129 results on '"Cosmo Lupo"'
Search Results
2. Practical continuous-variable quantum key distribution with composable security
- Author
-
Nitin Jain, Hou-Man Chin, Hossein Mani, Cosmo Lupo, Dino Solar Nikolic, Arne Kordts, Stefano Pirandola, Thomas Brochmann Pedersen, Matthias Kolb, Bernhard Ömer, Christoph Pacher, Tobias Gehring, and Ulrik L. Andersen
- Subjects
Science - Abstract
Continuous-variable QKD protocols are usually easier to implement than discrete-variables ones, but their security analyses are less developed. Here, the authors propose and demonstrate in the lab a CVQKD protocol that can generate composable keys secure against collective attacks.
- Published
- 2022
- Full Text
- View/download PDF
3. Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
- Author
-
Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda O. Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Laurent Kling, Mario Stipčević, Rupert Ursin, and John G. Rarity
- Subjects
Physics ,QC1-999 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications. Often, knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here, we experimentally demonstrate five information-theoretically secure anonymity protocols on an eight user city-wide quantum network using polarisation entangled photon pairs. At the heart of these protocols is anonymous broadcasting, which is a cryptographic primitive that allows one user to reveal one bit of information while keeping their identity anonymous. For a network of n users, the protocols retain anonymity for the sender, given that no more than n − 2 users are colluding. This is an implementation of genuine multi-user cryptographic protocols beyond standard QKD. Our anonymous protocols enhance the functionality of any fully-connected Quantum Key Distribution network without trusted nodes.
- Published
- 2022
- Full Text
- View/download PDF
4. Error-tolerant oblivious transfer in the noisy-storage model
- Author
-
Cosmo Lupo, James T. Peat, Erika Andersson, and Pieter Kok
- Subjects
Physics ,QC1-999 - Abstract
The noisy-storage model of quantum cryptography allows for information-theoretically secure two-party computation based on the assumption that a cheating user has at most access to an imperfect, noisy quantum memory, whereas the honest users do not need a quantum memory at all. In general, the more noisy the quantum memory of the cheating user, the more secure the implementation of oblivious transfer, which is a primitive that allows universal secure two-party and multiparty computation. For experimental implementations of oblivious transfer, one has to consider that also the devices held by the honest users are lossy and noisy, and error correction needs to be applied to correct these trusted errors. The latter are expected to reduce the security of the protocol, since a cheating user may hide themselves in the trusted noise. Here we leverage entropic uncertainty relations to derive tight bounds on the security of oblivious transfer with a trusted and untrusted noise. In particular, we discuss noisy storage and bounded storage, with independent and correlated noise.
- Published
- 2023
- Full Text
- View/download PDF
5. Homodyne-based quantum random number generator at 2.9 Gbps secure against quantum side-information
- Author
-
Tobias Gehring, Cosmo Lupo, Arne Kordts, Dino Solar Nikolic, Nitin Jain, Tobias Rydberg, Thomas B. Pedersen, Stefano Pirandola, and Ulrik L. Andersen
- Subjects
Science - Abstract
Security analyses for trusted quantum random number generators usually consider only classical side-information. Here, the authors fill this gap by fully characterising the experimental apparatus of a homodyne-based QRNG, assuming that the vacuum fluctuations and noise are stationary and Gaussian.
- Published
- 2021
- Full Text
- View/download PDF
6. Linear optics and photodetection achieve near-optimal unambiguous coherent state discrimination
- Author
-
Jasminder S. Sidhu, Michael S. Bullock, Saikat Guha, and Cosmo Lupo
- Subjects
Physics ,QC1-999 - Abstract
Coherent states of the quantum electromagnetic field, the quantum description of ideal laser light, are prime candidates as information carriers for optical communications. A large body of literature exists on their quantum-limited estimation and discrimination. However, very little is known about the practical realizations of receivers for unambiguous state discrimination (USD) of coherent states. Here we fill this gap and outline a theory of USD with receivers that are allowed to employ: passive multimode linear optics, phase-space displacements, auxiliary vacuum modes, and on-off photon detection. Our results indicate that, in some regimes, these currently-available optical components are typically sufficient to achieve near-optimal unambiguous discrimination of multiple, multimode coherent states.
