Skip to main content

Showing 1–36 of 36 results for author: Huang, A

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2405.04415  [pdf, other

    quant-ph

    100 Gbps Quantum-safe IPsec VPN Tunnels over 46 km Deployed Fiber

    Authors: Obada Alia, Albert Huang, Huan Luo, Omar Amer, Marco Pistoia, Charles Lim

    Abstract: We demonstrated for the first time quantum-safe high-speed 100 Gbps site-to-site IPsec tunnels secured using Quantum Key Distribution (QKD) technology. The demonstration was conducted between two JPMorgan Chase Data Centers (DCs) in an air-gapped environment over 46 km of deployed telecom fiber across Singapore achieving 45 days of continuous operation. Two different Virtual Private Network (VPN)… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 7 pages, 4 figures, 1 table

  2. arXiv:2312.06062  [pdf, other

    quant-ph

    Randomised benchmarking for characterizing and forecasting correlated processes

    Authors: Xinfang Zhang, Zhihao Wu, Gregory A. L. White, Zhongcheng Xiang, Shun Hu, Zhihui Peng, Yong Liu, Dongning Zheng, Xiang Fu, Anqi Huang, Dario Poletti, Kavan Modi, Junjie Wu, Mingtang Deng, Chu Guo

    Abstract: The development of fault-tolerant quantum processors relies on the ability to control noise. A particularly insidious form of noise is temporally correlated or non-Markovian noise. By combining randomized benchmarking with supervised machine learning algorithms, we develop a method to learn the details of temporally correlated noise. In particular, we can learn the time-independent evolution opera… ▽ More

    Submitted 10 December, 2023; originally announced December 2023.

    Comments: 4 pages, 3 figures

  3. arXiv:2310.20107  [pdf, other

    quant-ph

    Preparing a commercial quantum key distribution system for certification against implementation loopholes

    Authors: Vadim Makarov, Alexey Abrikosov, Poompong Chaiwongkhot, Aleksey K. Fedorov, Anqi Huang, Evgeny Kiktenko, Mikhail Petrov, Anastasiya Ponosova, Daria Ruzhitskaya, Andrey Tayduganov, Daniil Trefilov, Konstantin Zaitsev

    Abstract: A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarisation encoding, qu… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 33 pages, 11 figures, 2 tables

  4. arXiv:2310.07371  [pdf, other

    quant-ph cs.LG physics.optics

    Experimental quantum natural gradient optimization in photonics

    Authors: Yizhi Wang, Shichuan Xue, Yaxuan Wang, Jiangfang Ding, Weixu Shi, Dongyang Wang, Yong Liu, Yingwen Liu, Xiang Fu, Guangyao Huang, Anqi Huang, Mingtang Deng, Junjie Wu

    Abstract: Variational quantum algorithms (VQAs) combining the advantages of parameterized quantum circuits and classical optimizers, promise practical quantum applications in the Noisy Intermediate-Scale Quantum era. The performance of VQAs heavily depends on the optimization method. Compared with gradient-free and ordinary gradient descent methods, the quantum natural gradient (QNG), which mirrors the geom… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

    Journal ref: Optics Letters Vol. 48, Issue 14, pp. 3745-3748 (2023)

  5. arXiv:2310.00585  [pdf, other

    quant-ph cs.AI cs.ET cs.LG physics.optics

    Quantum generative adversarial learning in photonics

    Authors: Yizhi Wang, Shichuan Xue, Yaxuan Wang, Yong Liu, Jiangfang Ding, Weixu Shi, Dongyang Wang, Yingwen Liu, Xiang Fu, Guangyao Huang, Anqi Huang, Mingtang Deng, Junjie Wu

    Abstract: Quantum Generative Adversarial Networks (QGANs), an intersection of quantum computing and machine learning, have attracted widespread attention due to their potential advantages over classical analogs. However, in the current era of Noisy Intermediate-Scale Quantum (NISQ) computing, it is essential to investigate whether QGANs can perform learning tasks on near-term quantum devices usually affecte… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

    Journal ref: Optics Letters Vol. 48, Issue 20, pp. 5197-5200 (2023)

  6. arXiv:2308.03283  [pdf, other

    quant-ph cs.LG

    High-rate discretely-modulated continuous-variable quantum key distribution using quantum machine learning

