Skip to main content

Showing 201–230 of 230 results for author: Lo, H

.
  1. arXiv:quant-ph/0011056  [pdf, ps, other

    quant-ph

    Efficient Quantum Key Distribution Scheme And Proof of Its Unconditional Security

    Authors: Hoi-Kwong Lo, H. F. Chau, M. Ardehali

    Abstract: We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard. We also prove the security of our modified scheme against the most general eavesdrop** attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the diffe… ▽ More

    Submitted 8 July, 2005; v1 submitted 13 November, 2000; originally announced November 2000.

    Comments: Paper published in J. of Cryptology. Preprint version: 46 pages

    Journal ref: J. of Cryptology, 18, Number 2, (2005) 133-165

  2. arXiv:quant-ph/9912011  [pdf, ps, other

    quant-ph

    Will Quantum Cryptography ever become a successful technology in the marketplace?

    Authors: Hoi-Kwong Lo

    Abstract: We assess the potential of quantum cryptography as a technology. We highlight the fact that academia and real world have rather different perspectives and interests. Then, we describe the various real life forces (different types of users, vendors of crypto-systems, conventional cryptographers, governments) behind the decision of the adoption (or rejection) of quantum cryptography and their diff… ▽ More

    Submitted 2 December, 1999; originally announced December 1999.

    Comments: 6 pages, RevTex, two-column format

    Journal ref: A substantially shortened and edited version appeared in Physics World, June 2000, p. 17

  3. Classical Communication Cost in Distributed Quantum Information Processing - A generalization of Quantum Communication Complexity

    Authors: Hoi-Kwong Lo

    Abstract: We study the amount of classical communication needed for distributed quantum information processing. In particular, we introduce the concept of "remote preparation" of a quantum state. Given an ensemble of states, Alice's task is to help Bob in a distant laboratory to prepare a state of her choice. We find several examples of an ensemble with an entropy S where the remote preparation can be don… ▽ More

    Submitted 14 April, 2000; v1 submitted 2 December, 1999; originally announced December 1999.

    Comments: Revised Version. Accepted on March 31 for publication in Physical Review A. Proof of Theorem 3 clarified. A Proviso added to the statement of Conjecture 4. Related results on randomization and private quantum channel noted

  4. A simple proof of the unconditional security of quantum key distribution

    Authors: Hoi-Kwong Lo

    Abstract: Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties. Here, a conceptually simpler proof of security of quantum key distribution is presented. The new insight is the invariance of the error rate of a teleportation channel: We show that the error rate of a teleport… ▽ More

    Submitted 27 April, 1999; originally announced April 1999.

    Comments: 13 pages, extended abstract. Comments will be appreciated

    Journal ref: J.Phys.A34:6957-6968,2001

  5. The classical communication cost of entanglement manipulation: Is entanglement an inter-convertible resource?

    Authors: Hoi-Kwong Lo, Sandu Popescu

    Abstract: Entanglement bits or ``ebits'' have been proposed as a quantitative measure of a fundamental resource in quantum information processing. For such an interpretation to be valid, it is important to show that the same number of ebits in different forms or concentrations are inter-convertible in the asymptotic limit. Here we draw attention to a very important but hitherto unnoticed aspect of entangl… ▽ More

    Submitted 7 July, 1999; v1 submitted 10 February, 1999; originally announced February 1999.

    Comments: 8 pages, RevTex, Accepted for Publication in Physical Review Letters

  6. How to share a quantum secret

    Authors: Richard Cleve, Daniel Gottesman, Hoi-Kwong Lo

    Abstract: We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold schemes comes from the quantum "no-cloning… ▽ More

    Submitted 11 January, 1999; originally announced January 1999.

    Comments: 5 pages, REVTeX, submitted to PRL

    Report number: LAUR98-5842

    Journal ref: Phys.Rev.Lett. 83 (1999) 648-651

  7. arXiv:quant-ph/9805080  [pdf, ps, other

    quant-ph

    A quantum analog of Huffman coding

    Authors: Samuel L. Braunstein, Christopher A. Fuchs, Daniel Gottesman, Hoi-Kwong Lo

    Abstract: We analyze a generalization of Huffman coding to the quantum case. In particular, we notice various difficulties in using instantaneous codes for quantum communication. Nevertheless, for the storage of quantum information, we have succeeded in constructing a Huffman-coding inspired quantum scheme. The number of computational steps in the encoding and decoding processes of N quantum signals can b… ▽ More

    Submitted 18 May, 1999; v1 submitted 27 May, 1998; originally announced May 1998.

