Skip to main content

Showing 1–44 of 44 results for author: Škorić, B

.
  1. arXiv:2406.06540  [pdf, other

    quant-ph

    Noise characterization for co-propagation of classical and CV-QKD signals over fiber and free-space link

    Authors: João dos Reis Frazão, Vincent van Vliet, Kadir Gümüş, Menno van den Hout, Sjoerd van der Heide, Aaron Albores-Mejia, Boris Škorić, Chigo Okonkwo

    Abstract: Real-time CV-QKD receiver achieves peak 2.9 Mbit/s secret-key-rates over 12.8 km of fiber, while co-propagating 15 classical channels, separated 1 nm from the quantum signal. Performance degrades at higher launch powers due to crosstalk.

    Submitted 25 April, 2024; originally announced June 2024.

  2. arXiv:2404.16857  [pdf, ps, other

    cs.CR

    Implementation of Entropically Secure Encryption: Securing Personal Health Data

    Authors: Mehmet Hüseyin Temel, Boris Skoric, Idelfonso Tafur Monroy

    Abstract: Entropically Secure Encryption (ESE) offers unconditional security with shorter keys compared to the One-Time Pad. In this paper, we present the first implementation of ESE for bulk encryption. The main computational bottleneck for bulk ESE is a multiplication in a very large finite field. This involves multiplication of polynomials followed by modular reduction. We have implemented polynomial mul… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: 4 pages

  3. arXiv:2404.14261  [pdf, other

    quant-ph

    Continuous-variable Quantum Position Verification secure against entangled attackers

    Authors: Rene Allerstorfer, Llorenç Escolà-Farràs, Arpan Akash Ray, Boris Skoric, Florian Speelman

    Abstract: Motivated by the fact that coherent states may offer practical advantages it was recently shown that a continuous-variable (CV) quantum position verification (QPV) protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement. In the discrete-variable (DV) analogue of that protocol it was shown that modifying how the classical input informa… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  4. arXiv:2404.07311  [pdf, ps, other

    cs.IT

    Average entropy of Gaussian mixtures

    Authors: Basheer Joudeh, Boris Škorić

    Abstract: We calculate the average differential entropy of a $q$-component Gaussian mixture in $\mathbb R^n$. For simplicity, all components have covariance matrix $σ^2 {\mathbf 1}$, while the means $\{\mathbf{W}_i\}_{i=1}^{q}$ are i.i.d. Gaussian vectors with zero mean and covariance $s^2 {\mathbf 1}$. We obtain a series expansion in $μ=s^2/σ^2$ for the average differential entropy up to order… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 24 pages

  5. arXiv:2402.04770  [pdf, other

    quant-ph cs.CR

    Continuous-Variable QKD with key rates far above Devetak-Winter

    Authors: Arpan Akash Ray, Boris Skoric

    Abstract: Continuous-Variable Quantum Key Distribution (CVQKD) at large distances has such high noise levels that the employed error-correcting codes must have very low rate. In this regime it becomes feasible to implement random-codebook error correction, which is known to perform close to capacity. We propose a random-codebook reverse reconciliation scheme for CVQKD that is inspired by spread-spectrum wat… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  6. arXiv:2401.10581  [pdf, other

    quant-ph eess.SP

    Co-propagation of Classical and Continuous-variable QKD Signals over a Turbulent Optical Channel with a Real-time QKD Receiver

    Authors: João dos Reis Frazão, Vincent van Vliet, Sjoerd van der Heide, Menno van den Hout, Kadir Gümüş, Aaron Albores-Mejía, Boris Škorić, Chigo Okonkwo

    Abstract: We demonstrate classical and quantum signal co-propagation over a turbulent free-space channel with 3 Tbit/s throughput and record 2.7 Mbit/s secret-key rate. Our real-time GPU-based receiver assessed quantum signal integrity under different turbulence scenarios for the first time.

