38,783 research outputs found
Towards Communication-Efficient Quantum Oblivious Key Distribution
Oblivious Transfer, a fundamental problem in the field of secure multi-party
computation is defined as follows: A database DB of N bits held by Bob is
queried by a user Alice who is interested in the bit DB_b in such a way that
(1) Alice learns DB_b and only DB_b and (2) Bob does not learn anything about
Alice's choice b. While solutions to this problem in the classical domain rely
largely on unproven computational complexity theoretic assumptions, it is also
known that perfect solutions that guarantee both database and user privacy are
impossible in the quantum domain. Jakobi et al. [Phys. Rev. A, 83(2), 022301,
Feb 2011] proposed a protocol for Oblivious Transfer using well known QKD
techniques to establish an Oblivious Key to solve this problem. Their solution
provided a good degree of database and user privacy (using physical principles
like impossibility of perfectly distinguishing non-orthogonal quantum states
and the impossibility of superluminal communication) while being loss-resistant
and implementable with commercial QKD devices (due to the use of SARG04).
However, their Quantum Oblivious Key Distribution (QOKD) protocol requires a
communication complexity of O(N log N). Since modern databases can be extremely
large, it is important to reduce this communication as much as possible. In
this paper, we first suggest a modification of their protocol wherein the
number of qubits that need to be exchanged is reduced to O(N). A subsequent
generalization reduces the quantum communication complexity even further in
such a way that only a few hundred qubits are needed to be transferred even for
very large databases.Comment: 7 page
Teleportation and Secret Sharing with Pure Entangled States
We present two optimal methods of teleporting an unknown qubit using any pure
entangled state. We also discuss how such methods can also have succesful
application in quantum secret sharing with pure multipartite entangled states.Comment: Latex, 13 pages, submitted to PRA. One sub section already appeared
in the archive: quant-ph /990701
Loss tolerant device-independent quantum key distribution: a proof of principle
We here present the rate analysis and a proof of principle realization of a
device-independent quantum key distribution (QKD) protocol requiring the lowest
detection efficiency necessary to achieve a secure key compared to
device-independent protocols known so far. The protocol is based on
non-maximally entangled state and its experimental realization has been
performed by two-photon bipartite entangled states. The improvement with
respect to protocols involving maximally entangled states has been estimated.Comment: 8 pages, 4 figure + appendi
Practical private database queries based on a quantum key distribution protocol
Private queries allow a user Alice to learn an element of a database held by
a provider Bob without revealing which element she was interested in, while
limiting her information about the other elements. We propose to implement
private queries based on a quantum key distribution protocol, with changes only
in the classical post-processing of the key. This approach makes our scheme
both easy to implement and loss-tolerant. While unconditionally secure private
queries are known to be impossible, we argue that an interesting degree of
security can be achieved, relying on fundamental physical principles instead of
unverifiable security assumptions in order to protect both user and database.
We think that there is scope for such practical private queries to become
another remarkable application of quantum information in the footsteps of
quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims,
expanded security discussio
Multiple faces of preferential market access: their causes and consequences
This paper suggests an integrated approach to study selection into and consequences of five modes of preferential economic integration agreements (PEIAs): goods trade agreements (GTAs), services trade agreements (STAs), double taxation treaties (DTTs), bilateral investment treaties (BITs), and currency unions as well as currency pegs (CUAs). A detailed descriptive analysis reveals typical integration patterns, with DTTs and BITs often being first steps towards deeper integration. We consider the effects of PEIAs on bilateral goods trade, services trade, and FDI and provide conclusive evidence that single and combined PEIAs are associated with positive effects not only on single outcome but typically on all outcomes. Investment liberalization through DTTs and BITs seems to be particularly beneficial since concluding them alone or in any combination with other agreements encourages goods trade even more than the liberalization of goods trade per se — Peter Egger and Georg Wamse
Improved and Formal Proposal for Device Independent Quantum Private Query
In this paper, we propose a novel Quantum Private Query (QPQ) scheme with
full Device-Independent certification. To the best of our knowledge, this is
the first time we provide such a full DI-QPQ scheme using EPR-pairs. Our
proposed scheme exploits self-testing of shared EPR-pairs along with the
self-testing of projective measurement operators in a setting where the client
and the server do not trust each other. To certify full device independence, we
exploit a strategy to self-test a particular class of POVM elements that are
used in the protocol. Further, we provide formal security analysis and obtain
an upper bound on the maximum cheating probabilities for both the dishonest
client as well as the dishonest server.Comment: 33 pages, 2 figure
Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography
This is a study of the security of the Coherent One-Way (COW) protocol for
quantum cryptography, proposed recently as a simple and fast experimental
scheme. In the zero-error regime, the eavesdropper Eve can only take advantage
of the losses in the transmission. We consider new attacks, based on
unambiguous state discrimination, which perform better than the basic
beam-splitting attack, but which can be detected by a careful analysis of the
detection statistics. These results stress the importance of testing several
statistical parameters in order to achieve higher rates of secret bits
Higher Security Thresholds for Quantum Key Distribution by Improved Analysis of Dark Counts
We discuss the potential of quantum key distribution (QKD) for long distance
communication by proposing a new analysis of the errors caused by dark counts.
We give sufficient conditions for a considerable improvement of the key
generation rates and the security thresholds of well-known QKD protocols such
as Bennett-Brassard 1984, Phoenix-Barnett-Chefles 2000, and the six-state
protocol. This analysis is applicable to other QKD protocols like Bennett 1992.
We examine two scenarios: a sender using a perfect single-photon source and a
sender using a Poissonian source.Comment: 6 pages, 2 figures, v2: We obtained better results by using reverse
reconciliation as suggested by Nicolas Gisi
- …