    Comments: Revised version, 7 pages, two-column, RevTex. Presented at 1998 IEEE International Symposium on Information Theory

  8. arXiv:quant-ph/9803007  [pdf, ps, other

    quant-ph

    Efficient Quantum Key Distribution

    Authors: M. Ardehali, H. F. Chau, Hoi-Kwong Lo

    Abstract: We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in p… ▽ More

    Submitted 29 January, 1999; v1 submitted 2 March, 1998; originally announced March 1998.

    Comments: Minor revisions for clarification. One author dropped

  9. Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances

    Authors: Hoi-Kwong Lo, H. F. Chau

    Abstract: Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of… ▽ More

    Submitted 6 December, 1999; v1 submitted 2 March, 1998; originally announced March 1998.

    Comments: This reprint version contains the same material as the one published in Science 283, 2050-2056 (1999). We also include the refereed supplementary Notes (as in http://www.sciencemag.org/feature/data/984035.shl) explicitly in the appendix for easy reference

    Journal ref: Science 283 (1999) 2050-2056

  10. Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible

    Authors: H. -K. Lo, H. F. Chau

    Abstract: There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen (EPR) type of attack and delaying her measurements. One might wonder if secure… ▽ More

    Submitted 26 November, 1997; originally announced November 1997.

    Comments: We emphasize the generality of this "no-go theorem". All bit commitment schemes---fully quantum, classical and quantum but with measurements---are shown to be necessarily insecure. Accepted for publication in a special issue of Physica D. About 18 pages in elsart.sty. This is an extended version of an earlier manuscript (quant-ph/9605026) which has appeared in the proceedings of PHYSCOMP'96

    Journal ref: Physica D120 (1998) 177-187

  11. Making An Empty Promise With A Quantum Computer

    Authors: H. F. Chau, H. -K. Lo

    Abstract: Alice has made a decision in her mind. While she does not want to reveal it to Bob at this moment, she would like to convince Bob that she is committed to this particular decision and that she cannot change it at a later time. Is there a way for Alice to get Bob's trust? Until recently, researchers had believed that the above task can be performed with the help of quantum mechanics. And the secu… ▽ More

    Submitted 7 October, 1997; v1 submitted 27 September, 1997; originally announced September 1997.

    Comments: We have revised our paper to emphasize that the result applies to all bit commitment schemes (including ones with measurements). Besides, some minor inaccuracy was corrected

    Report number: HKUPHYS-HFC-03

    Journal ref: Fortsch.Phys. 46 (1998) 507-520

  12. arXiv:quant-ph/9707038  [pdf, ps, other

    quant-ph

    Concentrating entanglement by local actions---beyond mean values

    Authors: Hoi-Kwong Lo, Sandu Popescu

    Abstract: Suppose two distant observers Alice and Bob share a pure bipartite quantum state. By applying local operations and communicating with each other using a classical channel, Alice and Bob can manipulate it into some other states. Previous investigations of entanglement manipulations have been largely limited to a small number of strategies and their average outcomes. Here we consider a general ent… ▽ More

    Submitted 8 July, 1999; v1 submitted 20 July, 1997; originally announced July 1997.

    Comments: Substantially revised for clarity, Results unchanged, RevTex, 16 pages. Warning: The abstract posted on quant-ph is a truncated version which satisfies the 24-line limit

  13. Insecurity of Quantum Secure Computations

    Authors: Hoi-Kwong Lo

    Abstract: It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation. If this were the case, quantum smart-cards could prevent fake teller machines from learning the PIN (Personal Identification Number) from the customers' input. Although such optimism has been challenged by the recent surprising discov… ▽ More

    Submitted 28 April, 1997; v1 submitted 19 November, 1996; originally announced November 1996.

