Skip to main content

Showing 1–20 of 20 results for author: Škorić, B

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2503.02648  [pdf, other

    quant-ph cs.CR

    Unclonable Encryption with Continuous Variables

    Authors: Arpan Akash Ray, Boris Škorić

    Abstract: We propose the first continuous-variable (CV) unclonable encryption scheme, extending the paradigm of quantum encryption of classical messages (QECM) to CV systems. In our construction, a classical message is first encrypted classically and then encoded using an error-correcting code. Each bit of the codeword is mapped to a CV mode by creating a coherent state which is squeezed in the $q$ or $p$ q… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

  2. arXiv:2409.13667  [pdf, ps, other

    quant-ph

    Information Reconciliation for Continuous-Variable Quantum Key Distribution Beyond the Devetak-Winter Bound Using Short Blocklength Error Correction Codes

    Authors: Kadir Gümüş, João dos Reis Frazão, Aaron Albores-Mejia, Boris Škorić, Gabriele Liga, Yunus Can Gültekin, Thomas Bradley, Alex Alvarado, Chigo Okonkwo

    Abstract: In this paper we introduce a reconciliation protocol with a two-step error correction scheme using a short blocklength low rate code and a long blocklength high rate code. We show that by using this two-step decoding method it is possible to achieve secret key rates beyond the Devetak-Winter bound. We simulate the protocol using short blocklength low-density parity check code, and show that we can… ▽ More

    Submitted 20 September, 2024; originally announced September 2024.

    Comments: Pre-print

  3. arXiv:2406.06540  [pdf, other

    quant-ph

    Noise characterization for co-propagation of classical and CV-QKD signals over fiber and free-space link

    Authors: João dos Reis Frazão, Vincent van Vliet, Kadir Gümüş, Menno van den Hout, Sjoerd van der Heide, Aaron Albores-Mejia, Boris Škorić, Chigo Okonkwo

    Abstract: Real-time CV-QKD receiver achieves peak 2.9 Mbit/s secret-key-rates over 12.8 km of fiber, while co-propagating 15 classical channels, separated 1 nm from the quantum signal. Performance degrades at higher launch powers due to crosstalk.

    Submitted 25 April, 2024; originally announced June 2024.

  4. Continuous-variable Quantum Position Verification secure against entangled attackers

    Authors: Rene Allerstorfer, Llorenç Escolà-Farràs, Arpan Akash Ray, Boris Skoric, Florian Speelman

    Abstract: Motivated by the fact that coherent states may offer practical advantages it was recently shown that a continuous-variable (CV) quantum position verification (QPV) protocol using coherent states could be securely implemented if and only if attackers do not pre-share any entanglement. In the discrete-variable (DV) analogue of that protocol it was shown that modifying how the classical input informa… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  5. arXiv:2402.04770  [pdf, other

    quant-ph cs.CR

    Continuous-Variable Quantum Key Distribution with key rates far above the PLOB bound

    Authors: Arpan Akash Ray, Boris Skoric

    Abstract: Continuous-Variable Quantum Key Distribution (CVQKD) at large distances has such high noise levels that the error-correcting code must have very low rate. In this regime it becomes feasible to implement random-codebook error correction, which is known to perform close to capacity. We propose a reverse reconciliation scheme for CVQKD in which the first step is advantage distillation based on random… ▽ More

    Submitted 4 October, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: Modified the discussion of the keyrate upperbound. Added comments on the PLOB bound. Added more numerical results. 18 pages, 5 figures

  6. arXiv:2401.10581  [pdf, other

    quant-ph eess.SP

    Co-propagation of Classical and Continuous-variable QKD Signals over a Turbulent Optical Channel with a Real-time QKD Receiver

    Authors: João dos Reis Frazão, Vincent van Vliet, Sjoerd van der Heide, Menno van den Hout, Kadir Gümüş, Aaron Albores-Mejía, Boris Škorić, Chigo Okonkwo

    Abstract: We demonstrate classical and quantum signal co-propagation over a turbulent free-space channel with 3 Tbit/s throughput and record 2.7 Mbit/s secret-key rate. Our real-time GPU-based receiver assessed quantum signal integrity under different turbulence scenarios for the first time.