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: This paper was accepted for OFC 2024, this is a pre-print

  7. arXiv:2308.04166  [pdf, other

    quant-ph

    Security of a Continuous-Variable based Quantum Position Verification Protocol

    Authors: Rene Allerstorfer, Llorenç Escolà-Farràs, Arpan Akash Ray, Boris Škorić, Florian Speelman, Philip Verduyn Lunel

    Abstract: In this work we study quantum position verification with continuous-variable quantum states. In contrast to existing discrete protocols, we present and analyze a protocol that utilizes coherent states and its properties. Compared to discrete-variable photonic states, coherent states offer practical advantages since they can be efficiently prepared and manipulated with current technology. We prove… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: 17 pages, 2 figures

  8. arXiv:2305.03940  [pdf, other

    quant-ph

    A simpler security proof for 6-state quantum key distribution

    Authors: Kaan Akyuz, Boris Skoric

    Abstract: Six-state Quantum Key Distribution (QKD) achieves the highest key rate in the class of qubit-based QKD schemes. The standard security proof, which has been developed since 2005, invokes complicated theorems involving smooth Renyi entropies. In this paper we present a simpler security proof for 6-state QKD that entirely avoids Renyi entropies. This is achieved by applying state smoothing directly i… ▽ More

    Submitted 6 May, 2023; originally announced May 2023.

  9. arXiv:2212.12495  [pdf, other

    cs.CR physics.optics

    Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications

    Authors: E. Marakis, U. Rührmair, M. Lachner, R. Uppu, B. Škorić, P. W. H. Pinkse

    Abstract: Physical unclonable functions (PUFs), physical objects that are practically unclonable because of their andom and uncontrollable manufacturing variations, are becoming increasingly popular as security primitives and unique identifiers in a fully digitized world. One of the central PUF premises states that both friends and foes, both legitimate manufacturers and external attackers alike, cannot clo… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: 9 pages, 6 figures

  10. arXiv:2204.08575  [pdf, other

    cs.IT cs.CR

    Collusion-resistant fingerprinting of parallel content channels

    Authors: Basheer Joudeh, Boris Škorić

    Abstract: The fingerprinting game is analysed when the coalition size $k$ is known to the tracer, but the colluders can distribute themselves across $L$ TV channels. The collusion channel is introduced and the extra degrees of freedom for the coalition are made manifest in our formulation. We introduce a payoff functional that is analogous to the single TV channel case, and is conjectured to be closely rela… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: 15 pages. 1 figure. Submitted to IHMMSEC'22

  11. arXiv:2201.00188  [pdf, ps, other

    quant-ph

    Entropically secure encryption with faster key expansion

    Authors: Mehmet Huseyin Temel, Boris Skoric

    Abstract: Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a certain sense circumventing Shannon's result that perfect encryption requires the key to be at least as long as the entropy of the plaintext. Entropically secure encryption is not perfect, and it works only if a lower bound is known on the entropy of the pl… ▽ More

    Submitted 23 October, 2022; v1 submitted 1 January, 2022; originally announced January 2022.

  12. arXiv:2103.01936  [pdf, other

    quant-ph cs.CR

    Diagrammatic security proof for 8-state encoding

    Authors: Boris Skoric, Zef Wolffs

    Abstract: Dirac notation is the most common way to describe quantum states and operations on states. It is very convenient and allows for quick visual distinction between vectors, scalars and operators. For quantum processes that involve interactions of multiple systems an even better visualisation has been proposed by Coecke and Kissinger, in the form of a diagrammatic formalism [CK2017]. Their notation ex… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  13. arXiv:2102.01781  [pdf, other

    quant-ph physics.atom-ph

    Optimization of the Variational Quantum Eigensolver for Quantum Chemistry Applications

    Authors: R. J. P. T. de Keijzer, V. E. Colussi, B. Škorić, S. J. J. M. F. Kokkelmans