    Comments: The discussion on the insecurity of even non-ideal protocols has been greatly extended. Other technical points are also clarified. Version accepted for publication in Phys. Rev. A

  14. arXiv:quant-ph/9605026  [pdf, ps, other

    quant-ph

    Why quantum bit commitment and ideal quantum coin tossing are impossible

    Authors: Hoi-Kwong Lo, H. F. Chau

    Abstract: There had been well known claims of ``provably unbreakable'' quantum protocols for bit commitment and coin tossing. However, we, and independently Mayers, showed that all proposed quantum bit commitment (and therefore coin tossing) schemes are, in principle, insecure because the sender, Alice, can always cheat successfully by using an EPR-type of attack and delaying her measurements. One might w… ▽ More

    Submitted 22 August, 1996; v1 submitted 16 May, 1996; originally announced May 1996.

    Comments: Replaced to give appropriate reference to D. Mayers' works and to fix a crucial bug in the original proof of the impossibility of ideal quantum coin tossing. Other minor changes are also made to clarify the discussion

    Report number: IASSNS-HEP-96/50

  15. arXiv:quant-ph/9605025  [pdf, ps, other

    quant-ph

    How much does it cost to teleport?

    Authors: H. F. Chau, H. -K. Lo

    Abstract: We show that the entropy of entanglement of a state characterizes its ability to teleport. In particular, in order to teleport faithfully an unknown quantum $N$-state, the two users must share an entangled state with at least $\log_2 N$ bits entropy of entanglement. We also note that the maximum capacity for a mixed state ${\cal M}$ to teleport equals the maximum amount of entanglement entropy t… ▽ More

    Submitted 16 May, 1996; originally announced May 1996.

    Comments: 5 pages, extended abstract submitted to PHYSCOMP96

    Report number: IASSNS-HEP-96/51

  16. Is Quantum Bit Commitment Really Possible?

    Authors: Hoi-Kwong Lo, H. F. Chau

    Abstract: We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen type of attack and delaying her measurement until she opens her commitment.

    Submitted 2 April, 1997; v1 submitted 4 March, 1996; originally announced March 1996.

    Comments: Major revisions to include a more extensive introduction and an example of bit commitment. Overlap with independent work by Mayers acknowledged. More recent works by Mayers, by Lo and Chau and by Lo are also noted. Accepted for publication in Phys. Rev. Lett

    Journal ref: Phys. Rev. Lett. 78, 3410 (1997)

  17. arXiv:quant-ph/9511025  [pdf, ps, other

    quant-ph

    Quantum Cryptography in Noisy Channels

    Authors: Hoi-Kwong Lo, H. F. Chau

    Abstract: We provide a complete proof of the security of quantum cryptography against any eavesdrop** attack including coherent measurements even in the presence of noise. Polarization-based cryptographic schemes are shown to be equivalent to EPR-based schemes. We also show that the performance of a noisy channel approaches that of a noiseless one as the error rate tends to zero. (i.e., the secrecy capa… ▽ More

    Submitted 20 November, 1995; originally announced November 1995.

    Comments: 22 pages, REVTEX

    Report number: IASSNS-HEP-95/93

  18. arXiv:quant-ph/9508005  [pdf, ps, other

    quant-ph

    Primality Test Via Quantum Factorization

    Authors: H. F. Chau, H. -K. Lo

    Abstract: We consider a probabilistic quantum implementation of a variable of the Pocklington-Lehmer $N-1$ primality test using Shor's algorithm. O($\log^3 N \log\log N \log\log\log N$) elementary q-bit operations are required to determine the primality of a number $N$, making it (asymptotically) the fastest known primality test. Thus, the potential power of quantum mechanical computers is once again reve… ▽ More

    Submitted 1 December, 1996; v1 submitted 5 August, 1995; originally announced August 1995.

    Comments: Using REVTEX 3.0, AMS fonts required. Typos corrected. To appear in Int.J.Mod.Phys.C

    Report number: IASSNS-HEP-95/69

  19. arXiv:quant-ph/9506012  [pdf, ps, other

    quant-ph

    One-way Functions In Reversible Computations

    Authors: H. F. Chau, H. -K. Lo

    Abstract: One-way functions are used in modern cryto-systems as doortraps because their inverse functions are supposed to be difficult to compute. Nonetheless with the discovery of reversible computation, it seems that one may break a one-way function by running a reversible computer backward. Here, we argue that reversible computation alone poses no threat to the existence of one-way functions because of… ▽ More

    Submitted 1 December, 1996; v1 submitted 8 June, 1995; originally announced June 1995.

