schemes rely on unproven mathematical assumptions for security. Further, the digital keys used in their implementation are susceptible to copying that might remain unnoticed. Here we introduce a secure communication method that overcomes these two limitations by employing Physical Unclonable Keys (PUKs). Using optical PUKs realized in opaque scattering materials and employing off-the-shelf equipment, we transmit messages in an error-corrected way. Information is transmitted as patterned wavefronts of few-photon wavepackets which can be successfully decrypted only with the receiver's PUK. The security of PUK-Enabled Asymmetric Communication (PEAC) is not based on any stored secret but on the hardness of distinguishing between different few-photon wavefronts.
△ Less
Submitted 21 February, 2018;
originally announced February 2018.
-
Security proof for Round Robin Differential Phase Shift QKD
Authors:
Daan Leermakers,
Boris Skoric
Abstract:
We give a security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve's optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice an…
▽ More
We give a security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve's optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice and Bob should not exceed a value beta. As a function of beta we derive, for finite key size, the trace distance between the real state and a state in which no leakage exists. For asymptotic key size we obtain a bound on the trace distance by computing the von Neumann entropy. Our asymptotic result for the privacy amplification is sharper than existing bounds.
△ Less
Submitted 8 February, 2018; v1 submitted 2 September, 2017;
originally announced September 2017.
-
Optimal attacks on qubit-based Quantum Key Recycling
Authors:
Daan Leermakers,
Boris Skoric
Abstract:
Quantum Key Recycling (QKR) is a quantum-cryptographic primitive that allows one to re-use keys in an unconditionally secure way. By removing the need to repeatedly generate new keys it improves communication efficiency. Skoric and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit op…
▽ More
Quantum Key Recycling (QKR) is a quantum-cryptographic primitive that allows one to re-use keys in an unconditionally secure way. By removing the need to repeatedly generate new keys it improves communication efficiency. Skoric and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations.
We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate bounds on the privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of Quantum Key Distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. We also provide results in terms of the min-entropy. Overall, 8-state encoding yields the highest capacity.
△ Less
Submitted 15 April, 2017;
originally announced April 2017.
-
Minutia-pair spectral representations for fingerprint template protection
Authors:
Taras Stanko,
Boris Skoric
Abstract:
We introduce a new fixed-length representation of fingerprint minutiae, for use in template protection. It is similar to the `spectral minutiae' representation of Xu et al. but is based on coordinate differences between pairs of minutiae. Our technique has the advantage that it does not discard the phase information of the spectral functions. We show that the fingerprint matching performance (Equa…
▽ More
We introduce a new fixed-length representation of fingerprint minutiae, for use in template protection. It is similar to the `spectral minutiae' representation of Xu et al. but is based on coordinate differences between pairs of minutiae. Our technique has the advantage that it does not discard the phase information of the spectral functions. We show that the fingerprint matching performance (Equal Error Rate) is comparable to that of the original spectral minutiae representation, while the speed is improved.
△ Less
Submitted 20 March, 2017;
originally announced March 2017.
-
Flow-based reputation with uncertainty: Evidence-Based Subjective Logic
Authors:
Boris Skoric,
Sebastiaan J. A. de Hoogh,
Nicola Zannone
Abstract:
The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the agg…
▽ More
The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the aggregated trust information as well as on the procedure used to compute reputations. Two prominent models are flow-based reputation (e.g., EigenTrust, PageRank) and Subjective Logic based reputation. Flow-based models provide an automated method to aggregate trust information, but they are not able to express the level of uncertainty in the information. In contrast, Subjective Logic extends probabilistic models with an explicit notion of uncertainty, but the calculation of reputation depends on the structure of the trust network and often requires information to be discarded. These are severe drawbacks.
In this work, we observe that the `opinion discounting' operation in Subjective Logic has a number of basic problems. We resolve these problems by providing a new discounting operator that describes the flow of evidence from one party to another. The adoption of our discounting rule results in a consistent Subjective Logic algebra that is entirely based on the handling of evidence. We show that the new algebra enables the construction of an automated reputation assessment procedure for arbitrary trust networks, where the calculation no longer depends on the structure of the network, and does not need to throw away any information. Thus, we obtain the best of both worlds: flow-based reputation and consistent handling of uncertainties.
△ Less
Submitted 24 February, 2015; v1 submitted 13 February, 2014;
originally announced February 2014.
-
Quantum-Secure Authentication with a Classical Key
Authors:
Sebastianus A. Goorden,
Marcel Horstmann,
Allard P. Mosk,
Boris Škorić,
Pepijn W. H. Pinkse
Abstract:
Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical p…
▽ More
Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.
