Zobrazeno 1 - 10
of 374
pro vyhledávání: '"Y Z, Tan"'
Publikováno v:
PRX Quantum, Vol 5, Iss 4, p 040315 (2024)
The postselection technique is an important proof technique for proving the security of quantum key distribution protocols against coherent attacks via the uplift of any security proof against independent identically distributed collective attacks. I
Externí odkaz:
https://doaj.org/article/c027cfe4ea4c47e29c007f136afd1602
Publikováno v:
Physical Review Research, Vol 6, Iss 2, p 023002 (2024)
We present a security proof for variable-length QKD in the Renner framework against IID collective attacks. Our proof can be lifted to coherent attacks using the postselection technique. Our first main result is a theorem to convert a sequence of sec
Externí odkaz:
https://doaj.org/article/cec5ff9e530145a2bcb0020528043b38
Autor:
Thomas A. Hahn, Ernest Y.-Z. Tan
Publikováno v:
npj Quantum Information, Vol 8, Iss 1, Pp 1-11 (2022)
Abstract It is known that advantage distillation (that is, information reconciliation using two-way communication) improves noise tolerances for quantum key distribution (QKD) setups. Two-way communication is hence also of interest in the device-inde
Externí odkaz:
https://doaj.org/article/a484d371b36943cfa55f0b703f3e36cb
Autor:
Ernest Y.-Z. Tan, René Schwonnek, Koon Tong Goh, Ignatius William Primaatmaja, Charles C.-W. Lim
Publikováno v:
npj Quantum Information, Vol 7, Iss 1, Pp 1-6 (2021)
Abstract Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles
Externí odkaz:
https://doaj.org/article/e91d991f1d0d4e348ed8bd86e59a99f1
Autor:
Srijita Kundu, Ernest Y.-Z. Tan
Publikováno v:
Quantum, Vol 7, p 1047 (2023)
We study the task of encryption with certified deletion (ECD) introduced by Broadbent and Islam (2020), but in a device-independent setting: we show that it is possible to achieve this task even when the honest parties do not trust their quantum devi
Externí odkaz:
https://doaj.org/article/d4f40fd87e6d4009b0b3ec485219f717
Autor:
René Schwonnek, Koon Tong Goh, Ignatius W. Primaatmaja, Ernest Y.-Z. Tan, Ramona Wolf, Valerio Scarani, Charles C.-W. Lim
Publikováno v:
Nature Communications, Vol 12, Iss 1, Pp 1-8 (2021)
Device-independent quantum key distribution aims at the ultimate quantum-based unconditional security, but current protocols’ rates are quite far from anything practical. The authors’ protocol narrows this gap by using two randomly chosen key gen
Externí odkaz:
https://doaj.org/article/7ee9dee7781a4e98b8186fba5184a23b
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLII-3-W10, Pp 111-115 (2020)
As one of the most popular surveillance technologies in the 21st century, Lidar is applied in commercial, military and civilian applications. paper mainly introduces the development process of Chinese and American marine lidar detection technology, c
Externí odkaz:
https://doaj.org/article/1d723917defc493b838d612a0b7cd3e7
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLII-3-W10, Pp 815-819 (2020)
There are many intertidal zones and island reefs in the coastal area, the traditional shipborne acoustic measurement method is extremely inefficient, so the coastal area three-dimensional integrated measurement has always been a difficult point in th
Externí odkaz:
https://doaj.org/article/a3979eee8dba42cc9d03b8f00172215c
Publikováno v:
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol XLII-3-W10, Pp 1247-1252 (2020)
At present, the main LiDAR is single-point lidar. APD arrays and laser arrays are restricted to exit, so the number of area array LiDAR is scarce. Single-point lidar can't form a scanning pattern with only one laser point on the ground after launchin
Externí odkaz:
https://doaj.org/article/72cc8bb06ead4b1b8f4161039fdfdd3e
Autor:
Ignatius W. Primaatmaja, Koon Tong Goh, Ernest Y.-Z. Tan, John T.-F. Khoo, Shouvik Ghorai, Charles C.-W. Lim
Publikováno v:
Quantum, Vol 7, p 932 (2023)
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key exchange protocol in terms of security, as it can be performed securely with uncharacterised black-box devices. The advent of DI-QKD closes several loopholes and s
Externí odkaz:
https://doaj.org/article/8077b3669027451aa617c5c1e0ffa820