    Abstract: This work studies the variational quantum eigensolver algorithm, designed to determine the ground state of a quantum mechanical system by combining classical and quantum hardware. Methods of reducing the number of required qubit manipulations, prone to induce errors, for the variational quantum eigensolver are studied. We formally justify the qubit removal process as sketched by Bravyi, Gambetta,… ▽ More

    Submitted 28 February, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: 13 pages, 6 figures

    Journal ref: AVS Quantum Sci. 4, 013803 (2022)

  14. arXiv:2012.15493  [pdf, other

    quant-ph

    Quantum digital signatures with smaller public keys

    Authors: Boris Skoric

    Abstract: We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. The public keys are fingerprinting states, just as in the scheme of Gottesman and Chuang, but we allow for multiple ways to reveal the private key partially. The effect of this modification is a reduction of the number of qubits expended per message bit. We give a security proof and we present numer… ▽ More

    Submitted 23 May, 2021; v1 submitted 31 December, 2020; originally announced December 2020.

  15. arXiv:2010.10827  [pdf, other

    quant-ph

    Two-way Unclonable Encryption with a vulnerable sender

    Authors: Daan Leermakers, Boris Skoric

    Abstract: Unclonable Encryption, introduced by Gottesman in 2003, is a quantum protocol that guarantees the secrecy of a successfully transferred classical message even when all keys leak at a later time. We propose an Unclonable Encryption protocol with the additional property that the sender's key material is allowed to leak even in the case of an unsuccessful run. This extra feature makes it possible to… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  16. arXiv:2008.13151  [pdf, other

    cs.CR cs.DB cs.IT

    Data Sanitisation Protocols for the Privacy Funnel with Differential Privacy Guarantees

    Authors: Milan Lopuhaä-Zwakenberg, Haochen Tong, Boris Škorić

    Abstract: In the Open Data approach, governments and other public organisations want to share their datasets with the public, for accountability and to support participation. Data must be opened in such a way that individual privacy is safeguarded. The Privacy Funnel is a mathematical approach that produces a sanitised database that does not leak private data beyond a chosen threshold. The downsides to this… ▽ More

    Submitted 30 August, 2020; originally announced August 2020.

    Comments: This preprint is an extended version of arXiv:2002.01501 (Fourteenth International Conference on the Digital Society, 2020)

  17. arXiv:2006.02476  [pdf, other

    quant-ph

    Can't Touch This: unconditional tamper evidence from short keys

    Authors: Bart van der Vecht, Xavier Coiteux-Roy, Boris Skoric

    Abstract: Storing data on an external server with information-theoretic security, while using a key shorter than the data itself, is impossible. As an alternative, we propose a scheme that achieves information-theoretically secure tamper evidence: The server is able to obtain information about the stored data, but not while staying undetected. Moreover, the client only needs to remember a key whose length i… ▽ More

    Submitted 24 January, 2022; v1 submitted 3 June, 2020; originally announced June 2020.

  18. arXiv:2004.04457  [pdf, other

    cs.CR

    The Blob: provable incompressibility and traceability in the whitebox model

    Authors: Boris Skoric, Wil Michiels

    Abstract: We introduce a scheme for distributing and storing software with cryptographic functionality in the whitebox attacker model. Our scheme satisfies two relevant properties: incompressibility and traceability. The main idea is to store a large amount of random data (a `blob'), some of which will be randomly sampled in the future to serve as key material, and some of which serves as a watermark. We st… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

  19. arXiv:2004.04084  [pdf, other

    quant-ph

    Qubit-based Unclonable Encryption with Key Recycling

    Authors: Daan Leermakers, Boris Skoric

    Abstract: We re-visit Unclonable Encryption as introduced by Gottesman in 2003. We look at the combination of Unclonable Encryption and Key Recycling, while aiming for low communication complexity and high rate. We introduce a qubit-based prepare-and-measure Unclonable Encryption scheme with re-usable keys. Our scheme consists of a single transmission by Alice and a single classical feedback bit from Bob. T… ▽ More