- Published
- 2023
- Full Text
- View/download PDF
7. Dynamical Quantum Phase Transitions of the Schwinger Model: Real-Time Dynamics on IBM Quantum
- Author
-
Domenico Pomarico, Leonardo Cosmai, Paolo Facchi, Cosmo Lupo, Saverio Pascazio, and Francesco V. Pepe
- Subjects
noisy intermediate-scale quantum devices ,quantum electrodynamics ,dynamical quantum phase transition ,Science ,Astrophysics ,QB460-466 ,Physics ,QC1-999 - Abstract
Simulating the real-time dynamics of gauge theories represents a paradigmatic use case to test the hardware capabilities of a quantum computer, since it can involve non-trivial input states’ preparation, discretized time evolution, long-distance entanglement, and measurement in a noisy environment. We implemented an algorithm to simulate the real-time dynamics of a few-qubit system that approximates the Schwinger model in the framework of lattice gauge theories, with specific attention to the occurrence of a dynamical quantum phase transition. Limitations in the simulation capabilities on IBM Quantum were imposed by noise affecting the application of single-qubit and two-qubit gates, which combine in the decomposition of Trotter evolution. The experimental results collected in quantum algorithm runs on IBM Quantum were compared with noise models to characterize the performance in the absence of error mitigation.
- Published
- 2023
- Full Text
- View/download PDF
8. 100-Gbit/s Integrated Quantum Random Number Generator Based on Vacuum Fluctuations
- Author
-
Cédric Bruynsteen, Tobias Gehring, Cosmo Lupo, Johan Bauwelinck, and Xin Yin
- Subjects
Physics ,QC1-999 ,Computer software ,QA76.75-76.765 - Abstract
Emerging communication and cryptography applications call for reliable fast unpredictable random number generators. Quantum random number generation allows for the creation of truly unpredictable numbers due to the inherent randomness available in quantum mechanics. A popular approach is to use the quantum vacuum state to generate random numbers. While convenient, this approach has been generally limited in speed compared to other schemes. Here, through custom codesign of optoelectronic integrated circuits and side-information reduction by digital filtering, we experimentally demonstrate an ultrafast generation rate of 100 Gbit/s, setting a new record for vacuum-based quantum random number generation by one order of magnitude. Furthermore, our experimental demonstrations are well supported by an upgraded device-dependent framework that is secure against both classical and quantum side information and that also properly considers the nonlinearity in the digitization process. This ultrafast secure random number generator in the chip-scale platform holds promise for next-generation communication and cryptography applications.
- Published
- 2023
- Full Text
- View/download PDF
9. Publisher Correction: Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
- Author
-
Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda O. Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Laurent Kling, Mario Stipčević, Rupert Ursin, and John G. Rarity
- Subjects
Physics ,QC1-999 ,Electronic computers. Computer science ,QA75.5-76.95 - Published
- 2022
- Full Text
- View/download PDF
10. Quantum Key Distribution with Nonideal Heterodyne Detection: Composable Security of Discrete-Modulation Continuous-Variable Protocols
- Author
-
Cosmo Lupo and Yingkai Ouyang
- Subjects
Physics ,QC1-999 ,Computer software ,QA76.75-76.765 - Abstract
Continuous-variable quantum key distribution exploits coherent measurements of the electromagnetic field, i.e., homodyne or heterodyne detection. The most advanced security proofs developed so far have relied on idealized mathematical models for such measurements, which assume that the measurement outcomes are continuous and unbounded variables. As physical-measurement devices have a finite range and precision, these mathematical models only serve as an approximation. It is expected that, under suitable conditions, the predictions obtained using these simplified models will be in good agreement with the actual experimental implementations. However, a quantitative analysis of the error introduced by this approximation, and of its impact on composable security, have been lacking so far. Here, we present a theory to rigorously account for the experimental limitations of realistic heterodyne detection. We focus on collective attacks and present security proofs for the asymptotic and finite-size regimes, the latter being within the framework of composable security. In doing this, we establish for the first time the composable security of discrete-modulation continuous-variable quantum key distribution in the finite-size regime. Tight bounds on the key rates are obtained through semidefinite programming and do not rely on a truncation of the Hilbert space.
