6,965 research outputs found
Parsing a sequence of qubits
We develop a theoretical framework for frame synchronization, also known as
block synchronization, in the quantum domain which makes it possible to attach
classical and quantum metadata to quantum information over a noisy channel even
when the information source and sink are frame-wise asynchronous. This
eliminates the need of frame synchronization at the hardware level and allows
for parsing qubit sequences during quantum information processing. Our
framework exploits binary constant-weight codes that are self-synchronizing.
Possible applications may include asynchronous quantum communication such as a
self-synchronizing quantum network where one can hop into the channel at any
time, catch the next coming quantum information with a label indicating the
sender, and reply by routing her quantum information with control qubits for
quantum switches all without assuming prior frame synchronization between
users.Comment: 11 pages, 2 figures, 1 table. Final accepted version for publication
in the IEEE Transactions on Information Theor
New -designs from strong difference families
Strong difference families are an interesting class of discrete structures
which can be used to derive relative difference families. Relative difference
families are closely related to -designs, and have applications in
constructions for many significant codes, such as optical orthogonal codes and
optical orthogonal signature pattern codes. In this paper, with a careful use
of cyclotomic conditions attached to strong difference families, we improve the
lower bound on the asymptotic existence results of -DFs for .
We improve Buratti's existence results for - designs and
- designs, and establish the existence of seven new
- designs for
,
.Comment: Version 1 is named "Improved cyclotomic conditions leading to new
2-designs: the use of strong difference families". Major revision according
to the referees' comment
Frame difference families and resolvable balanced incomplete block designs
Frame difference families, which can be obtained via a careful use of
cyclotomic conditions attached to strong difference families, play an important
role in direct constructions for resolvable balanced incomplete block designs.
We establish asymptotic existences for several classes of frame difference
families. As corollaries new infinite families of 1-rotational
-RBIBDs over are
derived, and the existence of -RBIBDs is discussed. We construct
-RBIBDs for , whose
existence were previously in doubt. As applications, we establish asymptotic
existences for an infinite family of optimal constant composition codes and an
infinite family of strictly optimal frequency hopping sequences.Comment: arXiv admin note: text overlap with arXiv:1702.0750
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Numerical hyperinterpolation over nonstandard planar regions
We discuss an algorithm (implemented in Matlab) that computes numerically total-degree bivariate orthogonal polynomials (OPs) given an algebraic cubature formula with positive weights, and constructs the orthogonal projection (hyperinterpolation) of a function sampled at the cubature nodes. The method is applicable to nonstandard regions where OPs are not known analytically, for example convex and concave polygons, or circular sections such as sectors, lenses and lunes
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
- …