△ Less
Submitted 3 June, 2014; v1 submitted 1 March, 2013;
originally announced March 2013.
-
Flow-based reputation: more than just ranking
Authors:
Antonino Simone,
Boris Skoric,
Nicola Zannone
Abstract:
The last years have seen a growing interest in collaborative systems like electronic marketplaces and P2P file sharing systems where people are intended to interact with other people. Those systems, however, are subject to security and operational risks because of their open and distributed nature. Reputation systems provide a mechanism to reduce such risks by building trust relationships among en…
▽ More
The last years have seen a growing interest in collaborative systems like electronic marketplaces and P2P file sharing systems where people are intended to interact with other people. Those systems, however, are subject to security and operational risks because of their open and distributed nature. Reputation systems provide a mechanism to reduce such risks by building trust relationships among entities and identifying malicious entities. A popular reputation model is the so called flow-based model. Most existing reputation systems based on such a model provide only a ranking, without absolute reputation values; this makes it difficult to determine whether entities are actually trustworthy or untrustworthy. In addition, those systems ignore a significant part of the available information; as a consequence, reputation values may not be accurate. In this paper, we present a flow-based reputation metric that gives absolute values instead of merely a ranking. Our metric makes use of all the available information. We study, both analytically and numerically, the properties of the proposed metric and the effect of attacks on reputation values.
△ Less
Submitted 25 January, 2012;
originally announced March 2012.
-
Dynamic Tardos Traitor Tracing Schemes
Authors:
Thijs Laarhoven,
Jeroen Doumen,
Peter Roelse,
Boris Skoric,
Benne de Weger
Abstract:
We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates, and logarithmic in the total number of users and the error probability. Our results improve upon results of Tassa, and our schemes have several other advantages, such as being able to generate all codewords in advance…
▽ More
We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates, and logarithmic in the total number of users and the error probability. Our results improve upon results of Tassa, and our schemes have several other advantages, such as being able to generate all codewords in advance, a simple accusation method, and flexibility when the feedback from the pirate network is delayed.
△ Less
Submitted 25 January, 2013; v1 submitted 15 November, 2011;
originally announced November 2011.
-
Asymptotically false-positive-maximizing attack on non-binary Tardos codes
Authors:
Antonino Simone,
Boris Skoric
Abstract:
We use a method recently introduced by Simone and Skoric to study accusation probabilities for non-binary Tardos fingerprinting codes. We generalize the pre-computation steps in this approach to include a broad class of collusion attack strategies. We analytically derive properties of a special attack that asymptotically maximizes false accusation probabilities. We present numerical results on suf…
▽ More
We use a method recently introduced by Simone and Skoric to study accusation probabilities for non-binary Tardos fingerprinting codes. We generalize the pre-computation steps in this approach to include a broad class of collusion attack strategies. We analytically derive properties of a special attack that asymptotically maximizes false accusation probabilities. We present numerical results on sufficient code lengths for this attack, and explain the abrupt transitions that occur in these results.
△ Less
Submitted 2 February, 2011;
originally announced February 2011.
-
Asymptotic fingerprinting capacity for non-binary alphabets
Authors:
Dion Boesten,
Boris Skoric
Abstract:
We compute the channel capacity of non-binary fingerprinting under the Marking Assumption, in the limit of large coalition size c. The solution for the binary case was found by Huang and Moulin. They showed that asymptotically, the capacity is $1/(c^2 2\ln 2)$, the interleaving attack is optimal and the arcsine distribution is the optimal bias distribution. In this paper we prove that the asymptot…
▽ More
We compute the channel capacity of non-binary fingerprinting under the Marking Assumption, in the limit of large coalition size c. The solution for the binary case was found by Huang and Moulin. They showed that asymptotically, the capacity is $1/(c^2 2\ln 2)$, the interleaving attack is optimal and the arcsine distribution is the optimal bias distribution. In this paper we prove that the asymptotic capacity for general alphabet size q is $(q-1)/(c^2 2\ln q)$. Our proof technique does not reveal the optimal attack or bias distribution. The fact that the capacity is an increasing function of q shows that there is a real gain in going to non-binary alphabets.
△ Less
Submitted 2 February, 2011;
originally announced February 2011.
-
Steganography from weak cryptography
Authors:
Boris Skoric
Abstract:
We introduce a problem setting which we call ``the freedom fighters' problem''. It subtly differs from the prisoners' problem. We propose a steganographic method that allows Alice and Bob to fool Wendy the warden in this setting. Their messages are hidden in encryption keys. The recipient has no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order to recover them. We show…
▽ More
We introduce a problem setting which we call ``the freedom fighters' problem''. It subtly differs from the prisoners' problem. We propose a steganographic method that allows Alice and Bob to fool Wendy the warden in this setting. Their messages are hidden in encryption keys. The recipient has no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order to recover them. We show an example of the protocol and give a partial security analysis.