    Comments: In REVTEX 3.0, with one figure. Minor changes. To appear in Cryptologia

    Report number: IASSNS-HEP-95/47

  20. arXiv:hep-th/9505108  [pdf, ps, other

    hep-th

    Wavefunctions for Non-Abelian Vortices

    Authors: Kai-Ming Lee, Hoi-Kwong Lo

    Abstract: We construct exact wavefunctions of two vortices on a plane, a single vortex on the cylinder and a vortex on the torus. In each case, the physics is shown to be equivalent to a particle moving in a covering space, something simple to solve in those examples. We describe how our solutions fit into the general theory of quantum mechanics of $N$ particles on a two-dimensional space and attribute ou… ▽ More

    Submitted 18 January, 1997; v1 submitted 17 May, 1995; originally announced May 1995.

    Comments: Reference added

    Report number: IASSNS-HEP-95/34 ; OUTP-95-20P

  21. Quantum Coding Theorem for Mixed States

    Authors: Hoi-Kwong Lo

    Abstract: We prove a theorem for coding mixed-state quantum signals. For a class of coding schemes, the von Neumann entropy $S$ of the density operator describing an ensemble of mixed quantum signal states is shown to be equal to the number of spin-$1/2$ systems necessary to represent the signal faithfully. This generalizes previous works on coding pure quantum signal states and is analogous to the Shanno… ▽ More

    Submitted 18 April, 1995; v1 submitted 4 April, 1995; originally announced April 1995.

    Comments: Overlap with some unpublished work noted. Limitation clarified. 11 pages, REVTEX, amsfonts

    Report number: IASSNS-HEP-95/23

  22. arXiv:hep-th/9502080  [pdf, ps, other

    hep-th hep-lat hep-ph

    Aharonov-Bohm Order Parameters for Non-Abelian Gauge Theories

    Authors: Hoi-Kwong Lo

    Abstract: The Aharonov-Bohm effect has been invoked to probe the phase structure of a gauge theory. Yet in the case of non-Abelian gauge theories, it proves difficult to formulate a general procedure that unambiguously specifies the realization of the gauge symmetry, e.g. the unbroken subgroup. In this paper, we propose a set of order parameters that will do the job. We articulate the fact that any useful… ▽ More

    Submitted 28 September, 1995; v1 submitted 14 February, 1995; originally announced February 1995.

    Comments: How quantum fluctuations destroy the coherence between various strings are discussed explicitly. That linked Wilson loops are useful order parameters for a Maxwell- Chern-Simons-Higgs theory is noted. The generality of our results is emphasized. Problems with figures have also been fixed. 43 pages, 13 figures, Revtex, accepted for publication in PRD

    Report number: IASSNS-HEP-95/8

    Journal ref: Phys.Rev. D52 (1995) 7247-7264

  23. arXiv:hep-th/9502079  [pdf, ps, other

    hep-th hep-lat hep-ph

    Elusive Order Parameters for Non-Abelian Gauge Theories

    Authors: Hoi-Kwong Lo

    Abstract: In this Letter, we construct a set of order parameters for non-Abelian gauge theories which probe directly the unbroken group and are free of the deficiencies caused by quantum fluctuations and gauge fixing which have plagued all previous attempts. These operators can be used to map out the phase diagram of a non-Abelian gauge theory.

    Submitted 28 September, 1995; v1 submitted 14 February, 1995; originally announced February 1995.

    Comments: companion paper to hep-th/9502080. Problem with figures fixed. 11 pages, 2 figures, Revtex

    Report number: IASSNS-HEP-95/4

  24. arXiv:hep-th/9411133  [pdf, ps, other

    hep-th cond-mat hep-lat hep-ph

    Order Parameters for Non-Abelian Gauge Theories

    Authors: Hoi-Kwong Lo

    Abstract: Owing to subtle issues concerning quantum fluctuations and gauge fixing, a formulation of a general procedure to specify the realization of non-Abelian gauge symmetry has evaded all earlier attempts. In this Letter, we discuss these subtleties and present two sets of order parameters for non-Abelian gauge theories. Such operators directly probe the manifest low energy symmetry group and are cruc… ▽ More

    Submitted 17 November, 1994; originally announced November 1994.

