Skip to main content

Showing 1–50 of 54 results for author: Fung, F

.
  1. arXiv:2403.02788  [pdf

    physics.ed-ph

    Prequestioning Enhances Undergraduate Students Learning in an Environmental Chemistry Course

    Authors: Steven C. Pan, Jia Yi Han, Fun Man Fung

    Abstract: Prequestioning is an instructional strategy that involves taking practice tests on to-be-learned information followed by studying the correct answers. Despite promising results in laboratory studies, it has rarely been examined in authentic educational settings. The current study investigated the pedagogical benefits of prequestioning as a learning intervention in an undergraduate environmental ch… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: 16 pages, 3 figures

  2. arXiv:2311.12791  [pdf

    quant-ph

    MadQCI: a heterogeneous and scalable SDN QKD network deployed in production facilities

    Authors: V. Martin, J. P. Brito, L. Ortiz, R. B. Mendez, J. S. Buruaga, R. J. Vicente, A. Sebastián-Lombraña, D. Rincon, F. Perez, C. Sanchez, M. Peev, H. H. Brunner, F. Fung, A. Poppe, F. Fröwis, A. J. Shields, R. I. Woodward, H. Griesser, S. Roehrich, F. De La Iglesia, C. Abellan, M. Hentschel, J. M. Rivas-Moscoso, A. Pastor, J. Folgueira , et al. (1 additional authors not shown)

    Abstract: Current quantum key distribution (QKD) networks focus almost exclusively on transporting secret keys with the highest possible rate. Consequently, they are built as mostly fixed, ad hoc, logically, and physically isolated infrastructures designed to avoid any penalty to the quantum channel. This architecture is neither scalable nor cost-effective and future, real-world deployments will differ cons… ▽ More

    Submitted 3 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

  3. arXiv:2311.08038  [pdf, other

    cs.CR cs.NI

    Linking QKD testbeds across Europe

    Authors: Max Brauer, Rafael J. Vicente, Jaime S. Buruaga, Ruben B. Mendez, Ralf-Peter Braun, Marc Geitz, Piotr Rydlichkowski, Hans H. Brunner, Fred Fung, Momtchil Peev, Antonio Pastor, Diego Lopez, Vicente Martin, Juan P. Brito

    Abstract: Quantum-key-distribution (QKD) networks are gaining importance and it has become necessary to analyze the most appropriate methods for their long-distance interconnection. In this paper, four different methods of interconnecting remote QKD networks are proposed. The methods are used to link three different QKD testbeds in Europe, located in Berlin, Madrid, and Poznan. Although long-distance QKD li… ▽ More

    Submitted 10 January, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  4. arXiv:2309.05205  [pdf, ps, other

    quant-ph eess.SP

    A Review of the Applications of Quantum Machine Learning in Optical Communication Systems

    Authors: Ark Modi, Alonso Viladomat Jasso, Roberto Ferrara, Christian Deppe, Janis Noetzel, Fred Fung, Maximilian Schaedler

    Abstract: In the context of optical signal processing, quantum and quantum-inspired machine learning algorithms have massive potential for deployment. One of the applications is in error correction protocols for the received noisy signals. In some scenarios, non-linear and unknown errors can lead to noise that bypasses linear error correction protocols that optical receivers generally implement. In those ca… ▽ More

    Submitted 25 September, 2023; v1 submitted 10 September, 2023; originally announced September 2023.

    Comments: European Wireless Conference (EW) 2023 - 6G Driving a Sustainable Growth

  5. arXiv:2308.03949  [pdf, other

    quant-ph eess.SP

    Quantum and Quantum-Inspired Stereographic K Nearest-Neighbour Clustering

    Authors: Alonso Viladomat Jasso, Ark Modi, Roberto Ferrara, Christian Deppe, Janis Noetzel, Fred Fung, Maximilian Schaedler

    Abstract: Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical-fibre communication systems. Quantum k-means clustering promises a speed-up over the classical k-means algorithm; however, it has been shown to not currently provide this speed-up for decoding optical-fibre signals due to the embedding of c… ▽ More

    Submitted 25 September, 2023; v1 submitted 7 August, 2023; originally announced August 2023.

    Journal ref: Entropy 2023, 25, 1361

  6. arXiv:2308.03540  [pdf, other

    quant-ph eess.SP

    Testing of Hybrid Quantum-Classical K-Means for Nonlinear Noise Mitigation

    Authors: Ark Modi, Alonso Viladomat Jasso, Roberto Ferrara, Christian Deppe, Janis Noetzel, Fred Fung, Maximilian Schaedler

    Abstract: Nearest-neighbour clustering is a powerful set of heuristic algorithms that find natural application in the decoding of signals transmitted using the M-Quadrature Amplitude Modulation (M-QAM) protocol. Lloyd et al. proposed a quantum version of the algorithm that promised an exponential speed-up. We analyse the performance of this algorithm by simulating the use of a hybrid quantum-classical imple… ▽ More

    Submitted 10 October, 2023; v1 submitted 7 August, 2023; originally announced August 2023.