    Authors: Qin Liao, Jieyu Liu, Anqi Huang, Lei Huang, Zhuoying Fei, Xiquan Fu

    Abstract: We propose a high-rate scheme for discretely-modulated continuous-variable quantum key distribution (DM CVQKD) using quantum machine learning technologies, which divides the whole CVQKD system into three parts, i.e., the initialization part that is used for training and estimating quantum classifier, the prediction part that is used for generating highly correlated raw keys, and the data-postproce… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: 18 pages, 17 figures

  7. arXiv:2305.18610  [pdf, other

    physics.ins-det quant-ph

    Automated verification of countermeasure against detector-control attack in quantum key distribution

    Authors: Polina Acheva, Konstantin Zaitsev, Vladimir Zavodilenko, Anton Losev, Anqi Huang, Vadim Makarov

    Abstract: Attacks that control single-photon detectors in quantum key distribution using tailored bright illumination are capable of eavesdrop** the secret key. Here we report an automated testbench that checks the detector's vulnerabilities against these attacks. We illustrate its performance by testing a free-running detector that includes a rudimentary countermeasure measuring an average photocurrent.… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

    Comments: 11 pages, 11 figures. Revised after referee reports from EPJ Quantum Technol

    Journal ref: EPJ Quantum Technol. 10, 22 (2023)

  8. Security boundaries of an optical power limiter for protecting quantum key distribution systems

    Authors: Qingquan Peng, Binwu Gao, Konstantin Zaitsev, Dongyang Wang, Jiangfang Ding, Yingwen Liu, Qin Liao, Ying Guo, Anqi Huang, Junjie Wu

    Abstract: Unauthorized light injection has always been a vital threat to the practical security of a quantum key distribution (QKD) system. An optical power limiter (OPL) based on the thermo-optical defocusing effect has been proposed and implemented, limiting the injected hacking light. As a hardware countermeasure, the performance of the OPL under various light-injection attacks shall be tested to clarify… ▽ More

    Submitted 22 December, 2023; v1 submitted 22 March, 2023; originally announced March 2023.

    Comments: 15 pages, 14 figures

  9. arXiv:2208.13186  [pdf, other

    quant-ph cs.ET physics.optics

    Large-scale full-programmable quantum walk and its applications

    Authors: Yizhi Wang, Yingwen Liu, Junwei Zhan, Shichuan Xue, Yuzhen Zheng, Ru Zeng, Zhihao Wu, Zihao Wang, Qilin Zheng, Dongyang Wang, Weixu Shi, Xiang Fu, ** Xu, Yang Wang, Yong Liu, Jiangfang Ding, Guangyao Huang, Chunlin Yu, Anqi Huang, Xiaogang Qiang, Mingtang Deng, Weixia Xu, Kai Lu, Xuejun Yang, Junjie Wu

    Abstract: With photonics, the quantum computational advantage has been demonstrated on the task of boson sampling. Next, develo** quantum-enhanced approaches for practical problems becomes one of the top priorities for photonic systems. Quantum walks are powerful kernels for develo** new and useful quantum algorithms. Here we realize large-scale quantum walks using a fully programmable photonic quantum… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

  10. Characterisation of state-preparation uncertainty in quantum key distribution

    Authors: Anqi Huang, Akihiro Mizutani, Hoi-Kwong Lo, Vadim Makarov, Kiyoshi Tamaki

    Abstract: To achieve secure quantum key distribution, all imperfections in the source unit must be incorporated in a security proof and measured in the lab. Here we perform a proof-of-principle demonstration of the experimental techniques for characterising the source phase and intensity fluctuation in commercial quantum key distribution systems. When we apply the measured phase fluctuation intervals to the… ▽ More

    Submitted 9 January, 2023; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: 14 pages, 12 figures

    Journal ref: Phys. Rev. Appl. 19, 014048 (2023)

  11. Strong pulse illumination hacks self-differencing avalanche photodiode detectors in a high-speed quantum key distribution system

    Authors: Binwu Gao, Zhihai Wu, Weixu Shi, Yingwen Liu, Dongyang Wang, Chunlin Yu, Anqi Huang, Junjie Wu

    Abstract: Implementation of high-speed quantum key distribution~(QKD) has become one of the major focus in the field, which produces high key-generation rate for applications. To achieve high-speed QKD, tailored techniques are developed and employed to quickly generate and detect quantum states. However, these techniques may introduce unique loopholes to compromise the security of QKD systems. In this paper… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

  12. Protecting fiber-optic quantum key distribution sources against light-injection attacks

    Authors: Anastasiya Ponosova, Daria Ruzhitskaya, Poompong Chaiwongkhot, Vladimir Egorov, Vadim Makarov, Anqi Huang