△ Less
Submitted 4 April, 2008;
originally announced April 2008.
-
The entropy of keys derived from laser speckle
Authors:
B. Skoric
Abstract:
Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random keys…
▽ More
Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random keys is quite natural, given the chaotic properties of speckle. However, this same chaotic behaviour also causes reproducibility problems. Cryptographic protocols require either zero noise or very low noise in their inputs; hence the issue of error rates is critical to applications of laser speckle in cryptography. Most of the literature uses an error reduction method based on Gabor filtering. Though the method is successful, it has not been thoroughly analysed.
In this paper we present a statistical analysis of Gabor-filtered speckle patterns. We introduce a model in which perturbations are described as random phase changes in the source plane. Using this model we compute the second and fourth order statistics of Gabor coefficients. We determine the mutual information between perturbed and unperturbed Gabor coefficients and the bit error rate in the derived bit string. The mutual information provides an absolute upper bound on the number of secure bits that can be reproducibly extracted from noisy measurements.
△ Less
Submitted 26 October, 2007;
originally announced October 2007.
-
Tardos fingerprinting is better than we thought
Authors:
B. Skoric,
T. U. Vladimirova,
M. Celik,
J. C. Talstra
Abstract:
We review the fingerprinting scheme by Tardos and show that it has a much better performance than suggested by the proofs in Tardos' original paper. In particular, the length of the codewords can be significantly reduced.
First we generalize the proofs of the false positive and false negative error probabilities with the following modifications: (1) we replace Tardos' hard-coded numbers by var…
▽ More
We review the fingerprinting scheme by Tardos and show that it has a much better performance than suggested by the proofs in Tardos' original paper. In particular, the length of the codewords can be significantly reduced.
First we generalize the proofs of the false positive and false negative error probabilities with the following modifications: (1) we replace Tardos' hard-coded numbers by variables and (2) we allow for independently chosen false positive and false negative error rates. It turns out that all the collusion-resistance properties can still be proven when the code length is reduced by a factor of more than 2.
Second, we study the statistical properties of the fingerprinting scheme, in particular the average and variance of the accusations. We identify which colluder strategy forces the content owner to employ the longest code. Using a gaussian approximation for the probability density functions of the accusations, we show that the required false negative and false positive error rate can be achieved with codes that are a factor 2 shorter than required for rigid proofs.
Combining the results of these two approaches, we show that the Tardos scheme can be used with a code length approximately 5 times shorter than in the original construction.
△ Less
Submitted 3 June, 2008; v1 submitted 27 July, 2006;
originally announced July 2006.
-
The problem of Coulomb interactions in the theory of the quantum Hall effect
Authors:
M. A. Baranov,
A. M. M. Pruisken,
B. Skoric
Abstract:
We summarize the main ingredients of a unifying theory for abelian quantum Hall states. This theory combines the Finkelstein approach to localization and interaction effects with the topological concept of an instanton vacuum as well as Chern-Simons gauge theory. We elaborate on the meaning of a new symmetry ($\cal F$ invariance) for systems with an infinitely ranged interaction potential. We ad…
▽ More
We summarize the main ingredients of a unifying theory for abelian quantum Hall states. This theory combines the Finkelstein approach to localization and interaction effects with the topological concept of an instanton vacuum as well as Chern-Simons gauge theory. We elaborate on the meaning of a new symmetry ($\cal F$ invariance) for systems with an infinitely ranged interaction potential. We address the renormalization of the theory and present the main results in terms of a scaling diagram of the conductances.
△ Less
Submitted 23 November, 2000;
originally announced November 2000.
-
The fractional quantum Hall effect: Chern-Simons map**, duality, Luttinger liquids and the instanton vacuum
Authors:
B. Skoric,
A. M. M. Pruisken
Abstract:
We derive, from first principles, the complete Luttinger liquid theory of abelian quantum Hall edge states. This theory includes the effects of disorder and Coulomb interactions as well as the coupling to external electromagnetic fields. We introduce a theory of spatially separated (individually conserved) edge modes, find an enlarged dual symmetry and obtain a complete classification of quasipa…
▽ More
We derive, from first principles, the complete Luttinger liquid theory of abelian quantum Hall edge states. This theory includes the effects of disorder and Coulomb interactions as well as the coupling to external electromagnetic fields. We introduce a theory of spatially separated (individually conserved) edge modes, find an enlarged dual symmetry and obtain a complete classification of quasiparticle operators and tunneling exponents. The chiral anomaly on the edge and Laughlin's gauge argument are used to obtain unambiguously the Hall conductance. In resolving the problem of counter flowing edge modes, we find that the long range Coulomb interactions play a fundamental role. In order to set up a theory for arbitrary filling fractions $ν$ we use the idea of a two dimensional network of percolating edge modes. We derive an effective, single mode Luttinger liquid theory for tunneling processes into the quantum Hall edge which yields a continuous tunneling exponent $1/ν$. The network approach is also used to re-derive the instanton vacuum or $Q$-theory for the plateau transitions.