    Submitted 28 April, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

  20. arXiv:2003.11799  [pdf, other

    quant-ph

    Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication

    Authors: Daan Leermakers, Boris Skoric

    Abstract: We answer an open question about Quantum Key Recycling (QKR): Is it possible to put the message entirely in the qubits without increasing the number of qubits? We show that this is indeed possible. We introduce a prepare-and-measure QKR protocol where the communication from Alice to Bob consists entirely of qubits. As usual, Bob responds with an authenticated one-bit accept/reject classical messag… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  21. arXiv:1912.01051  [pdf, other

    cs.CR cs.DB cs.LG

    Estimating Numerical Distributions under Local Differential Privacy

    Authors: Zitao Li, Tianhao Wang, Milan Lopuhaä-Zwakenberg, Boris Skoric, Ninghui Li

    Abstract: When collecting information, local differential privacy (LDP) relieves the concern of privacy leakage from users' perspective, as user's private information is randomized before sent to the aggregator. We study the problem of recovering the distribution over a numerical domain while satisfying LDP. While one can discretize a numerical domain and then apply the protocols developed for categorical d… ▽ More

    Submitted 2 December, 2019; originally announced December 2019.

  22. arXiv:1911.10499  [pdf, other

    cs.CR

    Improving Frequency Estimation under Local Differential Privacy

    Authors: Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Škorić, Ninghui Li

    Abstract: Local Differential Privacy protocols are stochastic protocols used in data aggregation when individual users do not trust the data aggregator with their private data. In such protocols there is a fundamental tradeoff between user privacy and aggregator utility. In the setting of frequency estimation, established bounds on this tradeoff are either nonquantitative, or far from what is known to be at… ▽ More

    Submitted 1 September, 2020; v1 submitted 24 November, 2019; originally announced November 2019.

  23. arXiv:1910.07826  [pdf, ps, other

    cs.CR cs.IT

    Information-theoretic metrics for Local Differential Privacy protocols

    Authors: Milan Lopuhaä-Zwakenberg, Boris Škorić, Ninghui Li

    Abstract: Local Differential Privacy (LDP) protocols allow an aggregator to obtain population statistics about sensitive data of a userbase, while protecting the privacy of the individual users. To understand the tradeoff between aggregator utility and user privacy, we introduce new information-theoretic metrics for utility and privacy. Contrary to other LDP metrics, these metrics highlight the fact that th… ▽ More

    Submitted 17 October, 2019; originally announced October 2019.

  24. arXiv:1907.06388  [pdf, other

    cs.IT cs.CR cs.IR

    Single-Component Privacy Guarantees in Helper Data Systems and Sparse Coding with Ambiguation

    Authors: Behrooz Razeghi, Taras Stanko, Boris Škorić, Slava Voloshynovskiy

    Abstract: We investigate the privacy of two approaches to (biometric) template protection: Helper Data Systems and Sparse Ternary Coding with Ambiguization. In particular, we focus on a privacy property that is often overlooked, namely how much leakage exists about one specific binary property of one component of the feature vector. This property is e.g. the sign or an indicator that a threshold is exceeded… ▽ More

    Submitted 1 October, 2019; v1 submitted 15 July, 2019; originally announced July 2019.

  25. arXiv:1905.08320  [pdf, other

    cs.CR cs.DB cs.DS cs.IT cs.LG

    Locally Differentially Private Frequency Estimation with Consistency

    Authors: Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li

    Abstract: Local Differential Privacy (LDP) protects user privacy from the data collector. LDP protocols have been increasingly deployed in the industry. A basic building block is frequency oracle (FO) protocols, which estimate frequencies of values. While several FO protocols have been proposed, the design goal does not lead to optimal results for answering many queries. In this paper, we show that adding p… ▽ More

    Submitted 29 January, 2020; v1 submitted 20 May, 2019; originally announced May 2019.