- Published
- 2022
- Full Text
- View/download PDF
11. Quantum-Limited Estimation of Range and Velocity
- Author
-
Zixin Huang, Cosmo Lupo, and Pieter Kok
- Subjects
Physics ,QC1-999 ,Computer software ,QA76.75-76.765 - Abstract
The energy-time uncertainty relation puts a fundamental limit on the precision of lidars for the estimation of range and velocity. The precision in the estimation of the range (through the time of arrival) and the velocity (through Doppler frequency shifts) of a target are inversely related to each other and are dictated by the bandwidth of the signal. Here, we use the theoretical toolbox of multiparameter quantum metrology to determine the ultimate precision of the simultaneous estimation of range and velocity. We consider the case of a single target as well as a pair of closely separated targets. In the latter case, we focus on the relative position and velocity. We show that the tradeoff between the estimation precision of position and velocity is relaxed for entangled probe states and is completely lifted in the limit of perfect photon time-frequency correlations. In the regime where the two targets are close to each other, the relative position and velocity can be estimated nearly optimally and jointly, even without entanglement, using the measurements determined by the symmetric logarithmic derivatives.
- Published
- 2021
- Full Text
- View/download PDF
12. Photonic quantum data locking
- Author
-
Zixin Huang, Peter P. Rohde, Dominic W. Berry, Pieter Kok, Jonathan P. Dowling, and Cosmo Lupo
- Subjects
Physics ,QC1-999 - Abstract
Quantum data locking is a quantum phenomenon that allows us to encrypt a long message with a small secret key with information-theoretic security. This is in sharp contrast with classical information theory where, according to Shannon, the secret key needs to be at least as long as the message. Here we explore photonic architectures for quantum data locking, where information is encoded in multi-photon states and processed using multi-mode linear optics and photo-detection, with the goal of extending an initial secret key into a longer one. The secret key consumption depends on the number of modes and photons employed. In the no-collision limit, where the likelihood of photon bunching is suppressed, the key consumption is shown to be logarithmic in the dimensions of the system. Our protocol can be viewed as an application of the physics of Boson Sampling to quantum cryptography. Experimental realisations are challenging but feasible with state-of-the-art technology, as techniques recently used to demonstrate Boson Sampling can be adapted to our scheme (e.g., Phys. Rev. Lett. 123, 250503, 2019).
- Published
- 2021
- Full Text
- View/download PDF
13. Quantum Receiver for Phase-Shift Keying at the Single-Photon Level
- Author
-
Jasminder S. Sidhu, Shuro Izumi, Jonas S. Neergaard-Nielsen, Cosmo Lupo, and Ulrik L. Andersen
- Subjects
Physics ,QC1-999 ,Computer software ,QA76.75-76.765 - Abstract
Quantum enhanced receivers are endowed with resources to achieve higher sensitivities than conventional technologies. For application in optical communications, they provide improved discriminatory capabilities for multiple nonorthogonal quantum states. In this work, we propose and experimentally demonstrate a new decoding scheme for quadrature phase-shift encoded signals. Our receiver surpasses the standard quantum limit and outperforms all previously known nonadaptive detectors at low input powers. Unlike existing approaches, the receiver only exploits linear optical elements and on-off photodetection. This circumvents the requirement for challenging feed-forward operations that limit communication transmission rates and can be readily implemented with current technology.
- Published
- 2021
- Full Text
- View/download PDF
14. Dense coding capacity of a quantum channel
- Author
-
Riccardo Laurenza, Cosmo Lupo, Seth Lloyd, and Stefano Pirandola
- Subjects
Physics ,QC1-999 - Abstract
We consider the fundamental protocol of dense coding of classical information assuming that noise affects both the forward and backward communication lines between Alice and Bob. Assuming that this noise is described by the same quantum channel, we define its dense coding capacity by optimizing over all adaptive strategies that Alice can implement, while Bob encodes the information by means of Pauli operators. Exploiting techniques of channel simulation and protocol stretching, we are able to establish the dense coding capacity of Pauli channels in arbitrary finite dimension, with simple formulas for depolarizing and dephasing qubit channels.