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: This paper was accepted for OFC 2024, this is a pre-print

  7. arXiv:2308.04166  [pdf, other

    quant-ph

    Security of a Continuous-Variable based Quantum Position Verification Protocol

    Authors: Rene Allerstorfer, Llorenç Escolà-Farràs, Arpan Akash Ray, Boris Škorić, Florian Speelman, Philip Verduyn Lunel

    Abstract: In this work we study quantum position verification with continuous-variable quantum states. In contrast to existing discrete protocols, we present and analyze a protocol that utilizes coherent states and its properties. Compared to discrete-variable photonic states, coherent states offer practical advantages since they can be efficiently prepared and manipulated with current technology. We prove… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

    Comments: 17 pages, 2 figures

  8. arXiv:2305.03940  [pdf, other

    quant-ph

    A simpler security proof for 6-state quantum key distribution

    Authors: Kaan Akyuz, Boris Skoric

    Abstract: Six-state Quantum Key Distribution (QKD) achieves the highest key rate in the class of qubit-based QKD schemes. The standard security proof, which has been developed since 2005, invokes complicated theorems involving smooth Renyi entropies. In this paper we present a simpler security proof for 6-state QKD that entirely avoids Renyi entropies. This is achieved by applying state smoothing directly i… ▽ More

    Submitted 6 May, 2023; originally announced May 2023.

  9. arXiv:2201.00188  [pdf, ps, other

    quant-ph

    Entropically secure encryption with faster key expansion

    Authors: Mehmet Huseyin Temel, Boris Skoric

    Abstract: Entropically secure encryption is a way to encrypt a large plaintext with a small key and still have information-theoretic security, thus in a certain sense circumventing Shannon's result that perfect encryption requires the key to be at least as long as the entropy of the plaintext. Entropically secure encryption is not perfect, and it works only if a lower bound is known on the entropy of the pl… ▽ More

    Submitted 23 October, 2022; v1 submitted 1 January, 2022; originally announced January 2022.

  10. arXiv:2103.01936  [pdf, other

    quant-ph cs.CR

    Diagrammatic security proof for 8-state encoding

    Authors: Boris Skoric, Zef Wolffs

    Abstract: Dirac notation is the most common way to describe quantum states and operations on states. It is very convenient and allows for quick visual distinction between vectors, scalars and operators. For quantum processes that involve interactions of multiple systems an even better visualisation has been proposed by Coecke and Kissinger, in the form of a diagrammatic formalism [CK2017]. Their notation ex… ▽ More

    Submitted 2 March, 2021; originally announced March 2021.

  11. arXiv:2102.01781  [pdf, other

    quant-ph physics.atom-ph

    Optimization of the Variational Quantum Eigensolver for Quantum Chemistry Applications

    Authors: R. J. P. T. de Keijzer, V. E. Colussi, B. Škorić, S. J. J. M. F. Kokkelmans

    Abstract: This work studies the variational quantum eigensolver algorithm, designed to determine the ground state of a quantum mechanical system by combining classical and quantum hardware. Methods of reducing the number of required qubit manipulations, prone to induce errors, for the variational quantum eigensolver are studied. We formally justify the qubit removal process as sketched by Bravyi, Gambetta,… ▽ More

    Submitted 28 February, 2022; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: 13 pages, 6 figures

    Journal ref: AVS Quantum Sci. 4, 013803 (2022)

  12. arXiv:2012.15493  [pdf, other

    quant-ph

    Quantum digital signatures with smaller public keys

    Authors: Boris Skoric

    Abstract: We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. The public keys are fingerprinting states, just as in the scheme of Gottesman and Chuang, but we allow for multiple ways to reveal the private key partially. The effect of this modification is a reduction of the number of qubits expended per message bit. We give a security proof and we present numer… ▽ More

    Submitted 23 May, 2021; v1 submitted 31 December, 2020; originally announced December 2020.