    Comments: 2023 IEEE Global Communications Conference: Selected Areas in Communications: Quantum Communications and Computing

  7. arXiv:2307.12193  [pdf, other

    quant-ph cond-mat.mes-hall

    Programmable Quantum Processors based on Spin Qubits with Mechanically-Mediated Interactions and Transport

    Authors: F. Fung, E. Rosenfeld, J. D. Schaefer, A. Kabcenell, J. Gieseler, T. X. Zhou, T. Madhavan, N. Aslam, A. Yacoby, M. D. Lukin

    Abstract: Solid state spin qubits are promising candidates for quantum information processing, but controlled interactions and entanglement in large, multi-qubit systems are currently difficult to achieve. We describe a method for programmable control of multi-qubit spin systems, in which individual nitrogen-vacancy (NV) centers in diamond nanopillars are coupled to magnetically functionalized silicon nitri… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 7 pages, 4 figures

  8. arXiv:2303.02895  [pdf

    astro-ph.SR physics.space-ph

    The Multiview Observatory for Solar Terrestrial Science (MOST)

    Authors: N. Gopalswamy, S. Christe, S. F. Fung, Q. Gong, J. R. Gruesbeck, L. K. Jian, S. G. Kanekal, C. Kay, T. A. Kucera, J. E. Leake, L. Li, P. Makela, P. Nikulla, N. L. Reginald, A. Shih, S. K. Tadikonda, N. Viall, L. B. Wilson III, S. Yashiro, L. Golub, E. DeLuca, K. Reeves, A. C. Sterling, A. R. Winebarger, C. DeForest , et al. (32 additional authors not shown)

    Abstract: We report on a study of the Multiview Observatory for Solar Terrestrial Science (MOST) mission that will provide comprehensive imagery and time series data needed to understand the magnetic connection between the solar interior and the solar atmosphere/inner heliosphere. MOST will build upon the successes of SOHO and STEREO missions with new views of the Sun and enhanced instrument capabilities. T… ▽ More

    Submitted 10 December, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

    Comments: 42 pages, 19 figures, 8 tables, to appear in J. Atmospheric and Solar Terrestrial Physics

  9. arXiv:2207.07891  [pdf, other

    math.NA physics.comp-ph physics.geo-ph

    Accurate simulations of nonlinear dynamic shear ruptures on pre-existing faults in 3D elastic solids with dual-pairing SBP methods

    Authors: Kenneth Duru, Christopher Williams, Frederick Fung

    Abstract: In this paper we derive and analyse efficient and stable numerical methods for accurate numerical simulations of nonlinear dynamic shear ruptures on non-planar faults embedded in 3D elastic solids using dual-paring (DP) summation by parts (SBP) finite difference (FD) methods. Specifically, for nonlinear dynamic earthquake ruptures, we demonstrate that the DP SBP FD operators [K. Mattsson. J. Compu… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

    Comments: 35 pages

  10. arXiv:2201.13447  [pdf, other

    physics.space-ph

    Unifying the Validation of Ambient Solar Wind Models

    Authors: Martin A. Reiss, Karin Muglach, Richard Mullinix, Maria M. Kuznetsova, Chiu Wiegand, Manuela Temmer, Charles N. Arge, Sergio Dasso, Shing F. Fung, Jose Juan Gonzalez Aviles, Siegfried Gonzi, Lan Jian, Peter MacNeice, Christian Möstl, Mathew Owens, Barbara Perri, Rui F. Pinto, Lutz Rastätter, Pete Riley, Evangelia Samara, ISWAT H1-01 Team Members

    Abstract: Progress in space weather research and awareness needs community-wide strategies and procedures to evaluate our modeling assets. Here we present the activities of the Ambient Solar Wind Validation Team embedded in the COSPAR ISWAT initiative. We aim to bridge the gap between model developers and end-users to provide the community with an assessment of the state-of-the-art in solar wind forecasting… ▽ More

    Submitted 16 May, 2022; v1 submitted 31 January, 2022; originally announced January 2022.

