Skip to main content

Showing 1–10 of 10 results for author: Kon, W Y

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2503.20498  [pdf, other

    quant-ph cs.CR cs.ET

    Certified randomness using a trapped-ion quantum processor

    Authors: Minzhao Liu, Ruslan Shaydulin, Pradeep Niroula, Matthew DeCross, Shih-Han Hung, Wen Yu Kon, Enrique Cervero-Martín, Kaushik Chakraborty, Omar Amer, Scott Aaronson, Atithi Acharya, Yuri Alexeev, K. Jordan Berg, Shouvanik Chakrabarti, Florian J. Curchod, Joan M. Dreiling, Neal Erickson, Cameron Foltz, Michael Foss-Feig, David Hayes, Travis S. Humble, Niraj Kumar, Jeffrey Larson, Danylo Lykov, Michael Mills , et al. (7 additional authors not shown)

    Abstract: While quantum computers have the potential to perform a wide range of practically important tasks beyond the capabilities of classical computers, realizing this potential remains a challenge. One such task is to use an untrusted remote device to generate random bits that can be certified to contain a certain amount of entropy. Certified randomness has many applications but is fundamentally impossi… ▽ More

    Submitted 26 March, 2025; originally announced March 2025.

    Journal ref: Nature (2025)

  2. arXiv:2409.16540  [pdf, other

    quant-ph

    Quantum Authenticated Key Expansion with Key Recycling

    Authors: Wen Yu Kon, Jefferson Chu, Kevin Han Yong Loh, Obada Alia, Omar Amer, Marco Pistoia, Kaushik Chakraborty, Charles Lim

    Abstract: Data privacy and authentication are two main security requirements for remote access and cloud services. While QKD has been explored to address data privacy concerns, oftentimes its use is separate from the client authentication protocol despite implicitly providing authentication. Here, we present a quantum authentication key expansion (QAKE) protocol that (1) integrates both authentication and k… ▽ More

    Submitted 24 September, 2024; originally announced September 2024.

    Comments: 71 pages, comments are welcome

  3. arXiv:2409.03635  [pdf, ps, other

    quant-ph cs.CR

    On the Relativistic Zero Knowledge Quantum Proofs of Knowledge

    Authors: Kaiyan Shi, Kaushik Chakraborty, Wen Yu Kon, Omar Amer, Marco Pistoia, Charles Lim

    Abstract: We initiate the study of relativistic zero-knowledge quantum proof of knowledge systems with classical communication, formally defining a number of useful concepts and constructing appropriate knowledge extractors for all the existing protocols in the relativistic setting which satisfy a weaker variant of the special soundness property due to Unruh (EUROCRYPT 2012). We show that there exists quant… ▽ More

    Submitted 17 December, 2024; v1 submitted 5 September, 2024; originally announced September 2024.

    Comments: 38 pages

  4. arXiv:2409.02630  [pdf, other

    quant-ph

    Discrete-modulated continuous-variable quantum key distribution secure against general attacks

    Authors: Ignatius William Primaatmaja, Wen Yu Kon, Charles Lim

    Abstract: In recent years, discrete-modulated continuous-variable quantum key distribution (DM-CV-QKD) has gained traction due to its practical advantages: cost-effectiveness, simple state preparation, and compatibility with existing communication technologies. This work presents a security analysis of DM-CV-QKD against general sequential attacks, including finite-size effects. Remarkably, our proof conside… ▽ More

    Submitted 19 October, 2024; v1 submitted 4 September, 2024; originally announced September 2024.