- Published
- 2020
- Full Text
- View/download PDF
15. Quantum Data Locking for Secure Communication against an Eavesdropper with Time-Limited Storage
- Author
-
Cosmo Lupo
- Subjects
quantum cryptography ,quantum data locking ,quantum enigma machine ,Science ,Astrophysics ,QB460-466 ,Physics ,QC1-999 - Abstract
Quantum cryptography allows for unconditionally secure communication against an eavesdropper endowed with unlimited computational power and perfect technologies, who is only constrained by the laws of physics. We review recent results showing that, under the assumption that the eavesdropper can store quantum information only for a limited time, it is possible to enhance the performance of quantum key distribution in both a quantitative and qualitative fashion. We consider quantum data locking as a cryptographic primitive and discuss secure communication and key distribution protocols. For the case of a lossy optical channel, this yields the theoretical possibility of generating secret key at a constant rate of 1 bit per mode at arbitrarily long communication distances.
- Published
- 2015
- Full Text
- View/download PDF
16. Quantum data locking for high-rate private communication
- Author
-
Cosmo Lupo and Seth Lloyd
- Subjects
quantum communication ,quantum data locking ,quantum enigma machine ,Science ,Physics ,QC1-999 - Abstract
We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than one bit below the rate of non-private classical communication. This result is obtained by exploiting the quantum data locking effect. The price to pay to achieve such a high private communication rate is that accessible information security is in general not composable. However, composable security holds against an eavesdropper who is forced to measure her share of the quantum system within a finite time after she gets it.
- Published
- 2015
- Full Text
- View/download PDF
17. Quantum Enigma Machines and the Locking Capacity of a Quantum Channel
- Author
-
Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka, and Mark M. Wilde
- Subjects
Physics ,QC1-999 - Abstract
The locking effect is a phenomenon that is unique to quantum information theory and represents one of the strongest separations between the classical and quantum theories of information. The Fawzi-Hayden-Sen locking protocol harnesses this effect in a cryptographic context, whereby one party can encode n bits into n qubits while using only a constant-size secret key. The encoded message is then secure against any measurement that an eavesdropper could perform in an attempt to recover the message, but the protocol does not necessarily meet the composability requirements needed in quantum key distribution applications. In any case, the locking effect represents an extreme violation of Shannon’s classical theorem, which states that information-theoretic security holds in the classical case if and only if the secret key is the same size as the message. Given this intriguing phenomenon, it is of practical interest to study the effect in the presence of noise, which can occur in the systems of both the legitimate receiver and the eavesdropper. This paper formally defines the locking capacity of a quantum channel as the maximum amount of locked information that can be reliably transmitted to a legitimate receiver by exploiting many independent uses of a quantum channel and an amount of secret key sublinear in the number of channel uses. We provide general operational bounds on the locking capacity in terms of other well-known capacities from quantum Shannon theory. We also study the important case of bosonic channels, finding limitations on these channels’ locking capacity when coherent-state encodings are employed and particular locking protocols for these channels that might be physically implementable.
- Published
- 2014
- Full Text
- View/download PDF
18. Experimental implementation of secure anonymous protocols on an eight-user quantum network.
- Author
-
Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda Ottaviano Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Loncaric, Sebastian Philipp Neumann, Bo Liu, Zeljko Samec, Laurent Kling, Mario Stipcevic, Rupert Ursin, and John G. Rarity
