Skip to main content

Showing 1–5 of 5 results for author: Lutkenhaus, N

Searching in archive cs. Search in all archives.
.
  1. Practical Quantum Appointment Scheduling

    Authors: Dave Touchette, Benjamin Lovitz, Norbert Lütkenhaus

    Abstract: We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

    Comments: 7 figures

    Journal ref: Phys. Rev. A 97, 042320 (2018)

  2. arXiv:1712.02617  [pdf, other

    cs.CR cs.NI quant-ph

    The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

    Authors: Piotr K. Tysowski, Xinhua Ling, Norbert Lütkenhaus, Michele Mosca

    Abstract: Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an ent… ▽ More

    Submitted 7 December, 2017; originally announced December 2017.

  3. arXiv:1310.5059  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Squashing model for detectors and applications to quantum key distribution protocols

    Authors: Oleg Gittsovich, Normand J. Beaudry, Varun Narasimhachar, Ruben Romero Alvarez, Tobias Moroder, Norbert Lütkenhaus

    Abstract: We develop a framework that allows a description of measurements in Hilbert spaces that are smaller than their natural representation. This description, which we call a "squashing model", consists of a squashing map that maps the input states of the measurement from the original Hilbert space to the smaller one, followed by a targeted prescribed measurement on the smaller Hilbert space. This frame… ▽ More

    Submitted 18 October, 2013; originally announced October 2013.

    Comments: 24 pages main text, 12 figures, 4 pages appendix, 1 figure

    Journal ref: Phys. Rev. A 89, 012325 (2014)

  4. arXiv:0905.4325  [pdf, other

    quant-ph cs.CR

    Updating Quantum Cryptography Report ver. 1

    Authors: Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Luetkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney van Meter, Atsuhiro Yamagishi , et al. (2 additional authors not shown)

    Abstract: Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements a… ▽ More

    Submitted 27 May, 2009; originally announced May 2009.

    Comments: 74 pages

  5. arXiv:quant-ph/0701168  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Using quantum key distribution for cryptographic purposes: a survey

    Authors: Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger

    Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the… ▽ More

    Submitted 4 December, 2014; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81

    Journal ref: Theoretical Computer Science, 560 (2014), pp. 62-81