    Abstract: A well-protected and characterised source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an eavesdropper actively injects bright light to hack the source unit. The hacking laser could be a high-power one that can modify properties of componen… ▽ More

    Submitted 24 September, 2022; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: Abstract, Fig.5 and discussion section modified. Various minor corrections, including clarification and explanation about the experimental setup stability and its graphical representation; testing procedure; configuration of QKD systems with circulators; heating of isolators; testing results of circulators' port couples. New references added in the bibliography. 13 pages, 6 figures, 2 tables

    Journal ref: PRX Quantum 3, 040307 (2022)

  13. arXiv:2108.02322  [pdf, other

    quant-ph

    Architectural considerations in the design of a third-generation superconducting quantum annealing processor

    Authors: Kelly Boothby, Colin Enderud, Trevor Lanting, Reza Molavi, Nicholas Tsai, Mark H. Volkmann, Fabio Altomare, Mohammad H. Amin, Michael Babcock, Andrew J. Berkley, Catia Baron Aznar, Martin Boschnak, Holly Christiani, Sara Ejtemaee, Bram Evert, Matthew Gullen, Markus Hager, Richard Harris, Emile Hoskinson, Jeremy P. Hilton, Kais Jooya, Ann Huang, Mark W. Johnson, Andrew D. King, Eric Ladizinsky , et al. (24 additional authors not shown)

    Abstract: Early generations of superconducting quantum annealing processors have provided a valuable platform for studying the performance of a scalable quantum computing technology. These studies have directly informed our approach to the design of the next-generation processor. Our design priorities for this generation include an increase in per-qubit connectivity, a problem Hamiltonian energy scale simil… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

  14. arXiv:2104.11903  [pdf, other

    cond-mat.mtrl-sci quant-ph

    Magnetoconductance modulations due to interlayer tunneling in radial superlattices

    Authors: Yu-Jie Zhong, Angus Huang, Hui Liu, Xuan-Fu Huang, Horng-Tay Jeng, Jhih-Shih You, Carmine Ortix, Ching-Hao Chang

    Abstract: Radial superlattices are nanostructured materials obtained by rolling-up thin solid films into spiral-like tubular structures. The formation of these "high-order" superlattices from two-dimensional crystals or ultrathin films is expected to result in a transition of transport characteristics from two-dimensional to one-dimensional. Here, we show that a transport hallmark of radial superlattices is… ▽ More

    Submitted 9 December, 2021; v1 submitted 24 April, 2021; originally announced April 2021.

    Comments: 21 pages, 4 figures. To appear in Nanoscale Horizons

  15. Faking photon number on a transition-edge sensor

    Authors: Poompong Chaiwongkhot, Jiaqiang Zhong, Anqi Huang, Hao Qin, Sheng-cai Shi, Vadim Makarov

    Abstract: We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength. In another experiment, we show that the detector can be blinded by bright continuous-wave light and then, a c… ▽ More

    Submitted 19 February, 2021; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: Replacing incorrectly uploaded previous versions. 6 page, 5 figures

    Journal ref: EPJ Quantum Technol. 9, 23 (2022)

  16. The quantum kinetic equation and dynamical mass generation in 2+1 Dimensions

    Authors: An** Huang, Shuzhe Shi, Xianglei Zhu, Lianyi He, **feng Liao, Pengfei Zhuang

    Abstract: In this work, we study the relativistic quantum kinetic equations in 2+1 dimensions from Wigner function formalism by carrying out a systematic semi-classical expansion up to $\hbar$ order. The derived equations allow us to explore interesting transport phenomena in 2+1 dimensions. Within this framework, the parity-odd transport current induced by the external electromagnetic field is self-consist… ▽ More

    Submitted 2 March, 2021; v1 submitted 6 July, 2020; originally announced July 2020.

    Journal ref: Phys. Rev. D 103, 056025 (2021)

  17. Hacking single-photon avalanche detector in quantum key distribution via pulse illumination

    Authors: Zhihao Wu, Anqi Huang, Huan Chen, Shi-Hai Sun, Jiangfang Ding, Xiaogang Qiang, Xiang Fu, ** Xu, Junjie Wu

    Abstract: Quantum key distribution (QKD) has been proved to be information-theoretically secure in theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to improve the security property of practical QKD systems, a commonly used method is to patch the loopholes in the existing QKD systems. However, in this work, we show an adversary's capability of exploiting the imperfectio… ▽ More

    Submitted 3 August, 2020; v1 submitted 21 February, 2020; originally announced February 2020.