  11. arXiv:2011.02600  [pdf, other

    math.NA cs.DC physics.geo-ph

    Upwind summation by parts finite difference methods for large scale elastic wave simulations in 3D complex geometries

    Authors: Kenneth Duru, Frederick Fung, Christopher Williams

    Abstract: High-order accurate summation-by-parts (SBP) finite difference (FD) methods constitute efficient numerical methods for simulating large-scale hyperbolic wave propagation problems. Traditional SBP FD operators that approximate first-order spatial derivatives with central-difference stencils often have spurious unresolved numerical wave-modes in their computed solutions. Recently derived high order… ▽ More

    Submitted 24 July, 2021; v1 submitted 4 November, 2020; originally announced November 2020.

  12. arXiv:2010.13342  [pdf, other

    cs.DC

    Resiliency in Numerical Algorithm Design for Extreme Scale Simulations

    Authors: Emmanuel Agullo, Mirco Altenbernd, Hartwig Anzt, Leonardo Bautista-Gomez, Tommaso Benacchio, Luca Bonaventura, Hans-Joachim Bungartz, Sanjay Chatterjee, Florina M. Ciorba, Nathan DeBardeleben, Daniel Drzisga, Sebastian Eibl, Christian Engelmann, Wilfried N. Gansterer, Luc Giraud, Dominik Goeddeke, Marco Heisig, Fabienne Jezequel, Nils Kohl, Xiaoye Sherry Li, Romain Lion, Miriam Mehl, Paul Mycek, Michael Obersteiner, Enrique S. Quintana-Orti , et al. (11 additional authors not shown)

    Abstract: This work is based on the seminar titled ``Resiliency in Numerical Algorithm Design for Extreme Scale Simulations'' held March 1-6, 2020 at Schloss Dagstuhl, that was attended by all the authors. Naive versions of conventional resilience techniques will not scale to the exascale regime: with a main memory footprint of tens of Petabytes, synchronously writing checkpoint data all the way to backgr… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: 45 pages, 3 figures, submitted to The International Journal of High Performance Computing Applications

    ACM Class: D.4.5; G.4; G.1; D.4.4

  13. arXiv:1907.08663  [pdf, ps, other

    astro-ph.IM physics.app-ph physics.space-ph

    Application Usability Levels: A Framework for Tracking Project Product Progress

    Authors: Alexa J. Halford, Adam C. Kellerman, Katherine Garcia-Sage, Jeffrey Klenzing, Brett A. Carter, Ryan M. McGranaghan, Timothy Guild, Consuelo Cid, Carl J. Henney, Natalia Y. Ganushkina, Angeline G. Burrell, Mike Terkildsen, Daniel T. Welling, Sophie A. Murray, K. D. Leka, James P. McCollough, Barbara J. Thompson, Antti Pulkkinen, Shing F. Fung, Suzy Bingham, Mario M. Bisi, Michael W. Liemohn, Brian M. Walsh, Steven K. Morley

    Abstract: The space physics community continues to grow and become both more interdisciplinary and more intertwined with commercial and government operations. This has created a need for a framework to easily identify what projects can be used for specific applications and how close the tool is to routine autonomous or on-demand implementation and operation. We propose the Application Usability Level (AUL)… ▽ More

    Submitted 19 July, 2019; originally announced July 2019.

  14. Pilot-assisted intradyne reception for high-speed continuous-variable quantum key distribution with true local oscillator

    Authors: Fabian Laudenbach, Bernhard Schrenk, Christoph Pacher, Michael Hentschel, Chi-Hang Fred Fung, Fotini Karinou, Andreas Poppe, Momtchil Peev, Hannes Hübel

    Abstract: We present a pilot-assisted coherent intradyne reception methodology for CV-QKD with true local oscillator. An optically phase-locked reference tone, prepared using carrier-suppressed optical single-sideband modulation, is multiplexed in polarisation and frequency to the 250 Mbaud quantum signal in order to provide optical frequency- and phase matching between quantum signal and local oscillator.… ▽ More

    Submitted 3 October, 2019; v1 submitted 29 December, 2017; originally announced December 2017.

    Comments: 12 pages, 6 figures, 1 table

    Journal ref: Quantum 3, 193 (2019)

  15. arXiv:1709.07968  [pdf, other

    cond-mat.soft

    Dynamics and interactions of particles in a thermophoretic trap

    Authors: Benjamin Foster, Frankie Fung, Connor Fieweger, Mykhaylo Usatyuk, Anita Gaj, B. J. DeSalvo, Cheng Chin

    Abstract: We investigate dynamics and interactions of particles levitated and trapped by the thermophoretic force in a vacuum cell. Our analysis is based on footage taken by orthogonal cameras that are able to capture the three dimensional trajectories of the particles. In contrast to spherical particles, which remain stationary at the center of the cell, here we report new qualitative features of the motio… ▽ More

    Submitted 22 September, 2017; originally announced September 2017.