    Comments: NDSS 2020

  26. arXiv:1804.01744  [pdf, other

    cs.CR

    Fingerprint template protection using minutia-pair spectral representations

    Authors: Taras Stanko, Bin Chen, Boris Skoric

    Abstract: Storage of biometric data requires some form of template protection in order to preserve the privacy of people enrolled in a biometric database. One approach is to use a Helper Data System. Here it is necessary to transform the raw biometric measurement into a fixed-length representation. In this paper we extend the spectral function approach of Stanko and Skoric [WIFS2017], which provides such a… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  27. arXiv:1802.07573  [pdf, other

    physics.optics quant-ph

    Asymmetric Cryptography with Physical Unclonable Keys

    Authors: Ravitej Uppu, Tom A. W. Wolterink, Sebastianus A. Goorden, Bin Chen, Boris Škorić, Allard P. Mosk, Pepijn W. H. Pinkse

    Abstract: Secure communication is of paramount importance in modern society. Asymmetric cryptography methods such as the widely used RSA method allow secure exchange of information between parties who have not shared secret keys. However, the existing asymmetric cryptographic schemes rely on unproven mathematical assumptions for security. Further, the digital keys used in their implementation are susceptibl… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 20 pages, 8 figures

    Journal ref: Quantum Science and Technology 4, 045011 (2019)

  28. arXiv:1709.00552  [pdf, other

    quant-ph

    Security proof for Round Robin Differential Phase Shift QKD

    Authors: Daan Leermakers, Boris Skoric

    Abstract: We give a security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve's optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice an… ▽ More

    Submitted 8 February, 2018; v1 submitted 2 September, 2017; originally announced September 2017.

  29. arXiv:1704.04690  [pdf, other

    quant-ph

    Optimal attacks on qubit-based Quantum Key Recycling

    Authors: Daan Leermakers, Boris Skoric

    Abstract: Quantum Key Recycling (QKR) is a quantum-cryptographic primitive that allows one to re-use keys in an unconditionally secure way. By removing the need to repeatedly generate new keys it improves communication efficiency. Skoric and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit op… ▽ More

    Submitted 15 April, 2017; originally announced April 2017.

  30. arXiv:1703.06811  [pdf, other

    cs.CR

    Minutia-pair spectral representations for fingerprint template protection

    Authors: Taras Stanko, Boris Skoric

    Abstract: We introduce a new fixed-length representation of fingerprint minutiae, for use in template protection. It is similar to the `spectral minutiae' representation of Xu et al. but is based on coordinate differences between pairs of minutiae. Our technique has the advantage that it does not discard the phase information of the spectral functions. We show that the fingerprint matching performance (Equa… ▽ More

    Submitted 20 March, 2017; originally announced March 2017.

  31. arXiv:1402.3319  [pdf, other

    cs.DC

    Flow-based reputation with uncertainty: Evidence-Based Subjective Logic

    Authors: Boris Skoric, Sebastiaan J. A. de Hoogh, Nicola Zannone

    Abstract: The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the agg… ▽ More

    Submitted 24 February, 2015; v1 submitted 13 February, 2014; originally announced February 2014.

  32. Quantum-Secure Authentication with a Classical Key

    Authors: Sebastianus A. Goorden, Marcel Horstmann, Allard P. Mosk, Boris Škorić, Pepijn W. H. Pinkse

    Abstract: Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical p… ▽ More

    Submitted 3 June, 2014; v1 submitted 1 March, 2013; originally announced March 2013.

    Comments: Revised version of 7 pages including extended appendix with in total 4 figures

    Journal ref: Optica 1 (6), 421-424 (2014)

  33. arXiv:1203.1820  [pdf, other

    cs.CY cs.SI physics.soc-ph

    Flow-based reputation: more than just ranking

    Authors: Antonino Simone, Boris Skoric, Nicola Zannone

    Abstract: The last years have seen a growing interest in collaborative systems like electronic marketplaces and P2P file sharing systems where people are intended to interact with other people. Those systems, however, are subject to security and operational risks because of their open and distributed nature. Reputation systems provide a mechanism to reduce such risks by building trust relationships among en… ▽ More

    Submitted 25 January, 2012; originally announced March 2012.

