Skip to main content

Showing 1–9 of 9 results for author: Lim, C C

Searching in archive cs. Search in all archives.
.
  1. Provably-secure randomness generation from switching probability of magnetic tunnel junctions

    Authors: Hong Jie Ng, Shuhan Yang, Zhaoyang Yao, Hyunsoo Yang, Charles C. -W. Lim

    Abstract: In recent years, true random number generators (TRNGs) based on magnetic tunnelling junction (MTJ) have become increasingly attractive. This is because MTJ-based TRNGs offer some advantages over traditional CMOS-based TRNGs, such as smaller area and simpler structure. However, there has been no work thus far that quantified the quality of the raw output of an MTJ-based TRNG and performed suitable… ▽ More

    Submitted 14 June, 2022; originally announced June 2022.

    Comments: 6 pages, all comments are welcome

    Journal ref: Phys. Rev. Appl., vol. 19, no. 3, p. 034077, Mar. 2023

  2. arXiv:2109.12827  [pdf, other

    quant-ph cs.CR

    Experimental symmetric private information retrieval with measurement-device-independent quantum network

    Authors: Chao Wang, Wen Yu Kon, Hong Jie Ng, Charles C. -W. Lim

    Abstract: Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and database content's security are enforced. For these settings, symmetric private information retrieval (SPIR) could be employed, but its implementation is known to be demanding, requiring a private key-exchange network as the base layer. Here… ▽ More

    Submitted 5 October, 2021; v1 submitted 27 September, 2021; originally announced September 2021.

  3. arXiv:2010.14620  [pdf, other

    cs.SI cs.AI cs.DS cs.LG math.OC

    Correlation Robust Influence Maximization

    Authors: Louis Chen, Divya Padmanabhan, Chee Chin Lim, Karthik Natarajan

    Abstract: We propose a distributionally robust model for the influence maximization problem. Unlike the classic independent cascade model \citep{kempe2003maximizing}, this model's diffusion process is adversarially adapted to the choice of seed set. Hence, instead of optimizing under the assumption that all influence relationships in the network are independent, we seek a seed set whose expected influence u… ▽ More

    Submitted 22 February, 2022; v1 submitted 24 October, 2020; originally announced October 2020.

    Journal ref: 34th Conference on Neural Information Processing Systems (NeurIPS 2020), Vancouver, Canada

  4. arXiv:2004.13921  [pdf, other

    quant-ph cs.CR cs.IR

    Provably-secure symmetric private information retrieval with quantum cryptography

    Authors: Wen Yu Kon, Charles Ci Wen Lim

    Abstract: Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. U… ▽ More

    Submitted 17 January, 2021; v1 submitted 28 April, 2020; originally announced April 2020.

    Comments: 19 pages

    Journal ref: Entropy 23, 54 (2021)

  5. Characterising the correlations of prepare-and-measure quantum networks

    Authors: Yukun Wang, Ignatius William Primaatmaja, Emilien Lavie, Antonios Varvitsiotis, Charles Ci Wen Lim

    Abstract: Prepare-and-measure (P&M) quantum networks are the basic building blocks of quantum communication and cryptography. These networks crucially rely on non-orthogonal quantum encodings to distribute quantum correlations, thus enabling superior communication rates and information-theoretic security. Here, we present a computational toolbox that is able to efficiently characterise the set of input-outp… ▽ More

    Submitted 19 August, 2018; v1 submitted 13 March, 2018; originally announced March 2018.

    Comments: This version includes a new security analysis of coherent-one way quantum key distribution; Title and introduction have also been revised; Added new co-author (Emilien Lavie)

    Journal ref: npj Quantum Information 5, 17 (2019)

  6. Symmetric blind information reconciliation for quantum key distribution

    Authors: E. O. Kiktenko, A. S. Trushechkin, C. C. W. Lim, Y. V. Kurochkin, A. K. Fedorov

    Abstract: Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind reconciliation technique, based on low-density parity-check (LDPC) codes, offers remarkable prospectives for effic… ▽ More

    Submitted 25 February, 2019; v1 submitted 12 December, 2016; originally announced December 2016.

    Comments: 10 pages, 4 figures; published version

    Journal ref: Phys. Rev. Applied 8, 044017 (2017)

  7. Loss-tolerant quantum secure positioning with weak laser sources

    Authors: Charles Ci Wen Lim, Feihu Xu, George Siopsis, Eric Chitambar, Philip G. Evans, Bing Qi

    Abstract: Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measu… ▽ More

    Submitted 27 July, 2016; originally announced July 2016.

    Comments: 11 pages, 3 figures. Partially based on an earlier work in arXiv:1510.04891

    Journal ref: Phys. Rev. A 94, 032315 (2016)

  8. arXiv:1409.1282  [pdf, ps, other

    physics.soc-ph cs.SI

    Propensity and stickiness in the naming game: Tipping fractions of minorities

    Authors: Andrew M. Thompson, Boleslaw K. Szymanski, Chjan C. Lim

    Abstract: Agent-based models of the binary naming game are generalized here to represent a family of models parameterized by the introduction of two continuous parameters. These parameters define varying listener-speaker interactions on the individual level with one parameter controlling the speaker and the other controlling the listener of each interaction. The major finding presented here is that the gene… ▽ More

    Submitted 12 October, 2014; v1 submitted 3 September, 2014; originally announced September 2014.

    Comments: 9 pages, 10 figures

    Journal ref: Phys. Rev. E 90(4):042809, Oct. 2014

  9. arXiv:1008.4115  [pdf, ps, other

    cs.MA cs.SI

    Noise in Naming Games, partial synchronization and community detection in social networks

    Authors: Weituo Zhang, Chjan C. Lim

    Abstract: The Naming Games (NG) are agent-based models for agreement dynamics, peer pressure and herding in social networks, and protocol selection in autonomous ad-hoc sensor networks. By introducing a small noise term to the NG, the resulting Markov Chain model called Noisy Naming Games (NNG) are ergodic, in which all partial consensus states are recurrent. By using Gibbs-Markov equivalence we show how to… ▽ More

    Submitted 24 August, 2010; originally announced August 2010.