    Comments: 7 Pages, 3 Figures, 2 Videos

    Journal ref: Proceedings Volume 10347, Optical Trap** and Optical Micromanipulation XIV; 103471Z (2017)

  16. Continuous-Variable Quantum Key Distribution with Gaussian Modulation -- The Theory of Practical Implementations

    Authors: Fabian Laudenbach, Christoph Pacher, Chi-Hang Fred Fung, Andreas Poppe, Momtchil Peev, Bernhard Schrenk, Michael Hentschel, Philip Walther, Hannes Hübel

    Abstract: Quantum key distribution using weak coherent states and homodyne detection is a promising candidate for practical quantum-cryptographic implementations due to its compatibility with existing telecom equipment and high detection efficiencies. However, despite the actual simplicity of the protocol, the security analysis of this method is rather involved compared to discrete-variable QKD. In this art… ▽ More

    Submitted 10 May, 2018; v1 submitted 27 March, 2017; originally announced March 2017.

    Comments: 71 pages, 9 figures, 1 table

    Journal ref: Adv. Quantum Technol. 1800011 (2018)

  17. arXiv:1601.00150  [pdf, ps, other

    quant-ph

    Tight bounds of quantum speed limit for noisy dynamics via maximal rotation angles

    Authors: Zihao Hu, Lingna Wang, Hongzhen Chen, Haidong Yuan, Chi-Hang Fred Fung, **g Liu, Zibo Miao

    Abstract: The laws of quantum physics place a limit on the speed of computation. In particular, the evolution time of a system from an initial state to a final state cannot be arbitrarily short. Bounds on the speed of evolution for unitary dynamics have long been studied. A few bounds on the speed of evolution for noisy dynamics have also been obtained recently, which, however, are in general not tight. In… ▽ More

    Submitted 21 November, 2023; v1 submitted 2 January, 2016; originally announced January 2016.

    Comments: 11 pages

  18. arXiv:1506.01909  [pdf, ps, other

    quant-ph

    Quantum parameter estimation with general dynamics

    Authors: Haidong Yuan, Chi-Hang Fred Fung

    Abstract: One of the main quests in quantum metrology, and quantum parameter estimation in general, is to find out the highest achievable precision with given resources and design schemes that attain that precision. In this article we present a general framework for quantum parameter estimation which relates the ultimate precision limit directly to the underlying dynamics. With this framework we present sys… ▽ More

    Submitted 20 May, 2016; v1 submitted 5 June, 2015; originally announced June 2015.

    Comments: 14 pages. Comments are particularly welcome

  19. arXiv:1506.00819  [pdf, other

    quant-ph

    Fidelity and Fisher information on quantum channels

    Authors: Haidong Yuan, Chi-Hang Fred Fung

    Abstract: The fidelity function of quantum states have been widely used in quantum information science and frequently arises in the quantification of optimal performances for the estimation and distinguish of quantum states. A fidelity function on quantum channel is expected to have same wide applications in quantum information science. In this paper we propose a fidelity function on quantum channels and sh… ▽ More

    Submitted 7 March, 2017; v1 submitted 2 June, 2015; originally announced June 2015.

    Comments: 15 pages. Comments are particularly welcome

  20. arXiv:1504.01035  [pdf, other

    cond-mat.soft

    Stable thermophoretic trap** of generic particles at low pressures

    Authors: Frankie Fung, Mykhaylo Usatyuk, B. J. DeSalvo, Cheng Chin

    Abstract: We demonstrate levitation and three-dimensionally stable trap** of a wide variety of particles in a vacuum chamber through the use of the thermophoretic force in the presence of a strong temperature gradient. Typical sizes of the trapped particles are between 10 microns and 1 mm at a pressure between 1 and 10 Torr. The trap** stability is provided by the geometry of the temperature field, as w… ▽ More

    Submitted 24 October, 2016; v1 submitted 4 April, 2015; originally announced April 2015.

    Journal ref: Appl. Phys. Lett. 110, 034102 (2017)

  21. Universal time scaling for Hamiltonian parameter estimation

    Authors: Haidong Yuan, Chi-Hang Fred Fung

    Abstract: Time is a valuable resource and it seems intuitive that longer time should lead to better precision in Hamiltonian parameter estimation. However recent studies have put this intuition into question, showing longer time may even lead to worse estimation in certain cases. Here we show that the intuition can be restored if coherent feedback controls are included. By deriving asymptotically optimal fe… ▽ More

    Submitted 24 March, 2015; originally announced March 2015.