△ Less
Submitted 31 December, 1998;
originally announced December 1998.
-
(Mis-)handling gauge invariance in the theory of the quantum Hall effect III: The instanton vacuum and chiral edge physics
Authors:
A. M. M. Pruisken,
B. Skoric,
M. A. Baranov
Abstract:
The concepts of an instanton vacuum and F-invariance are used to derive a complete effective theory of massless edge excitations in the quantum Hall effect. We establish, for the first time, the fundamental relation between the instanton vacuum approach and the theory of chiral edge bosons. Two longstanding problems of smooth disorder and Coulomb interactions are addressed. We introduce a two di…
▽ More
The concepts of an instanton vacuum and F-invariance are used to derive a complete effective theory of massless edge excitations in the quantum Hall effect. We establish, for the first time, the fundamental relation between the instanton vacuum approach and the theory of chiral edge bosons. Two longstanding problems of smooth disorder and Coulomb interactions are addressed. We introduce a two dimensional network of chiral edge states and tunneling centers (saddlepoints) as a model for the plateau transitions. We derive a mean field theory including the Coulomb interactions and explain the recent empirical fits to transport at low temperatures. Secondly, we address the problem of electron tunneling into the quantum Hall edge. We express the problem in terms of an effective Luttinger liquid with conductance parameter (g) equal to the filling fraction (ν) of the Landau band. Hence, even in the integral regime our results for tunneling are completely non-Fermi liquid like, in sharp contrast to the predictions of single edge theories.
△ Less
Submitted 29 April, 1999; v1 submitted 16 July, 1998;
originally announced July 1998.
-
(Mis-)handling gauge invariance in the theory of the quantum Hall effect II: Perturbative results
Authors:
M. A. Baranov,
A. M. M. Pruisken,
B. Skoric
Abstract:
The concept of F-invariance, which previously arose in our analysis of the integral and half-integral quantum Hall effects, is studied in 2+2εspatial dimensions. We report the results of a detailed renormalization group analysis and establish the renormalizability of the (Finkelstein) action to two loop order. We show that the infrared behavior of the theory can be extracted from gauge invariant…
▽ More
The concept of F-invariance, which previously arose in our analysis of the integral and half-integral quantum Hall effects, is studied in 2+2εspatial dimensions. We report the results of a detailed renormalization group analysis and establish the renormalizability of the (Finkelstein) action to two loop order. We show that the infrared behavior of the theory can be extracted from gauge invariant (F-invariant) quantities only. For these quantities (conductivity, specific heat) we derive explicit scaling functions. We identify a bosonic quasiparticle density of states which develops a Coulomb gap as one approaches the metal-insulator transition from the metallic side. We discuss the consequences of F-invariance for the strong coupling, insulating regime.
△ Less
Submitted 29 April, 1999; v1 submitted 30 December, 1997;
originally announced December 1997.
-
(Mis-)handling gauge invariance in the theory of the quantum Hall effect I: Unifying action and the ν=1/2 state
Authors:
A. M. M. Pruisken,
M. A. Baranov,
B. Skoric
Abstract:
We propose a unifying theory for both the integral and fractional quantum Hall regimes. This theory reconciles the Finkelstein approach to localization and interaction effects with the topological issues of an instanton vacuum and Chern-Simons gauge theory. We elaborate on the microscopic origins of the effective action and unravel a new symmetry in the problem with Coulomb interactions which we…
▽ More
We propose a unifying theory for both the integral and fractional quantum Hall regimes. This theory reconciles the Finkelstein approach to localization and interaction effects with the topological issues of an instanton vacuum and Chern-Simons gauge theory. We elaborate on the microscopic origins of the effective action and unravel a new symmetry in the problem with Coulomb interactions which we name F-invariance. This symmetry has a broad range of physical consequences which will be the main topic of future analyses. In the second half of this paper we compute the response of the theory to electromagnetic perturbations at a tree level approximation. This is applicable to the theory of ordinary metals as well as the composite fermion approach to the half-integer effect. Fluctuations in the Chern-Simons gauge fields are found to be well behaved only when the theory is F-invariant.
△ Less
Submitted 29 April, 1999; v1 submitted 30 December, 1997;
originally announced December 1997.