- Published
- 2020
19. Super-additivity and entanglement assistance in quantum reading.
- Author
-
Cosmo Lupo and Stefano Pirandola
- Published
- 2017
- Full Text
- View/download PDF
20. Quantum Data Hiding in the Presence of Noise.
- Author
-
Cosmo Lupo, Mark M. Wilde, and Seth Lloyd
- Published
- 2016
- Full Text
- View/download PDF
21. Ultimate limits of exoplanet spectroscopy: A quantum approach
- Author
-
Zixin Huang, Christian Schwab, and Cosmo Lupo
- Subjects
Earth and Planetary Astrophysics (astro-ph.EP) ,Quantum Physics ,FOS: Physical sciences ,Astrophysics - Instrumentation and Methods for Astrophysics ,Quantum Physics (quant-ph) ,Instrumentation and Methods for Astrophysics (astro-ph.IM) ,Astrophysics - Earth and Planetary Astrophysics - Abstract
One of the big challenges in exoplanet science is to determine the atmospheric makeup of extrasolar planets, and to find biosignatures that hint at the existence of biochemical processes on another world. The biomarkers we are trying to detect are gases in the exoplanet atmosphere like oxygen or methane, which have deep absorption features in the visible and near-infrared spectrum. Here we establish the ultimate quantum limit for determining the presence or absence of a spectral absorption line, for a dim source in the presence of a much brighter stellar source. We characterise the associated error exponent in both the frameworks of symmetric and asymmetric hypothesis testing. We found that a structured measurement based on spatial demultiplexing allows us to decouple the light coming from the planet and achieve the ultimate quantum limits. If the planet has intensity $\epsilon \ll 1$ relative to the star, we show that this approach significantly outperforms direct spectroscopy yielding an improvement of the error exponent by a factor $1/\epsilon$. We find the optimal measurement, which is a combination of interferometric techniques and spectrum analysis., Comment: 9 pages, 5 figures, and appendix; comments are welcome
- Published
- 2023
- Full Text
- View/download PDF
22. Multipartite Entangled Codewords for Gaussian Channels with Additive Noise and Memory.
- Author
-
Cosmo Lupo, Laleh Memarzadeh, and Stefano Mancini
- Published
- 2009
- Full Text
- View/download PDF
23. Methods for Estimating Capacities and Rates of Gaussian Quantum Channels.
- Author
-
Oleg V. Pilyavets, Cosmo Lupo, and Stefano Mancini
- Published
- 2012
- Full Text
- View/download PDF
24. Quantifying the Performance of Quantum Codes.
- Author
-
Carlo Cafaro, Sonia L'Innocente, Cosmo Lupo, and Stefano Mancini
- Published
- 2011
- Full Text
- View/download PDF
25. Qubit Dynamics in a q-Deformed Oscillators Environment.
- Author
-
Sonia L'Innocente, Cosmo Lupo, and Stefano Mancini
- Published
- 2010
- Full Text
- View/download PDF
26. On the Relation Between Schmidt Coefficients and Entanglement.
- Author
-
Paolo Aniello and Cosmo Lupo
- Published
- 2009
- Full Text
- View/download PDF
27. Exploring Representation Theory of Unitary Groups via Linear Optical Passive Devices.
- Author
-
Paolo Aniello, Cosmo Lupo, and Mario Napolitano
- Published
- 2006
- Full Text
- View/download PDF
28. Quantum data hiding in the presence of noise.
- Author
-
Cosmo Lupo, Mark M. Wilde, and Seth Lloyd
- Published
- 2015
29. Quantum receiver for phase-shift keying at the single photon level
- Author
-
Shuro Izumi, Jasminder S. Sidhu, Ulrik L. Andersen, Jonas S. Neergaard-Nielsen, and Cosmo Lupo
- Subjects
Quantum Physics ,Computer science ,Quantum limit ,General Engineering ,Optical communication ,FOS: Physical sciences ,Quantum channel ,Photodetection ,01 natural sciences ,010305 fluids & plasmas ,Quantum state ,0103 physical sciences ,Electronic engineering ,General Earth and Planetary Sciences ,Quantum information ,010306 general physics ,Quantum information science ,Quantum Physics (quant-ph) ,QC ,General Environmental Science ,Phase-shift keying - Abstract
Quantum enhanced receivers are endowed with resources to achieve higher sensitivities than conventional technologies. For application in optical communications, they provide improved discriminatory capabilities for multiple non-orthogonal quantum states. In this work, we propose and experimentally demonstrate a new decoding scheme for quadrature phase-shift encoded signals. Our receiver surpasses the standard quantum limit and outperforms all previously known non-adaptive detectors at low input powers. Unlike existing approaches, the receiver only exploits linear optical elements and on-off photo-detection. This circumvents the requirement for challenging feed-forward operations that limit communication transmission rates and can be readily implemented with current technology., 11 pages with 10 figures with appendices. Extended analysis. Accepted version
- Published
- 2021
- Full Text
- View/download PDF
30. Quantum key distribution with non-ideal heterodyne detection: composable security of discrete-modulation continuous-variable protocols