  34. Dynamic Tardos Traitor Tracing Schemes

    Authors: Thijs Laarhoven, Jeroen Doumen, Peter Roelse, Boris Skoric, Benne de Weger

    Abstract: We construct binary dynamic traitor tracing schemes, where the number of watermark bits needed to trace and disconnect any coalition of pirates is quadratic in the number of pirates, and logarithmic in the total number of users and the error probability. Our results improve upon results of Tassa, and our schemes have several other advantages, such as being able to generate all codewords in advance… ▽ More

    Submitted 25 January, 2013; v1 submitted 15 November, 2011; originally announced November 2011.

    Comments: 13 pages, 5 figures

    MSC Class: 68P30; 94B60

    Journal ref: IEEE Transactions on Information Theory, vol. 59, no. 7, pp. 4230-4242, 2013

  35. arXiv:1102.0451  [pdf, other

    cs.CR

    Asymptotically false-positive-maximizing attack on non-binary Tardos codes

    Authors: Antonino Simone, Boris Skoric

    Abstract: We use a method recently introduced by Simone and Skoric to study accusation probabilities for non-binary Tardos fingerprinting codes. We generalize the pre-computation steps in this approach to include a broad class of collusion attack strategies. We analytically derive properties of a special attack that asymptotically maximizes false accusation probabilities. We present numerical results on suf… ▽ More

    Submitted 2 February, 2011; originally announced February 2011.

  36. arXiv:1102.0445  [pdf, ps, other

    cs.CR

    Asymptotic fingerprinting capacity for non-binary alphabets

    Authors: Dion Boesten, Boris Skoric

    Abstract: We compute the channel capacity of non-binary fingerprinting under the Marking Assumption, in the limit of large coalition size c. The solution for the binary case was found by Huang and Moulin. They showed that asymptotically, the capacity is $1/(c^2 2\ln 2)$, the interleaving attack is optimal and the arcsine distribution is the optimal bias distribution. In this paper we prove that the asymptot… ▽ More

    Submitted 2 February, 2011; originally announced February 2011.

  37. arXiv:0804.0659  [pdf, ps, other

    cs.CR

    Steganography from weak cryptography

    Authors: Boris Skoric

    Abstract: We introduce a problem setting which we call ``the freedom fighters' problem''. It subtly differs from the prisoners' problem. We propose a steganographic method that allows Alice and Bob to fool Wendy the warden in this setting. Their messages are hidden in encryption keys. The recipient has no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order to recover them. We show… ▽ More

    Submitted 4 April, 2008; originally announced April 2008.

    ACM Class: E.3

  38. arXiv:0710.5002  [pdf, ps, other

    cs.CR cs.CV

    The entropy of keys derived from laser speckle

    Authors: B. Skoric

    Abstract: Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random keys… ▽ More

    Submitted 26 October, 2007; originally announced October 2007.

  39. arXiv:cs/0607131  [pdf, ps, other

    cs.CR

    Tardos fingerprinting is better than we thought

    Authors: B. Skoric, T. U. Vladimirova, M. Celik, J. C. Talstra

    Abstract: We review the fingerprinting scheme by Tardos and show that it has a much better performance than suggested by the proofs in Tardos' original paper. In particular, the length of the codewords can be significantly reduced. First we generalize the proofs of the false positive and false negative error probabilities with the following modifications: (1) we replace Tardos' hard-coded numbers by var… ▽ More

    Submitted 3 June, 2008; v1 submitted 27 July, 2006; originally announced July 2006.

