2,803 research outputs found
Model checking quantum Markov chains
Although the security of quantum cryptography is provable based on the
principles of quantum mechanics, it can be compromised by the flaws in the
design of quantum protocols and the noise in their physical implementations.
So, it is indispensable to develop techniques of verifying and debugging
quantum cryptographic systems. Model-checking has proved to be effective in the
verification of classical cryptographic protocols, but an essential difficulty
arises when it is applied to quantum systems: the state space of a quantum
system is always a continuum even when its dimension is finite. To overcome
this difficulty, we introduce a novel notion of quantum Markov chain, specially
suited to model quantum cryptographic protocols, in which quantum effects are
entirely encoded into super-operators labelling transitions, leaving the
location information (nodes) being classical. Then we define a quantum
extension of probabilistic computation tree logic (PCTL) and develop a
model-checking algorithm for quantum Markov chains.Comment: Journal versio
Postprocessing for quantum random number generators: entropy evaluation and randomness extraction
Quantum random-number generators (QRNGs) can offer a means to generate
information-theoretically provable random numbers, in principle. In practice,
unfortunately, the quantum randomness is inevitably mixed with classical
randomness due to classical noises. To distill this quantum randomness, one
needs to quantify the randomness of the source and apply a randomness
extractor. Here, we propose a generic framework for evaluating quantum
randomness of real-life QRNGs by min-entropy, and apply it to two different
existing quantum random-number systems in the literature. Moreover, we provide
a guideline of QRNG data postprocessing for which we implement two
information-theoretically provable randomness extractors: Toeplitz-hashing
extractor and Trevisan's extractor.Comment: 13 pages, 2 figure
Computational Soundness of Formal Encryption in Coq
We formalize Abadi and Rogaway's computational soundness result in the
Coq interactive theorem prover. This requires to model notions of provable
cryptography like indistinguishability between ensembles of
probability distributions, PPT reductions, and security notions for
encryption schemes.
Our formalization is the first computational soundness result to be
mechanized, and it shows the feasibility of rigorous reasoning of
computational cryptography inside a generic interactive theorem prover
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98,
231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page
- …