    Comments: 10p, revtex, 3 figures available upon request

    Report number: IASSNS-HEP-94/92

  25. Is baryon number violated when electroweak strings intercommute?

    Authors: Hoi-Kwong Lo

    Abstract: We reexamine the self-helicity and the intercommutation of electroweak strings. A plausible argument for baryon number conservation when electroweak strings intercommute is presented. The connection between a segment of electroweak strings and a sphaleron is also discussed.

    Submitted 14 October, 1994; v1 submitted 15 September, 1994; originally announced September 1994.

    Comments: CALT-68-1948, 11 pages, 5 figures available upon request. Replaced with revised version. (Request should be sent to [email protected])

    Journal ref: Phys. Rev. D 51, 7152 (1995)

  26. Scattering from Electroweak Strings

    Authors: Hoi-Kwong LO

    Abstract: The scattering of a charged fermion from an electroweak string is studied. Owing to an amplification of the wave function at the core radius, the cross sections for helicity flip processes can be largely enhanced. For $0 <\sin^2 θ_w < 1/2 $ (where $θ_w$ is the Weinberg angle), $ω\sim k \sim m_e$ and $kR \ll 1$, we show that the helicity flip differential cross section for electrons is of the ord… ▽ More

    Submitted 26 April, 1994; v1 submitted 15 April, 1994; originally announced April 1994.

    Comments: Replaced with revised version "Tex with phyzzx, 18 pages, CALT-68-1921 Non-trivial changes made: discussion on axion strings corrected. Overlap with a recently revised version of hep-ph/9311202 noted

    Journal ref: Phys.Rev. D51 (1995) 802-809

  27. Complementarity in Wormhole Chromodynamics

    Authors: Hoi-Kwong Lo, Kai-Ming Lee, John Preskill

    Abstract: The electric charge of a wormhole mouth and the magnetic flux ``linked'' by the wormhole are non-commuting observables, and so cannot be simultaneously diagonalized. We use this observation to resolve some puzzles in wormhole electrodynamics and chromodynamics. Specifically, we analyze the color electric field that results when a colored object traverses a wormhole, and we discuss the measuremen… ▽ More

    Submitted 9 August, 1993; originally announced August 1993.

    Comments: 12 pages and 2 figures, phyzzx, CALT-68-1880

    Journal ref: Phys.Lett. B318 (1993) 287-292

  28. Exact Wavefunctions for non-Abelian Chern-Simons Particles

    Authors: Hoi-Kwong Lo

    Abstract: Exact wavefunctions for N non-Abelian Chern-Simons (NACS) particles are obtained by the ladder operator approach. The same method has previously been applied to construct exact wavefunctions for multi-anyon systems. The two distinct base states of the NACS particles that we use are multi-valued and are defined in terms of path ordered line integrals. Only strings of operators that preserve the m… ▽ More

    Submitted 16 June, 1993; originally announced June 1993.

    Comments: 19 pages, CALT-68-1875

    Journal ref: Phys.Rev.D48:4999-5005,1993

  29. Non-abelian vortices and non-abelian statistics

    Authors: Hoi-Kwong Lo, John Preskill

    Abstract: We study the interactions of non-abelian vortices in two spatial dimensions. These interactions have novel features, because the Aharonov-Bohm effect enables a pair of vortices to exchange quantum numbers. The cross section for vortex-vortex scattering is typically a multi-valued function of the scattering angle. There can be an exchange contribution to the vortex-vortex scattering amplitude tha… ▽ More

    Submitted 1 June, 1993; originally announced June 1993.

    Comments: 38 pages and 6 figures, REVTEX (version 2) and epsf.tex, CALT-68-1867

    Journal ref: Phys.Rev. D48 (1993) 4821-4834

  30. Topological Approach to Alice Electrodynamics

    Authors: Martin Bucher, Hoi-Kwong Lo, John Preskill

    Abstract: We analyze the unlocalized ``Cheshire charge'' carried by ``Alice strings.'' The magnetic charge on a string loop is carefully defined, and the transfer of magnetic charge from a monopole to a string loop is analyzed using global topological methods. A semiclassical theory of electric charge transfer is also described.

    Submitted 16 December, 1991; originally announced December 1991.

    Comments: (26 pp)

    Journal ref: Nucl.Phys. B386 (1992) 3-26