    Comments: 5 pages. Comments and reference requests are welcomed

    Journal ref: Phys. Rev. Lett. 115, 110401 (2015)

  22. Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources

    Authors: Zhen-Qiang Yin, Chi-Hang Fred Fung, Xiongfeng Ma, Chun-Mei Zhang, Hong-Wei Li, Wei Chen, Shuang Wang, Guang-Can Guo, Zheng-Fu Han

    Abstract: In the postprocessing of quantum key distribution, the raw key bits from the mismatched-basis measurements, where two parties use different bases, are normally discarded. Here, we propose a postprocessing method that exploits measurement statistics from mismatched-basis cases, and prove that incorporating these statistics enables uncharacterized qubit sources to be used in the measurement-device-i… ▽ More

    Submitted 27 November, 2014; v1 submitted 7 July, 2014; originally announced July 2014.

    Comments: Part of this article contains a significant improvement over arXiv:1309.3819

    Journal ref: Phys. Rev. A 90, 052319 (2014)

  23. arXiv:1405.0198   

    quant-ph cs.CR

    No Superluminal Signaling Implies Unconditionally Secure Bit Commitment

    Authors: H. F. Chau, C. -H. Fred Fung, H. -K. Lo

    Abstract: Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on a… ▽ More

    Submitted 18 November, 2014; v1 submitted 1 May, 2014; originally announced May 2014.

    Comments: This paper has been withdrawn by the authors due to a crucial oversight on an earlier work by A. Kent

  24. arXiv:1404.4134  [pdf, ps, other

    quant-ph

    Solution to time-energy costs of quantum channels

    Authors: Chi-Hang Fred Fung, H. F. Chau, Chi-Kwong Li, Nung-Sing Sze

    Abstract: We derive a formula for the time-energy costs of general quantum channels proposed in [Phys. Rev. A 88, 012307 (2013)]. This formula allows us to numerically find the time-energy cost of any quantum channel using positive semidefinite programming. We also derive a lower bound to the time-energy cost for any channels and the exact the time-energy cost for a class of channels which includes the qudi… ▽ More

    Submitted 16 December, 2014; v1 submitted 16 April, 2014; originally announced April 2014.

    Comments: 9 pages

    Journal ref: Quantum Information and Computation 15, 0685-0693 (2015)

  25. Physical time-energy cost of a quantum process determines its information fidelity

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: A quantum system can be described and characterized by at least two different concepts, namely, its physical and informational properties. Here, we explicitly connect these two concepts, by equating the time-energy cost which is the product of the largest energy of a Hamiltonian of quantum dynamics and the evolution time, and the entanglement fidelity which is the informational difference between… ▽ More

    Submitted 25 August, 2014; v1 submitted 12 April, 2014; originally announced April 2014.

    Comments: 6 pages

    Journal ref: Phys. Rev. A 90, 022333 (2014)

  26. Time-Energy Costs of Quantum Measurements

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: Time and energy of quantum processes are a tradeoff against each other. We propose to ascribe to any given quantum process a time-energy cost to quantify how much computation it performs. Here, we analyze the time-energy costs for general quantum measurements, along a similar line as our previous work for quantum channels, and prove exact and lower bound formulae for the costs. We use these formul… ▽ More

    Submitted 8 May, 2014; v1 submitted 20 February, 2014; originally announced February 2014.

    Comments: 10 pages, 6 figures

    Journal ref: Phys. Rev. A 89, 052306 (2014)

  27. Two-way deterministic quantum key distribution against detector side channel attacks

    Authors: Hua Lu, Chi-Hang Fred Fung, Qing-yu Cai

    Abstract: In a two-way deterministic quantum key distribution (DQKD) protocol, Bob randomly prepares qubits in one of four states and sends them to Alice. To encode a bit, Alice performs an operation on each received qubit and returns it to Bob. Bob then measures the backward qubits to learn about Alice's operations and hence the key bits. Recently, we proved the unconditional security of the final key of t… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: Published version

    Journal ref: Phys. Rev. A 88, 044302 (2013)

  28. Measurement-device-independent quantum key distribution with uncharacterized qubit sources

    Authors: Zhen-Qiang Yin, Chi-Hang Fred Fung, Xiongfeng Ma, Chun-Mei Zhang, Hong-Wei Li, Wei Chen, Shuang Wang, Guang-Can Guo, Zheng-Fu Han

    Abstract: Measurement-device-independent quantum key distribution (MDIQKD) is proposed to be secure against any possible detection attacks. The security of the original proposal relies on the assumption that the legitimate users can fully characterize the encoding systems including sources. Here, we propose a MDIQKD protocol where we allow uncharacterized encoding systems as long as qubit sources are used.… ▽ More

    Submitted 23 December, 2013; v1 submitted 15 September, 2013; originally announced September 2013.