    Comments: 11 pages, 11 figures, 1 table

  18. General Quantum Bernoulli Factory: Framework Analysis and Experiments

    Authors: Yong Liu, Jiaqing Jiang, **yu Zhu, Dongyang Wang, Jiangfang Ding, Xiaogang Qiang, Anqi Huang, ** Xu, Jialin Zhang, Guo**g Tian, Xiang Fu, Mingtang Deng, Chunqing Wu, Xiaoming Sun, Xuejun Yang, Junjie Wu

    Abstract: The unremitting pursuit for quantum advantages gives rise to the discovery of a quantum-enhanced randomness processing named quantum Bernoulli factory (QBF). This quantum enhanced process can show its priority over the corresponding classical process through readily available experimental resources, thus in the near term it may be capable of accelerating the applications of classical Bernoulli fac… ▽ More

    Submitted 27 September, 2021; v1 submitted 7 February, 2020; originally announced February 2020.

    Comments: 9 pages, 4 figures

    Journal ref: Quantum Sci. Technol. 6 045025 (2021)

  19. arXiv:1912.07286  [pdf, other

    quant-ph cs.LG physics.comp-ph

    Variational Quantum Circuits for Quantum State Tomography

    Authors: Yong Liu, Dongyang Wang, Shichuan Xue, Anqi Huang, Xiang Fu, Xiaogang Qiang, ** Xu, He-Liang Huang, Mingtang Deng, Chu Guo, Xuejun Yang, Junjie Wu

    Abstract: Quantum state tomography is a key process in most quantum experiments. In this work, we employ quantum machine learning for state tomography. Given an unknown quantum state, it can be learned by maximizing the fidelity between the output of a variational quantum circuit and this state. The number of parameters of the variational quantum circuit grows linearly with the number of qubits and the circ… ▽ More

    Submitted 11 April, 2020; v1 submitted 16 December, 2019; originally announced December 2019.

    Comments: 7 pages, 3 figures

    Journal ref: Phys. Rev. A 101, 052316 (2020)

  20. Optical control of single-photon negative-feedback avalanche diode detector

    Authors: Gaëtan Gras, Nigar Sultana, Anqi Huang, Thomas Jennewein, Félix Bussières, Vadim Makarov, Hugo Zbinden

    Abstract: We experimentally demonstrate optical control of negative-feedback avalanche diode (NFAD) detectors using bright light. We deterministically generate fake single-photon detections with a better timing precision than normal operation. This could potentially open a security loophole in quantum cryptography systems. We then show how monitoring the photocurrent through the avalanche photodiode can be… ▽ More

    Submitted 10 March, 2020; v1 submitted 28 November, 2019; originally announced November 2019.

    Journal ref: Journal of Applied Physics 127, 094502 (2020)

  21. An approach for security evaluation and certification of a complete quantum communication system

    Authors: Shihan Sajeed, Poompong Chaiwongkhot, Anqi Huang, Hao Qin, Vladimir Egorov, Anton Kozubov, Andrei Gaidash, Vladimir Chistiakov, Artur Vasiliev, Artur Gleim, Vadim Makarov

    Abstract: Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises… ▽ More

    Submitted 18 May, 2021; v1 submitted 17 September, 2019; originally announced September 2019.

    Comments: Improved readability and minor updates, Published in Scientific Reports volume 11, Article number: 5110 (2021), 17 pages, 3 figures, 3 tables

    Journal ref: Sci Rep 11, 5110 (2021)

  22. Sample caching Markov chain Monte Carlo approach to boson sampling simulation

    Authors: Yong Liu, Min Xiong, Chunqing Wu, Dongyang Wang, Yingwen Liu, Jiangfang Ding, Anqi Huang, Xiang Fu, Xiaogang Qiang, ** Xu, Mingtang Deng, Xuejun Yang, Junjie Wu

    Abstract: Boson sampling is a promising candidate for quantum supremacy. It requires to sample from a complicated distribution, and is trusted to be intractable on classical computers. Among the various classical sampling methods, the Markov chain Monte Carlo method is an important approach to the simulation and validation of boson sampling. This method however suffers from the severe sample loss issue caus… ▽ More

    Submitted 24 April, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: 5 pages, 4 figures

    Journal ref: New J. Phys. 22, 033022 (2020)

  23. arXiv:1907.01553  [pdf, other

    quant-ph physics.optics

    Security analysis of practical continuous-variable quantum key distribution systems under laser seeding attack