  13. arXiv:2010.10827  [pdf, other

    quant-ph

    Two-way Unclonable Encryption with a vulnerable sender

    Authors: Daan Leermakers, Boris Skoric

    Abstract: Unclonable Encryption, introduced by Gottesman in 2003, is a quantum protocol that guarantees the secrecy of a successfully transferred classical message even when all keys leak at a later time. We propose an Unclonable Encryption protocol with the additional property that the sender's key material is allowed to leak even in the case of an unsuccessful run. This extra feature makes it possible to… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  14. arXiv:2006.02476  [pdf, other

    quant-ph

    Can't Touch This: unconditional tamper evidence from short keys

    Authors: Bart van der Vecht, Xavier Coiteux-Roy, Boris Skoric

    Abstract: Storing data on an external server with information-theoretic security, while using a key shorter than the data itself, is impossible. As an alternative, we propose a scheme that achieves information-theoretically secure tamper evidence: The server is able to obtain information about the stored data, but not while staying undetected. Moreover, the client only needs to remember a key whose length i… ▽ More

    Submitted 24 January, 2022; v1 submitted 3 June, 2020; originally announced June 2020.

  15. arXiv:2004.04084  [pdf, other

    quant-ph

    Qubit-based Unclonable Encryption with Key Recycling

    Authors: Daan Leermakers, Boris Skoric

    Abstract: We re-visit Unclonable Encryption as introduced by Gottesman in 2003. We look at the combination of Unclonable Encryption and Key Recycling, while aiming for low communication complexity and high rate. We introduce a qubit-based prepare-and-measure Unclonable Encryption scheme with re-usable keys. Our scheme consists of a single transmission by Alice and a single classical feedback bit from Bob. T… ▽ More

    Submitted 28 April, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

  16. arXiv:2003.11799  [pdf, other

    quant-ph

    Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication

    Authors: Daan Leermakers, Boris Skoric

    Abstract: We answer an open question about Quantum Key Recycling (QKR): Is it possible to put the message entirely in the qubits without increasing the number of qubits? We show that this is indeed possible. We introduce a prepare-and-measure QKR protocol where the communication from Alice to Bob consists entirely of qubits. As usual, Bob responds with an authenticated one-bit accept/reject classical messag… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  17. arXiv:1802.07573  [pdf, other

    physics.optics quant-ph

    Asymmetric Cryptography with Physical Unclonable Keys

    Authors: Ravitej Uppu, Tom A. W. Wolterink, Sebastianus A. Goorden, Bin Chen, Boris Škorić, Allard P. Mosk, Pepijn W. H. Pinkse

    Abstract: Secure communication is of paramount importance in modern society. Asymmetric cryptography methods such as the widely used RSA method allow secure exchange of information between parties who have not shared secret keys. However, the existing asymmetric cryptographic schemes rely on unproven mathematical assumptions for security. Further, the digital keys used in their implementation are susceptibl… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 20 pages, 8 figures

    Journal ref: Quantum Science and Technology 4, 045011 (2019)

  18. arXiv:1709.00552  [pdf, other

    quant-ph

    Security proof for Round Robin Differential Phase Shift QKD

    Authors: Daan Leermakers, Boris Skoric

    Abstract: We give a security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve's optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice an… ▽ More

    Submitted 8 February, 2018; v1 submitted 2 September, 2017; originally announced September 2017.

  19. arXiv:1704.04690  [pdf, other

    quant-ph

    Optimal attacks on qubit-based Quantum Key Recycling

    Authors: Daan Leermakers, Boris Skoric

    Abstract: Quantum Key Recycling (QKR) is a quantum-cryptographic primitive that allows one to re-use keys in an unconditionally secure way. By removing the need to repeatedly generate new keys it improves communication efficiency. Skoric and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit op… ▽ More

    Submitted 15 April, 2017; originally announced April 2017.

  20. Quantum-Secure Authentication with a Classical Key

    Authors: Sebastianus A. Goorden, Marcel Horstmann, Allard P. Mosk, Boris Škorić, Pepijn W. H. Pinkse

    Abstract: Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical p… ▽ More

    Submitted 3 June, 2014; v1 submitted 1 March, 2013; originally announced March 2013.

    Comments: Revised version of 7 pages including extended appendix with in total 4 figures

    Journal ref: Optica 1 (6), 421-424 (2014)