Skip to main content

Showing 1–14 of 14 results for author: Bouda, J

.
  1. arXiv:2009.06067  [pdf, other

    quant-ph

    Private quantum channels for multi-photon pulses and unitary k-designs

    Authors: Jan Bouda, Michal Sedlák, Mario Ziman

    Abstract: We address the question of existence of private quantum channel for qubits encoded in polarization degrees of freedom of a photon, that remains secure even if multi-photon (instead of single-photon) pulse is emitted. We show that random unitary channel distributed according to SU(2) Haar measure has this property. Further we analyze the qubit unitary k-designs. We show they ensure security if the… ▽ More

    Submitted 13 September, 2020; originally announced September 2020.

    Comments: 8 pages

  2. arXiv:2009.05276  [pdf, other

    quant-ph

    General Measurements with Limited Resources and Their Application to Quantum Unambiguous State Discrimination

    Authors: Jan Bouda, Daniel Reitzner

    Abstract: In this report we present a framework for implementing arbitrary $n$-outcome quantum measurement as a sequence of two-outcome measurements requiring only single ancillary qubit. Our procedure is the same as one presented in [Phys. Rev. A 77, 052104 (2008)] but in addition offers particular construction for a two-outcome partial measurements. We exemplify this framework on the unambiguous state dis… ▽ More

    Submitted 11 September, 2020; originally announced September 2020.

    Comments: 9 pages, 7 figures

  3. arXiv:1612.04037   

    cs.LO cs.DS cs.SE

    Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science

    Authors: Jan Bouda, Lukáš Holík, Jan Kofroň, Jan Strejček, Adam Rambousek

    Abstract: MEMICS provides a forum for doctoral students interested in applications of mathematical and engineering methods in computer science. Besides a rich technical programme (including invited talks, regular papers, and presentations), MEMICS also offers friendly social activities and exciting opportunities for meeting like-minded people. MEMICS submissions traditionally cover all areas of computer sci… ▽ More

    Submitted 13 December, 2016; originally announced December 2016.

    Journal ref: EPTCS 233, 2016

  4. Device-independent randomness extraction for arbitrarily weak min-entropy source

    Authors: Jan Bouda, Marcin Pawlowski, Matej Pivoluska, Martin Plesch

    Abstract: Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent set… ▽ More

    Submitted 14 March, 2014; v1 submitted 5 February, 2014; originally announced February 2014.

    Comments: 5 pages + 3 pages supplementary material

    Journal ref: Phys. Rev. A 90, 032313 (2014)

  5. Weak randomness completely trounces the security of QKD

    Authors: Jan Bouda, Matej Pivoluska, Martin Plesch, Colin Wilmott

    Abstract: In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel im… ▽ More

    Submitted 9 June, 2012; v1 submitted 6 June, 2012; originally announced June 2012.

    Journal ref: Phys. Rev. A 86, 062308 (2012)

  6. arXiv:1109.1943  [pdf, other

    quant-ph

    Encryption with Weakly Random Keys Using Quantum Ciphertext

    Authors: J. Bouda, M. Pivoluska, M. Plesch

    Abstract: The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full informatio… ▽ More

    Submitted 17 February, 2012; v1 submitted 9 September, 2011; originally announced September 2011.

    Comments: 9 pages, 2 figures

    Journal ref: QIC Vol.12 No.5&6 pp0394-0402 (2012)

  7. Fair and optimistic quantum contract signing

    Authors: N. Paunkovic, J. Bouda, P. Mateus

    Abstract: We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged be… ▽ More

    Submitted 18 October, 2011; v1 submitted 15 June, 2011; originally announced June 2011.

    Comments: 11 pages, 2 figures

  8. Non-malleable encryption of quantum information

    Authors: Andris Ambainis, Jan Bouda, Andreas Winter

    Abstract: We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption wh… ▽ More

    Submitted 12 February, 2009; v1 submitted 3 August, 2008; originally announced August 2008.

    Comments: 8 pages. Title changed in v2, a couple of mistakes corrected, the results are essentially unchanged; accepted for publication at J Math Phys

    Journal ref: Journal of Mathematical Physics, vol. 50, 042106 (2009)

  9. Optimality of private quantum channels

    Authors: Jan Bouda, Mario Ziman

    Abstract: We addressed the question of optimality of private quantum channels. We have shown that the Shannon entropy of the classical key necessary to securely transfer the quantum information is lower bounded by the entropy exchange of the private quantum channel $\cal E$ and von Neumann entropy of the ciphertext state $\varrho^{(0)}$. Based on these bounds we have shown that decomposition of private qu… ▽ More

    Submitted 10 October, 2007; originally announced October 2007.

    Comments: no comment

    Journal ref: J. Phys. A: Math. Theor. 40 (2007) 5415-5426

  10. arXiv:quant-ph/0701168  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Using quantum key distribution for cryptographic purposes: a survey

    Authors: Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger

    Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the… ▽ More

    Submitted 4 December, 2014; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81

    Journal ref: Theoretical Computer Science, 560 (2014), pp. 62-81

  11. arXiv:quant-ph/0512122  [pdf, ps, other

    quant-ph

    Anonymous Transmission of Quantum Information

    Authors: Jan Bouda, Josef Sprojcar

    Abstract: We propose a protocol for anonymous distribution of quantum information which can be used in two modifications. In the first modification the receiver of the message is publicly known, but the sender remains unknown (even to receiver). In the second modification the sender is known, but the receiver is unknown (even to sender). Our protocol achieves this goal with unconditional security using cl… ▽ More

    Submitted 21 June, 2006; v1 submitted 15 December, 2005; originally announced December 2005.

  12. arXiv:quant-ph/0506107  [pdf, ps, other

    quant-ph

    Limits and restrictions of private quantum channel

    Authors: Jan Bouda, Mario Ziman

    Abstract: We study private quantum channels on a single qubit, which encrypt given set of plaintext states $P$. Specifically, we determine all achievable states $ρ^{(0)}$ (average output of encryption) and for each particular set $P$ we determine the entropy of the key necessary and sufficient to encrypt this set. It turns out that single bit of key is sufficient when the set $P$ is two dimensional. Howev… ▽ More

    Submitted 14 June, 2005; originally announced June 2005.

    Comments: 23 pages, submitted to QI&C

  13. Entanglement swap** between multi-qudit systems

    Authors: Jan Bouda, Vladimir Buzek

    Abstract: We generalize the entanglement swap** scheme originally proposed for two pairs of qubits to an arbitrary number $q$ of systems composed from an arbitrary number $m_j$ of qudits. Each of the system is supposed to be prepared in a maximally entangled state of $m_j$ qudits, while different systems are not correlated at all. We show that when a set $\sum_{j=1}^q a_j$ particles (from each of the… ▽ More

    Submitted 19 January, 2002; v1 submitted 4 December, 2001; originally announced December 2001.

    Comments: 7 revtex pages, 4 figures

    Journal ref: J PHYS A-MATH GEN 34: (20) 4301-4311 MAY 25 2001

  14. Purification and correlated measurements of bipartite mixed states

    Authors: Jan Bouda, Vladimir Buzek

    Abstract: We prove that all purifications of a non-factorable state (i.e., the state which cannot be expressed in a form $ρ_{AB}=ρ_A\otimesρ_B$) are entangled. We also show that for any bipartite state there exists a pair of measurements which are correlated on this state if and only if the state is non-factorable.

    Submitted 3 December, 2001; originally announced December 2001.

    Comments: 4 revtex pages, to appear in Phys. Rev. A