    Journal ref: Physical Review A 88, 062322 (2013)

  29. Conditions for degradability of tripartite quantum states

    Authors: Chi-Hang Fred Fung, Chi-Kwong Li, Nung-Sing Sze, H. F. Chau

    Abstract: Alice, Bob, and Eve share a pure quantum state. We introduce the notion of state degradability by asking whether the joint density of Alice and Eve can be transformed to the joint density of Alice and Bob by processing Eve's part through a quantum channel, in order words, degrading Eve. We prove necessary and sufficient conditions for state degradability and provide an efficient method to quickly… ▽ More

    Submitted 9 February, 2014; v1 submitted 29 August, 2013; originally announced August 2013.

    Comments: 20 pages, no figure

    Journal ref: J. Phys. A: Math. Theor. 47, 115306 (2014)

  30. arXiv:1308.2042  [pdf, other

    nlin.AO cond-mat.stat-mech physics.soc-ph

    Social Judgment Theory Based Model On Opinion Formation, Polarization And Evolution

    Authors: H. F. Chau, C. Y. Wong, F. K. Chow, C. -H. F. Fung

    Abstract: The dynamical origin of opinion polarization in the real world is an interesting topic physical scientists may help to understand. To properly model the dynamics, the theory must be fully compatible with findings by social psychologists on microscopic opinion change. Here we introduce a generic model of opinion formation with homogeneous agents based on the well-known social judgment theory in soc… ▽ More

    Submitted 26 July, 2014; v1 submitted 9 August, 2013; originally announced August 2013.

    Comments: 9 pages, 5 figures together with an addition 24 videos available on request, extensively revised, to appear in Physica A

    Journal ref: Physica A 415, 133-140 (2014)

  31. Time-Energy Measure for Quantum Processes

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: Quantum mechanics sets limits on how fast quantum processes can run given some system energy through time-energy uncertainty relations, and they imply that time and energy are tradeoff against each other. Thus, we propose to measure the time-energy as a single unit for quantum channels. We consider a time-energy measure for quantum channels and compute lower and upper bounds of it using the channe… ▽ More

    Submitted 9 July, 2013; v1 submitted 24 May, 2013; originally announced May 2013.

    Comments: 13 pages, 2 figures

    Journal ref: Phys. Rev. A 88, 012307 (2013)

  32. Source attack of decoy-state quantum key distribution using phase information

    Authors: Yan-Lin Tang, Hua-Lei Yin, Xiongfeng Ma, Chi-Hang Fred Fung, Yang Liu, Hai-Lin Yong, Teng-Yun Chen, Cheng-Zhi Peng, Zeng-Bing Chen, Jian-Wei Pan

    Abstract: Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-s… ▽ More

    Submitted 8 August, 2013; v1 submitted 9 April, 2013; originally announced April 2013.

    Comments: 12 pages, 5 figures

    Journal ref: Phys. Rev. A 88, 022308 (2013)

  33. Disguising quantum channels by mixing and channel distance trade-off

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: We consider the reverse problem to the distinguishability of two quantum channels, which we call the disguising problem. Given two quantum channels, the goal here is to make the two channels identical by mixing with some other channels with minimal mixing probabilities. This quantifies how much one channel can disguise as the other. In addition, the possibility to trade off between the two mixing… ▽ More

    Submitted 9 February, 2014; v1 submitted 5 November, 2012; originally announced November 2012.

    Comments: 27 pages, 8 figures. Added new results for using the disguising problem to lower and upper bound the diamond norm and to upper bound the key generation rate in quantum cryptography

    Journal ref: J. Phys. A: Math. Theor. 47, 105302 (2014)

  34. Statistical fluctuation analysis for measurement-device-independent quantum key distribution

    Authors: Xiongfeng Ma, Chi-Hang Fred Fung, Mohsen Razavi

    Abstract: Measurement-device-independent quantum key distribution with a finite number of decoy states is analyzed under finite-data-size assumption. By accounting for statistical fluctuations in parameter estimation, we investigate vacuum+weak- and vacuum+two-weak-decoy-state protocols. In each case, we find proper operation regimes, where the performance of our system is comparable to the asymptotic case… ▽ More

    Submitted 13 November, 2012; v1 submitted 15 October, 2012; originally announced October 2012.

    Comments: 18 pages, 4 figures

    Journal ref: Phys. Rev. A 86, 052305 (2012)

  35. Entanglement transformation between sets of bipartite pure quantum states using local operations

    Authors: H. F. Chau, Chi-Hang Fred Fung, Chi-Kwong Li, Edward Poon, Nung-Sing Sze

    Abstract: Alice and Bob are given an unknown initial state chosen from a set of pure quantum states. Their task is to transform the initial state to a corresponding final pure state using local operations only. We prove necessary and sufficient conditions on the existence of such a transformation. We also provide efficient algorithms that can quickly rule out the possibility of transforming a set of initial… ▽ More

    Submitted 12 October, 2012; v1 submitted 5 August, 2012; originally announced August 2012.