    Comments: Updated the discussion section

  5. Sampled sub-block hashing for large input randomness extraction

    Authors: Hong Jie Ng, Wen Yu Kon, Ignatius William Primaatmaja, Chao Wang, Charles Lim

    Abstract: Randomness extraction is an essential post-processing step in practical quantum cryptography systems. When statistical fluctuations are taken into consideration, the requirement of large input data size could heavily penalise the speed and resource consumption of the randomness extraction process, thereby limiting the overall system performance. In this work, we propose a sampled sub-block hashing… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

    Comments: 15 pages, 8 figures. All comments are welcome

  6. arXiv:2109.12827  [pdf, other

    quant-ph cs.CR

    Experimental symmetric private information retrieval with measurement-device-independent quantum network

    Authors: Chao Wang, Wen Yu Kon, Hong Jie Ng, Charles C. -W. Lim

    Abstract: Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and database content's security are enforced. For these settings, symmetric private information retrieval (SPIR) could be employed, but its implementation is known to be demanding, requiring a private key-exchange network as the base layer. Here… ▽ More

    Submitted 5 October, 2021; v1 submitted 27 September, 2021; originally announced September 2021.

  7. Estimating the photon-number distribution of photonic channels with realistic devices and applications in photonic quantum information processing

    Authors: Emilien Lavie, Ignatius William Primaatmaja, Wen Yu Kon, Chao Wang, Charles Ci Wen Lim

    Abstract: Characterising the input-output photon-number distribution of an unknown optical quantum channel is an important task for many applications in quantum information processing. Ideally, this would require deterministic photon-number sources and photon-number-resolving detectors, but these technologies are still work-in-progress. In this work, we propose a general method to rigorously bound the input… ▽ More

    Submitted 10 September, 2021; v1 submitted 16 February, 2021; originally announced February 2021.

    Comments: 19 pages, 7 figures

    Journal ref: Phys. Rev. Applied 16, 034020 (2021)

  8. arXiv:2004.13921  [pdf, other

    quant-ph cs.CR cs.IR

    Provably-secure symmetric private information retrieval with quantum cryptography

    Authors: Wen Yu Kon, Charles Ci Wen Lim

    Abstract: Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre. Symmetric private information retrieval (SPIR) takes PIR further by additionally offering database privacy, where the user cannot learn any additional entries of the database. U… ▽ More

    Submitted 17 January, 2021; v1 submitted 28 April, 2020; originally announced April 2020.

    Comments: 19 pages

    Journal ref: Entropy 23, 54 (2021)

  9. arXiv:1907.06027  [pdf, other

    cond-mat.str-el cond-mat.mtrl-sci quant-ph

    Non-classicality of spin structures in condensed matter: An analysis of Sr$_{14}$Cu$_{24}$O$_{41}$

    Authors: W. Y. Kon, T. Krisnanda, P. Sengupta, T. Paterek

    Abstract: When two quantum systems are coupled via a mediator, their dynamics has traces of non-classical properties of the mediator. We show how this observation can be effectively utilised to study the quantum nature of materials without well-established structure. A concrete example considered is Sr$_{14}$Cu$_{24}$O$_{41}$. Measurements of low temperature magnetic and thermal properties of this compound… ▽ More

    Submitted 2 December, 2019; v1 submitted 13 July, 2019; originally announced July 2019.

    Comments: 7 pages, 4 figures

    Journal ref: Phys. Rev. B 100, 235103 (2019)

  10. arXiv:1812.11682  [pdf, other

    cond-mat.quant-gas physics.atom-ph quant-ph

    High-intensity two-frequency photoassociation spectroscopy of a weakly bound molecular state: theory and experiment

    Authors: W. Y. Kon, J. A. Aman, J. C. Hill, T. C. Killian, Kaden R. A. Hazzard

    Abstract: We investigate two-frequency photoassociation of a weakly bound molecular state, focusing on a regime where the ac Stark shift is comparable to the halo-state energy. In this "high-intensity" regime, we observe features absent in low-intensity two-frequency photoassociation. We experimentally measure the spectra of $^{86}$Sr atoms coupled to the least bound state of the $^{86}$Sr$_2$ ground electr… ▽ More

    Submitted 15 July, 2019; v1 submitted 30 December, 2018; originally announced December 2018.

    Comments: 12 pages, 7 figures

    Journal ref: Phys. Rev. A 100, 013408 (2019)