6,965 research outputs found

    Parsing a sequence of qubits

    Full text link
    We develop a theoretical framework for frame synchronization, also known as block synchronization, in the quantum domain which makes it possible to attach classical and quantum metadata to quantum information over a noisy channel even when the information source and sink are frame-wise asynchronous. This eliminates the need of frame synchronization at the hardware level and allows for parsing qubit sequences during quantum information processing. Our framework exploits binary constant-weight codes that are self-synchronizing. Possible applications may include asynchronous quantum communication such as a self-synchronizing quantum network where one can hop into the channel at any time, catch the next coming quantum information with a label indicating the sender, and reply by routing her quantum information with control qubits for quantum switches all without assuming prior frame synchronization between users.Comment: 11 pages, 2 figures, 1 table. Final accepted version for publication in the IEEE Transactions on Information Theor

    New 22-designs from strong difference families

    Full text link
    Strong difference families are an interesting class of discrete structures which can be used to derive relative difference families. Relative difference families are closely related to 22-designs, and have applications in constructions for many significant codes, such as optical orthogonal codes and optical orthogonal signature pattern codes. In this paper, with a careful use of cyclotomic conditions attached to strong difference families, we improve the lower bound on the asymptotic existence results of (Fp×Fq,Fp×{0},k,λ)(\mathbb{F}_{p}\times \mathbb{F}_{q},\mathbb{F}_{p}\times \{0\},k,\lambda)-DFs for k∈{p,p+1}k\in\{p,p+1\}. We improve Buratti's existence results for 22-(13q,13,λ)(13q,13,\lambda) designs and 22-(17q,17,λ)(17q,17,\lambda) designs, and establish the existence of seven new 22-(v,k,λ)(v,k,\lambda) designs for (v,k,λ)∈{(694,7,2),(1576,8,1),(2025,9,1),(765,9,2),(1845,9,2),(459,9,4)(v,k,\lambda)\in\{(694,7,2),(1576,8,1),(2025,9,1),(765,9,2),(1845,9,2),(459,9,4), (783,9,4)}(783,9,4)\}.Comment: Version 1 is named "Improved cyclotomic conditions leading to new 2-designs: the use of strong difference families". Major revision according to the referees' comment

    Frame difference families and resolvable balanced incomplete block designs

    Full text link
    Frame difference families, which can be obtained via a careful use of cyclotomic conditions attached to strong difference families, play an important role in direct constructions for resolvable balanced incomplete block designs. We establish asymptotic existences for several classes of frame difference families. As corollaries new infinite families of 1-rotational (pq+1,p+1,1)(pq+1,p+1,1)-RBIBDs over Fp+×Fq+\mathbb{F}_{p}^+ \times \mathbb{F}_{q}^+ are derived, and the existence of (125q+1,6,1)(125q+1,6,1)-RBIBDs is discussed. We construct (v,8,1)(v,8,1)-RBIBDs for v∈{624,1576,2976,5720,5776,10200,14176,24480}v\in\{624,1576,2976,5720,5776,10200,14176,24480\}, whose existence were previously in doubt. As applications, we establish asymptotic existences for an infinite family of optimal constant composition codes and an infinite family of strictly optimal frequency hopping sequences.Comment: arXiv admin note: text overlap with arXiv:1702.0750

    Quantum cryptography: key distribution and beyond

    Full text link
    Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK

    Numerical hyperinterpolation over nonstandard planar regions

    Get PDF
    We discuss an algorithm (implemented in Matlab) that computes numerically total-degree bivariate orthogonal polynomials (OPs) given an algebraic cubature formula with positive weights, and constructs the orthogonal projection (hyperinterpolation) of a function sampled at the cubature nodes. The method is applicable to nonstandard regions where OPs are not known analytically, for example convex and concave polygons, or circular sections such as sectors, lenses and lunes

    Using quantum key distribution for cryptographic purposes: a survey

    Full text link
    The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
    • …
    corecore