- Author
-
Yingkai Ouyang and Cosmo Lupo
- Subjects
Quantum Physics ,General Engineering ,FOS: Physical sciences ,General Earth and Planetary Sciences ,Quantum Physics (quant-ph) ,General Environmental Science - Abstract
Continuous-variable quantum key distribution exploits coherent measurements of the electromagnetic field, i.e., homodyne or heterodyne detection. The most advanced security proofs developed so far relied on idealised mathematical models for such measurements, which assume that the measurement outcomes are continuous and unbounded variables. As physical measurement devices have finite range and precision, these mathematical models only serve as an approximation. It is expected that, under suitable conditions, the predictions obtained using these simplified models are in good agreement with the actual experimental implementations. However, a quantitative analysis of the error introduced by this approximation, and of its impact on composable security, have been lacking so far. Here we present a theory to rigorously account for the experimental limitations of realistic heterodyne detection. We focus on collective attacks, and present security proofs for the asymptotic and finite-size regimes, the latter within the framework of composable security. In doing this, we establish for the first time the composable security of discrete-modulation continuous-variable quantum key distribution in the finite-size regime. Tight bounds on the key rates are obtained through semi-definite programming and do not rely on a truncation of the Hilbert space., v3: close to published version
- Published
- 2021
31. Entanglement Based Quantum Networks: Protocols, AI control plane & coexistence with classical communication
- Author
-
Sören Wengerowsky, Rui Wang, Rupert Ursin, Alex Qiu, Stefano Pirandola, Zeljko Samec, M. Clark, Dimitra Simeonidou, Djeylan Aktas, Armanda O. Quintavalle, Cosmo Lupo, Siddarth Koduru Joshi, Alasdair I. Fletcher, Sebastian Philipp Neumann, Rodrigo Stange Tessinari, Emilio Hugues-Salas, George T. Kanellos, John Rarity, Zixin Huang, Mario Stipčević, Reza Nejabati, Thomas Scheidl, Obada Alia, Naomi R. Solomons, Natarajan Venkatachalam, Martin Lončarić, Y. Pelet, B. Liu, Erika Andersson, Laurent Kling, and Ittoop Vergheese Puthoor
- Subjects
Quantum network ,Network architecture ,End-to-end principle ,business.industry ,Computer science ,Quantum state ,Loopback ,Quantum channel ,Quantum entanglement ,business ,Quantum information science ,Computer network - Abstract
Quantum networks scale the advantages of quantum communication protocols to more than just two distant users. Here we present a fully connected quantum network architecture in which a single entangled photon source distributes quantum states to a multitude of users [1] and our work scaling the network to a complete end to end metropolitan quantum network with 8 users [2] . Our network architecture optimises the resources required by each user without sacrificing security or functionality. We established several long-distance loopback connections and demonstrated extended stable operation with high secure key rates. Unlike previous attempts at multi-user networks, which have been based on active components, and thus limited to some duty cycle, our implementation is fully passive. Further, we present our efforts towards coexistence of 100 Gbps classical communication and all quantum channels used in the network over the same deployed optical fibres.
- Published
- 2021
- Full Text
- View/download PDF
32. Fault-tolerant quantum data locking
- Author
-
Pieter Kok, Cosmo Lupo, and Zixin Huang
- Subjects
Physics ,Discrete mathematics ,Pseudorandom number generator ,Quantum Physics ,business.industry ,Code word ,FOS: Physical sciences ,TheoryofComputation_GENERAL ,Order (ring theory) ,Encryption ,01 natural sciences ,010305 fluids & plasmas ,0103 physical sciences ,Information leakage ,Quantum Physics (quant-ph) ,010306 general physics ,business ,Quantum information science ,Quantum ,Computer Science::Cryptography and Security ,Quantum computer - Abstract
Quantum data locking is a quantum communication primitive that allows the use of a short secret key to encrypt a much longer message. It guarantees information-theoretical security against an adversary with limited quantum memory. Here we present a quantum data locking protocol that employs pseudo-random circuits consisting of Clifford gates only, which are much easier to implement fault tolerantly than universal gates. We show that information can be encrypted into $n$-qubit code words using order $n - H_\mathrm{min}(\mathsf{X})$ secret bits, where $H_\mathrm{min}(\mathsf{X})$ is the min-entropy of the plain text, and a min-entropy smaller than $n$ accounts for information leakage to the adversary. As an application, we discuss an efficient method for encrypting the output of a quantum computer., Comment: 5 pages, 2 figures, 3 pages appendix