    Comments: 19 pages, 1 figure, minor revision, to appear in J.Math.Phys

  36. Structural Characterization And Condition For Measurement Statistics Preservation Of A Unital Quantum Operation

    Authors: Kai-Yan Lee, Chi-Hang Fred Fung, H. F. Chau

    Abstract: We investigate the necessary and sufficient condition for a convex cone of positive semidefinite operators to be fixed by a unital quantum operation $φ$ acting on finite-dimensional quantum states. By reducing this problem to the problem of simultaneous diagonalization of the Kraus operators associated with $φ$, we can completely characterize the kind of quantum states that are fixed by $φ$. Our w… ▽ More

    Submitted 15 April, 2013; v1 submitted 5 December, 2011; originally announced December 2011.

    Comments: 9 pages in revtex 4.1, minor revision, to appear in J.Phys.A

    Journal ref: J. Phys. A 46, 205305 (2013)

  37. Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol

    Authors: Chi-Hang Fred Fung, Xiongfeng Ma, H. F. Chau, Qing-yu Cai

    Abstract: Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA ha… ▽ More

    Submitted 9 March, 2012; v1 submitted 18 November, 2011; originally announced November 2011.

    Comments: 11 pages, 3 figures

    Journal ref: Phys. Rev. A 85, 032308 (2012)

  38. Phase encoding schemes for measurement device independent quantum key distribution and basis-dependent flaw

    Authors: Kiyoshi Tamaki, Hoi-Kwong Lo, Chi-Hang Fred Fung, Bing Qi

    Abstract: In this paper, we study the unconditional security of the so-called measurement device independent quantum key distribution (MDIQKD) with the basis-dependent flaw in the context of phase encoding schemes. We propose two schemes for the phase encoding, the first one employs a phase locking technique with the use of non-phase-randomized coherent pulses, and the second one uses conversion of standard… ▽ More

    Submitted 27 August, 2012; v1 submitted 14 November, 2011; originally announced November 2011.

    Comments: We include the erratum of this paper in Appendix C. The correction does not affect the validity of the main conclusions reported in the paper

    Journal ref: Phys. Rev. A 85, 042307 (2012)

  39. Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel

    Authors: Hua Lu, Chi-Hang Fred Fung, Xiongfeng Ma, Qing-yu Cai

    Abstract: In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob… ▽ More

    Submitted 31 October, 2011; originally announced November 2011.

    Comments: Publication version

    Journal ref: Phys. Rev. A 84, 042344 (2011)

  40. Universal Squash Model For Optical Communications Using Linear Optics And Threshold Detectors

    Authors: Chi-Hang Fred Fung, H. F. Chau, Hoi-Kwong Lo

    Abstract: The transmission of photons through open-air or an optical fiber is an important primitive in quantum information processing. Theoretical description of such a transmission process often considers only a single photon as the information carrier and thus fails to accurately describe experimental optical implementations where any number of photons may enter a detector. It is important to bridge this… ▽ More

    Submitted 12 November, 2010; originally announced November 2010.

    Comments: 14 pages

    Journal ref: Phys. Rev. A 84, 020303(R) (2011)

  41. Practical issues in quantum-key-distribution post-processing

    Authors: Chi-Hang Fred Fung, Xiongfeng Ma, H. F. Chau

    Abstract: Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length o… ▽ More

    Submitted 29 December, 2009; v1 submitted 1 October, 2009; originally announced October 2009.

    Comments: 17 pages, 5 figures

    Journal ref: Phys. Rev. A 81, 012318 (2010)

  42. Practical post-processing for quantum-key-distribution experiments

    Authors: Xiongfeng Ma, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau

    Abstract: Quantum key distribution (QKD) promises unconditionally secure key generation between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurements on quantum states are transformed to a secret key and this has to be done in accordance with a security proof. Unfortunately, many theoretical proofs are not readily implementable in experiments and do no… ▽ More

    Submitted 13 April, 2009; originally announced April 2009.

    Comments: Comments are welcome

    Journal ref: Computers & Security Volume 30, Issue 4, June 2011, Pages 172-177

  43. Getting Information on Independently Prepared Quantum States -- When Are Individual Measurements as Powerful as Joint Measurements?