    Authors: Yi Zheng, Peng Huang, Anqi Huang, **ye Peng, Guihua Zeng

    Abstract: Here, we investigate the security of the practical one-way CVQKD and CV-MDI-QKD systems under laser seeding attack. In particular, Eve can inject a suitable light into the laser diodes of the light source modules in the two kinds of practical CVQKD systems, which results in the increased intensity of the generated optical signal. The parameter estimation under the attack shows that the secret key… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

    Comments: 9 pages,7 figures

    Journal ref: Optics Express (2019)

  24. Laser damage attack against optical attenuators in quantum key distribution

    Authors: Anqi Huang, Ruo** Li, Vladimir Egorov, Serguei Tchouragoulov, Krtin Kumar, Vadim Makarov

    Abstract: Many quantum key distribution systems employ a laser followed by an optical attenuator to prepare weak coherent states in the source. Their mean photon number must be pre-calibrated to guarantee the security of key distribution. Here we experimentally show that this calibration can be broken with a high-power laser attack. We have tested four fiber-optic attenuator types used in quantum key distri… ▽ More

    Submitted 13 March, 2020; v1 submitted 26 May, 2019; originally announced May 2019.

    Comments: 12 pages, 12 figures

    Journal ref: Phys. Rev. Applied 13, 034017 (2020)

  25. Controlling single-photon detector ID210 with bright light

    Authors: Vladimir Chistiakov, Anqi Huang, Vladimir Egorov, Vadim Makarov

    Abstract: We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination. In quantum key distribution, this vulnerability can be exploited by an eavesdropper to perform a faked-state attack giving her full knowledge of the key without being noticed. We consider the attack on standard BB84… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: 6 pages, 5 figures

    Journal ref: Opt. Express 27, 32253 (2019)

  26. arXiv:1905.08394  [pdf, other

    quant-ph physics.comp-ph

    General-purpose quantum circuit simulator with Projected Entangled-Pair States and the quantum supremacy frontier

    Authors: Chu Guo, Yong Liu, Min Xiong, Shichuan Xue, Xiang Fu, Anqi Huang, Xiaogang Qiang, ** Xu, Junhua Liu, Shenggen Zheng, He-Liang Huang, Mingtang Deng, Dario Poletti, Wan-Su Bao, Junjie Wu

    Abstract: Recent advances on quantum computing hardware have pushed quantum computing to the verge of quantum supremacy. Random quantum circuits are outstanding candidates to demonstrate quantum supremacy, which could be implemented on a quantum device that supports nearest-neighbour gate operations on a two-dimensional configuration. Here we show that using the Projected Entangled-Pair States algorithm, a… ▽ More

    Submitted 4 November, 2019; v1 submitted 20 May, 2019; originally announced May 2019.

    Comments: 10 pages, 6 figures, 1 table

    Journal ref: Phys. Rev. Lett. 123, 190501 (2019)

  27. arXiv:1904.08777  [pdf, other

    quant-ph physics.optics

    Practical security of continuous-variable quantum key distribution with reduced optical attenuation

    Authors: Yi Zheng, Peng Huang, Anqi Huang, **ye Peng, Guihua Zeng

    Abstract: In a practical CVQKD system, the optical attenuator can adjust the Gaussian-modulated coherent states and the local oscillator signal to an optimal value for guaranteeing the security of the system and optimizing the performance of the system. However, the performance of the optical attenuator may deteriorate due to the intentional and unintentional damage of the device. In this paper, we investig… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 9 pages, 8 figures

    Journal ref: Phys. Rev. A 100, 012313 (2019)

  28. Laser seeding attack in quantum key distribution

    Authors: Anqi Huang, Álvaro Navarrete, Shi-Hai Sun, Poompong Chaiwongkhot, Marcos Curty, Vadim Makarov

    Abstract: Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-device-independent quantum key distribution (MDI-QKD) is a promising approach to remove all side channels from the measurement unit, which is regarded… ▽ More

    Submitted 27 November, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

    Comments: 14 pages, 7 figures

    Journal ref: Phys. Rev. Applied 12, 064043 (2019)

  29. Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence

    Authors: Poompong Chaiwongkhot, Katanya B. Kuntz, Yanbao Zhang, Anqi Huang, Jean-Philippe Bourgoin, Shihan Sajeed, Norbert Lütkenhaus, Thomas Jennewein, Vadim Makarov

    Abstract: The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index o… ▽ More

    Submitted 20 June, 2019; v1 submitted 4 February, 2019; originally announced February 2019.