- Published
- 2021
- Full Text
- View/download PDF
33. Quantum enigma machines and the locking capacity of a quantum channel.
- Author
-
Saikat Guha 0001, Patrick M. Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka, and Mark M. Wilde
- Published
- 2013
34. Softening the Complexity of Entropic Motion on Curved Statistical Manifolds.
- Author
-
Carlo Cafaro, Adom Giffin, Cosmo Lupo, and Stefano Mancini
- Published
- 2012
- Full Text
- View/download PDF
35. Protocols Beyond Just QKD on an Eight-User Quantum Network
- Author
-
Erika Andersson, Stefano Pirandola, Laurent Kling, Bo Liu, Armanda O. Quintavalle, Alex Qiu, Sebastian Philipp Neumann, Naomi R. Solomons, Yoann Pelet, Thomas Scheidl, Rupert Ursin, Ittoop Vergheese Puthoor, Sören Wengerowsky, Zeljko Samec, Siddarth Koduru Joshi, Djeylan Aktas, Alasdair I. Fletcher, Martin Lončarić, Zixin Huang, Cosmo Lupo, John Rarity, and Mario Stipčević
- Subjects
Authentication ,Quantum network ,Digital signature ,business.industry ,Computer science ,Wavelength-division multiplexing ,Quantum channel ,Quantum key distribution ,business ,Computer network ,Anonymity ,Flooding (computer networking) - Abstract
Quantum networks have been limited to QKD. Here we present an 8 user quantum network running 5 different anonymity protocols, digital signatures, authentication transfer (sharing initial authentication keys) and flooding (optimally utilization of resources).
- Published
- 2021
- Full Text
- View/download PDF
36. Quantum Hypothesis Testing for Exoplanet Detection
- Author
-
Cosmo Lupo and Zixin Huang
- Subjects
Physics ,Quantum Physics ,business.industry ,FOS: Physical sciences ,General Physics and Astronomy ,Ranging ,Quantum imaging ,Exoplanet ,Secondary source ,Optics ,Quantum state ,Microscopy ,Quantum Physics (quant-ph) ,business ,Quantum ,Statistical hypothesis testing - Abstract
Detecting the faint emission of a secondary source in the proximity of the much brighter one has been the most severe obstacle for using direct imaging in searching for exoplanets. Using quantum state discrimination and quantum imaging techniques, we show that one can significantly reduce the probability of error for detecting the presence of a weak secondary source, especially when the two sources have small angular separations. If the weak source has intensity ε≪1 relative to the bright source, we find that the error exponent can be improved by a factor of 1/ε. We also find linear-optical measurements that are optimal in this regime. Our result serves as a complementary method in the toolbox of optical imaging, with applications ranging from astronomy to microscopy.