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: Given a composite quantum system in which the states of the subsystems are independently (but not necessarily identically) prepared, we construct separate measurements on the subsystems from any given joint measurement such that the former always give at least as large information as the latter. This construction offers new insights into the understanding of measurements on this type of composit… ▽ More

    Submitted 15 October, 2008; v1 submitted 20 August, 2008; originally announced August 2008.

    Comments: 5 pages, 1 figure

    Journal ref: Phys. Rev. A 78, 062308 (2008)

  44. Security proof of differential phase shift quantum key distribution in the noiseless case

    Authors: Yi-Bo Zhao, Chi-Hang Fred Fung, Zheng-Fu Han, Guang-Can Guo

    Abstract: Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation. However, its unconditional security proof is still missing, even though it has been proposed for many years. Here, we prove its security against collective attacks with a weak coherent light source in the noiseless case (i.e. no bit error). The only assumptions are that quantu… ▽ More

    Submitted 28 October, 2008; v1 submitted 12 June, 2008; originally announced June 2008.

    Comments: Published version, 13 pages, 4 figures, minor changes, references added, acknowledgement added

    Journal ref: Phys. Rev. A 78, 042330 (2008)

  45. arXiv:0802.3788  [pdf, ps, other

    quant-ph

    Security proof of quantum key distribution with detection efficiency mismatch

    Authors: Chi-Hang Fred Fung, Kiyoshi Tamaki, Bing Qi, Hoi-Kwong Lo, Xiongfeng Ma

    Abstract: In theory, quantum key distribution (QKD) offers unconditional security based on the laws of physics. However, as demonstrated in recent quantum hacking theory and experimental papers, detection efficiency loophole can be fatal to the security of practical QKD systems. Here, we describe the physical origin of detection efficiency mismatch in various domains including spatial, spectral, and time… ▽ More

    Submitted 15 October, 2008; v1 submitted 26 February, 2008; originally announced February 2008.

    Comments: 35 pages, 7 figures

    Journal ref: Quantum Information and Computation, vol. 9, pp. 0131-0165 (2009)

  46. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    Authors: Yi Zhao, Chi-Hang Fred Fung, Bing Qi, Christine Chen, Hoi-Kwong Lo

    Abstract: Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to… ▽ More

    Submitted 1 April, 2011; v1 submitted 24 April, 2007; originally announced April 2007.

    Comments: 5 pages, 3 figures. Substantially revised version

    Journal ref: Physical Review A, 78, 042333 (2008)

  47. Quantum key distribution with entangled photon sources

    Authors: Xiongfeng Ma, Chi-Hang Fred Fung, Hoi-Kwong Lo

    Abstract: A parametric down-conversion (PDC) source can be used as either a triggered single photon source or an entangled photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. In this paper, we fill in this important gap by proposing such… ▽ More

    Submitted 14 March, 2007; originally announced March 2007.

    Comments: comments are most welcome

    Journal ref: Phys. Rev. A 76, 012307 (2007)

  48. Security proof of a three-state quantum key distribution protocol without rotational symmetry

    Authors: Chi-Hang Fred Fung, Hoi-Kwong Lo

    Abstract: Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0_z> and |1_z>, can contribute to key generation and the third state, |+>=(|0_z>+|1_z>)/\s… ▽ More

    Submitted 20 September, 2006; v1 submitted 8 July, 2006; originally announced July 2006.

    Comments: 10 pages, 3 figures, 2 columns

    Journal ref: Physical Review A 74, 042342 (2006)

  49. Discrete Rotational Symmetry and Quantum Key Distribution Protocols

    Authors: David Shirokoff, Chi-Hang Fred Fung, Hoi-Kwong Lo

    Abstract: We study the role of discrete rotational symmetry in quantum key distribution by generalizing the well-known Bennett-Brassard 1984 (BB84) and Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocols. We observe that discrete rotational symmetry results in the protocol's invariance to continuous rotations, thus leading to a simplified relation between bit and phase error rates and consequently a straig… ▽ More

    Submitted 21 December, 2006; v1 submitted 27 April, 2006; originally announced April 2006.

    Comments: 7 pages

    Journal ref: Phys. Rev. A 75, 032341 (2007)

  50. Decoy state quantum key distribution with two-way classical post-processing

    Authors: Xiongfeng Ma, Chi-Hang Fred Fung, Frédéric Dupuis, Kai Chen, Kiyoshi Tamaki, Hoi-Kwong Lo

    Abstract: Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution protocols when a coherent state source is used. Previously, data post-processing schemes based on one-way classical communications were considered for use with decoy states. In this paper, we develop two data post-processing schemes for the decoy-state method using… ▽ More

    Submitted 12 April, 2006; originally announced April 2006.

    Journal ref: PHYSICAL REVIEW A 74, 032330 (2006)