Skip to main content

Showing 1–14 of 14 results for author: Liss, R

.
  1. arXiv:2407.03087  [pdf, other

    quant-ph

    Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks

    Authors: Carlos Pascual-García, Stefan Bäuml, Mateus Araújo, Rotem Liss, Antonio Acín

    Abstract: Continuous variable quantum key distribution (CVQKD) with discrete modulation combines advantages of CVQKD, such as the implementability using readily available technologies, with advantages of discrete variable quantum key distribution, such as easier error correction procedures. We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob perfo… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: 24 pages, 5 figures

  2. Geometry of entanglement and separability in Hilbert subspaces of dimension up to three

    Authors: Rotem Liss, Tal Mor, Andreas Winter

    Abstract: We present a complete classification of the geometry of the mutually complementary sets of entangled and separable states in three-dimensional Hilbert subspaces of bipartite and multipartite quantum systems. Our analysis begins by finding the geometric structure of the pure product states in a given three-dimensional Hilbert subspace, which determines all the possible separable and entangled mixed… ▽ More

    Submitted 21 June, 2024; v1 submitted 10 September, 2023; originally announced September 2023.

    Comments: 22 pages; 5 figures

    Journal ref: Letters in Mathematical Physics 114, 86 (2024)

  3. Simple and Rigorous Proof Method for the Security of Practical Quantum Key Distribution in the Single-Qubit Regime Using Mismatched Basis Measurements

    Authors: Michel Boyer, Gilles Brassard, Nicolas Godbout, Rotem Liss, Stéphane Virally

    Abstract: Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key. While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes, and practical devices are still not fully characterized for obtaining tight and realistic key rates… ▽ More

    Submitted 3 July, 2023; v1 submitted 29 August, 2022; originally announced August 2022.

    Comments: 25 pages

    Journal ref: Quantum Reports 2023, 5(1), 52-77

  4. arXiv:2208.12154  [pdf, other

    quant-ph cs.CR

    Composable Security of Generalized BB84 Protocols Against General Attacks

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: Quantum key distribution (QKD) protocols make it possible for two parties to generate a secret shared key. One of the most important QKD protocols, BB84, was suggested by Bennett and Brassard in 1984. Various proofs of unconditional security for BB84 have been suggested, but the first security proofs were not composable. Here we improve a security proof of BB84 given by [Biham, Boyer, Boykin, Mor,… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

    Comments: 51 pages; 1 figure

  5. arXiv:2111.10092  [pdf, other

    cs.CC quant-ph

    Non-NP-Hardness of Translationally-Invariant Spin-Model Problems

    Authors: Rotem Liss, Tal Mor, Roman Shapira

    Abstract: Finding the ground state energy of the Heisenberg Hamiltonian is an important problem in the field of condensed matter physics. In some configurations, such as the antiferromagnetic translationally-invariant case on the 2D square lattice, its exact ground state energy is still unknown. We show that finding the ground state energy of the Heisenberg model cannot be an NP-Hard problem unless P=NP. We… ▽ More

    Submitted 19 November, 2021; originally announced November 2021.

  6. Security Proof Against Collective Attacks for an Experimentally Feasible Semiquantum Key Distribution Protocol

    Authors: Walter O. Krawec, Rotem Liss, Tal Mor

    Abstract: Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQ… ▽ More

    Submitted 3 July, 2023; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 16 pages; 3 figures

    Journal ref: IEEE Transactions on Quantum Engineering, Volume 4, 2023, 2100316

  7. arXiv:2011.02232  [pdf, other

    quant-ph cs.ET

    Quantum Communication -- Celebrating the Silver Jubilee of Teleportation

    Authors: Rotem Liss, Tal Mor

    Abstract: This is an editorial paper presenting the meaning, history, and influence of quantum teleportation.

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: 6 pages; 1 figure; editorial paper for the eponymous Special Issue published in Entropy: see https://www.mdpi.com/journal/entropy/special_issues/Quantum_Communication

    Journal ref: Entropy 2020, 22(6), 628

  8. From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems

    Authors: Rotem Liss, Tal Mor

    Abstract: The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689 (2010)] is a practical attack, fully implementable against quantum key distribution systems. In contrast to almost all developments in quantum information processing (for example, Shor's factorization algorithm, quantum teleportation, Bennett-Brassard (BB84) quantum key distribution, the "Photon-Number Splitting" attack, an… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: 17 pages

    Journal ref: In Proceedings of the International Conference on the Theory and Practice of Natural Computing (TPNC 2020), pages 82-94. Lecture Notes in Computer Science, vol 12494. Springer, Cham (2020)

  9. arXiv:1812.00671  [pdf, other

    quant-ph cond-mat.str-el

    Topological order on the Bloch sphere

    Authors: Rotem Liss, Tal Mor, Roman Orus

    Abstract: A Bloch sphere is the geometrical representation of an arbitrary two-dimensional Hilbert space. Possible classes of entanglement and separability for the pure and mixed states on the Bloch sphere were suggested by [M. Boyer, R. Liss, T. Mor, PRA 95, 032308 (2017)]. Here we construct a Bloch sphere for the Hilbert space spanned by one of the ground states of Kitaev's toric code model and one of its… ▽ More

    Submitted 29 March, 2020; v1 submitted 3 December, 2018; originally announced December 2018.

    Comments: 15 pages; 5 figures

    Journal ref: New J. Phys. 22, 033023 (2020)

  10. arXiv:1806.06213  [pdf, other

    quant-ph cs.CR

    Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and prov… ▽ More

    Submitted 18 July, 2018; v1 submitted 16 June, 2018; originally announced June 2018.

    Comments: 9 pages

    Journal ref: Entropy 2018, 20(7), 536

  11. Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z… ▽ More

    Submitted 19 November, 2019; v1 submitted 27 November, 2017; originally announced November 2017.

    Comments: 24 pages; 1 figure; this is an improved version of arXiv:1704.01388 [quant-ph], extended to make the security proof (against collective attacks) fully composable

    Journal ref: Theoretical Computer Science 801, 96-109 (2020)

  12. Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous pap… ▽ More

    Submitted 5 April, 2017; originally announced April 2017.

    Comments: 6 pages; 1 figure

    Journal ref: In Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk - Volume 1: COMPLEXIS, pages 23-29, Porto, Portugal (2017)

  13. Experimentally feasible protocol for semiquantum key distribution

    Authors: Michel Boyer, Matty Katz, Rotem Liss, Tal Mor

    Abstract: Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current… ▽ More

    Submitted 29 December, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: 6 pages

    Journal ref: Phys. Rev. A 96, 062335 (2017)

  14. Geometry of entanglement in the Bloch sphere

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: Entanglement is an important concept in quantum information, quantum communication, and quantum computing. We provide a geometrical analysis of entanglement and separability for all the rank-2 quantum mixed states: complete analysis for the bipartite states, and partial analysis for the multipartite states. For each rank-2 mixed state, we define its unique Bloch sphere, that is spanned by the eige… ▽ More

    Submitted 8 March, 2017; v1 submitted 2 August, 2016; originally announced August 2016.

    Comments: 7 pages; 5 figures

    Journal ref: Phys. Rev. A 95, 032308 (2017)