    Comments: 10 pages, 5 figures

    Journal ref: Phys. Rev. A 99, 062315 (2019)

  30. Comment on "Inherent security of phase coding quantum key distribution systems against detector blinding attacks" [Laser Phys. Lett. 15, 095203 (2018)]

    Authors: Aleksey Fedorov, Ilja Gerhardt, Anqi Huang, Jonathan Jogenfors, Yury Kurochkin, Antía Lamas-Linares, Jan-Åke Larsson, Gerd Leuchs, Lars Lydersen, Vadim Makarov, Johannes Skaar

    Abstract: This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions.

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 2 pages

    Journal ref: Laser Phys. Lett. 16, 019401 (2019)

  31. Implementation vulnerabilities in general quantum cryptography

    Authors: Anqi Huang, Stefanie Barz, Erika Andersson, Vadim Makarov

    Abstract: Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation sec… ▽ More

    Submitted 24 October, 2018; v1 submitted 17 May, 2018; originally announced May 2018.

    Comments: 13 pages, 8 figures

    Journal ref: New J. Phys. 20, 103016 (2018)

  32. arXiv:1802.05869  [pdf, other

    cond-mat.mtrl-sci cond-mat.str-el quant-ph

    Carrier driven antiferromagnetism and exchange-bias in SrRuO3/CaRuO3 heterostructures

    Authors: Parul Pandey, Ching-Hao Chang, Angus Huang, Rakesh Rana, Changan Wang, Chi Xu, Horng-Tay Jeng, Manfred Helm, R. Ganesh, Shengqiang Zhou

    Abstract: Oxide heterostructures exhibit a rich variety of magnetic and transport properties which arise due to contact at an interface. This can lead to surprising effects that are very different from the bulk properties of the materials involved. We report the magnetic properties of bilayers of SrRuO3, a well known ferromagnet, and CaRuO3, which is nominally a paramagnet. We find intriguing features that… ▽ More

    Submitted 16 February, 2018; originally announced February 2018.

    Comments: 6 pages and 4 figures

  33. Decoy state quantum key distribution with imperfect source

    Authors: Anqi Huang, Shi-Hai Sun, Zhihong Liu, Vadim Makarov

    Abstract: The decoy state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to generating the decoy states with different intensities: modulation of the pump current of a semiconductor laser diode, and external modulation by an optical intensity modulator. The fo… ▽ More

    Submitted 17 September, 2018; v1 submitted 1 November, 2017; originally announced November 2017.

    Comments: 14 pages, 7 figures

    Journal ref: Phys. Rev. A 98, 012330 (2018)

  34. Entropic uncertainty relations for Markovian and non-Markovian processes under a structured bosonic reservoir

    Authors: Dong Wang, Ai-Jun Huang, Ross D. Hoehn, Fei Ming, Wen-Yang Sun, Jia-Dong Shi, Liu Ye, Sabre Kais

    Abstract: The uncertainty relation is a fundamental limit in quantum mechanics and is of great importance to quantum information processing as it relates to quantum precision measurement. Due to interactions with the surrounding environment, a quantum system will unavoidably suffer from decoherence. Here, we investigate the dynamic behaviors of the entropic uncertainty relation of an atom-cavity interacting… ▽ More

    Submitted 25 March, 2017; originally announced March 2017.

    Comments: 17 pages, 9 figures, to appear in Scientific Reports

    Journal ref: Scientific Reports 7, 1066 (2017)

  35. Insecurity of detector-device-independent quantum key distribution

    Authors: Shihan Sajeed, Anqi Huang, Shihai Sun, Feihu Xu, Vadim Makarov, Marcos Curty

    Abstract: Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of ddiQKD is not based on post-selected entanglement, and we introduce various eavesdrop** strategies that show that ddiQKD is in fact insecure ag… ▽ More

    Submitted 20 July, 2016; originally announced July 2016.

    Comments: 7 pages, 5 figures, 1 table

    Journal ref: Phys. Rev. Lett. 117, 250505 (2016)

  36. Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption

    Authors: Anqi Huang, Shihan Sajeed, Poompong Chaiwongkhot, Mathilde Soucarros, Matthieu Legre, Vadim Makarov

    Abstract: In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency counte… ▽ More

    Submitted 17 October, 2016; v1 submitted 5 January, 2016; originally announced January 2016.

    Comments: 12 pages, 12 figures

    Journal ref: IEEE J. Quantum Electron. 52, 8000211 (2016)