    Comments: Modified presentation of results

    Report number: PR-MS 26.957

  40. The problem of Coulomb interactions in the theory of the quantum Hall effect

    Authors: M. A. Baranov, A. M. M. Pruisken, B. Skoric

    Abstract: We summarize the main ingredients of a unifying theory for abelian quantum Hall states. This theory combines the Finkelstein approach to localization and interaction effects with the topological concept of an instanton vacuum as well as Chern-Simons gauge theory. We elaborate on the meaning of a new symmetry ($\cal F$ invariance) for systems with an infinitely ranged interaction potential. We ad… ▽ More

    Submitted 23 November, 2000; originally announced November 2000.

    Comments: 9 pages, 3 figures. To appear in Proceedings of the International Conference "Mesoscopics and Strongly Correlated Electron Systems", July 2000, Chernogolovka, Russia

    Report number: ITFA-00-30

  41. The fractional quantum Hall effect: Chern-Simons map**, duality, Luttinger liquids and the instanton vacuum

    Authors: B. Skoric, A. M. M. Pruisken

    Abstract: We derive, from first principles, the complete Luttinger liquid theory of abelian quantum Hall edge states. This theory includes the effects of disorder and Coulomb interactions as well as the coupling to external electromagnetic fields. We introduce a theory of spatially separated (individually conserved) edge modes, find an enlarged dual symmetry and obtain a complete classification of quasipa… ▽ More

    Submitted 31 December, 1998; originally announced December 1998.

    Comments: 36 pages, 7 figures (eps)

    Report number: ITFA-98-45

    Journal ref: Nucl.Phys. B559 (1999) 637-672

  42. (Mis-)handling gauge invariance in the theory of the quantum Hall effect III: The instanton vacuum and chiral edge physics

    Authors: A. M. M. Pruisken, B. Skoric, M. A. Baranov

    Abstract: The concepts of an instanton vacuum and F-invariance are used to derive a complete effective theory of massless edge excitations in the quantum Hall effect. We establish, for the first time, the fundamental relation between the instanton vacuum approach and the theory of chiral edge bosons. Two longstanding problems of smooth disorder and Coulomb interactions are addressed. We introduce a two di… ▽ More

    Submitted 29 April, 1999; v1 submitted 16 July, 1998; originally announced July 1998.

    Comments: 51 pages, 8 figures; section IIA3 completely revised, section IIB and appendix C corrected; submitted to Phys.Rev.B

    Report number: ITFA 98-17

    Journal ref: Phys.Rev.B60:16838-16864,1999

  43. arXiv:cond-mat/9712323  [pdf, ps, other

    cond-mat.mes-hall

    (Mis-)handling gauge invariance in the theory of the quantum Hall effect II: Perturbative results

    Authors: M. A. Baranov, A. M. M. Pruisken, B. Skoric

    Abstract: The concept of F-invariance, which previously arose in our analysis of the integral and half-integral quantum Hall effects, is studied in 2+2εspatial dimensions. We report the results of a detailed renormalization group analysis and establish the renormalizability of the (Finkelstein) action to two loop order. We show that the infrared behavior of the theory can be extracted from gauge invariant… ▽ More

    Submitted 29 April, 1999; v1 submitted 30 December, 1997; originally announced December 1997.

    Comments: 26 pages, 7 figures; minor modifications; submitted to Phys.Rev.B

    Report number: ITFA 97-48

  44. arXiv:cond-mat/9712322  [pdf, ps, other

    cond-mat.mes-hall

    (Mis-)handling gauge invariance in the theory of the quantum Hall effect I: Unifying action and the ν=1/2 state

    Authors: A. M. M. Pruisken, M. A. Baranov, B. Skoric

    Abstract: We propose a unifying theory for both the integral and fractional quantum Hall regimes. This theory reconciles the Finkelstein approach to localization and interaction effects with the topological issues of an instanton vacuum and Chern-Simons gauge theory. We elaborate on the microscopic origins of the effective action and unravel a new symmetry in the problem with Coulomb interactions which we… ▽ More

    Submitted 29 April, 1999; v1 submitted 30 December, 1997; originally announced December 1997.

    Comments: 20 pages, 6 figures; appendix B revised; submitted to Phys.Rev.B

    Report number: ITFA 97-47