- Published
- 2021
37. Resource-efficient energy test and parameter estimation in continuous-variable quantum key distribution
- Author
-
Cosmo Lupo
- Subjects
Physics ,Quantum Physics ,Mathematical optimization ,Estimation theory ,Gaussian ,Hilbert space ,FOS: Physical sciences ,Quantum key distribution ,Upper and lower bounds ,Symmetry (physics) ,symbols.namesake ,symbols ,Quantum Physics (quant-ph) ,Energy (signal processing) ,Efficient energy use ,Computer Science::Cryptography and Security - Abstract
Symmetry plays a fundamental role in the security analysis of quantum key distribution (QKD). Here we review how symmetry is exploited in continuous-variable (CV) QKD to prove the optimality of Gaussian attacks in the finite-size regime. We then apply these results to improve the efficiency, and thus the key rate, of these protocols. First we show how to improve the efficiency of the energy test, which is one important routine in a CV QKD protocol aimed at establishing an upper bound on the effective dimensions of the otherwise infinite-dimensional Hilbert space of CV systems. Second, we show how the routine of parameter estimation can be made resource efficient in measurement-device independent (MDI) QKD. These results show that all the raw data can be used both for key extraction and for the routines of energy test and parameter estimation., Comment: 14 pages, two figures. V2: close to the published version
- Published
- 2021
38. Poisson states in quantum information
- Author
-
Cosmo Lupo
- Subjects
Physics ,symbols.namesake ,symbols ,Statistical physics ,Quantum information ,Poisson distribution - Published
- 2021
39. Sub-wavelength quantum imaging
- Author
-
Zixin Huang, Cosmo Lupo, and Pieter Kok
- Subjects
Physics ,Quantum technology ,Interferometry ,symbols.namesake ,Rayleigh length ,Quantum metrology ,symbols ,Statistical physics ,Limit (mathematics) ,Rayleigh scattering ,Quantum imaging ,Information theory - Abstract
The resolution limit of standard imaging techniques is expressed by the Rayleigh criterion, which states that two point-like sources are difficult to resolve if their transverse separation is smaller that the Rayleigh length. While the criterion is useful in the case of direct detection imaging, other measurement techniques may not be subject to this limitation. Here we consider the use of imaging to estimate the distance between two incoherent point sources. In this framework, the Rayleigh criterion manifests itself through the so-called Rayleigh curse. The latter expresses the fact that the statistical error in the estimation increases for sub-wavelength separation. Here we show that, in the regime of weak signals, a structured measurement obtained by concatenating a linear interferometer with on-off photo-detection is immune to the Rayleigh curse. In this way we clarify the relation between imaging and interferometry, and establish the optimality of linear interferometry for an arbitrary number of incoherent sources.
- Published
- 2021
40. Quantum-limited estimation of range and velocity
- Author
-
Cosmo Lupo, Zixin Huang, and Pieter Kok
- Subjects
Physics ,Quantum Physics ,General Engineering ,FOS: Physical sciences ,Quantum entanglement ,Computational physics ,Lidar ,Range (statistics) ,General Earth and Planetary Sciences ,Quantum Physics (quant-ph) ,Quantum ,Optics (physics.optics) ,General Environmental Science ,Physics - Optics - Abstract
The energy-time uncertainty relation puts a fundamental limit on the precision of radars and lidars for the estimation of range and velocity. The precision in the estimation of the range (through the time of arrival) and the velocity (through Doppler frequency shifts) of a target are inversely related to each other, and dictated by the bandwidth of the signal. Here we use the theoretical toolbox of multi-parameter quantum metrology to determine the ultimate precision of the simultaneous estimation of range and velocity. We consider the case of a single target as well as a pair of closely separated targets. In the latter case, we focus on the relative position and velocity. We show that the trade-off between the estimation precision of position and velocity is relaxed for entangled probe states, and is completely lifted in the limit of infinite entanglement. In the regime where the two targets are close to each other, the relative position and velocity can be estimated nearly optimally and jointly, even without entanglement, using the measurements determined by the symmetric logarithmic derivatives., 9 pages, 5 figures plus appendix
- Published
- 2020
41. Advances in quantum cryptography
- Author
-
Ulrik L. Andersen, Mario Berta, Leonardo Banchi, Tobias Gehring, Paolo Villoresi, Jason Pereira, Cosmo Lupo, Jesni Shamsul Shaari, Dirk Englund, Darius Bunandar, Stefano Pirandola, Roger Colbeck, Marco Tomamichel, Giuseppe Vallone, Petros Wallden, Mohsen Razavi, Vladyslav C. Usenko, Carlo Ottaviani, and Massachusetts Institute of Technology. Research Laboratory of Electronics
- Subjects
Computer science ,Random number generation ,FOS: Physical sciences ,02 engineering and technology ,Quantum channel ,Applied Physics (physics.app-ph) ,Quantum key distribution ,01 natural sciences ,010309 optics ,Digital signature ,0103 physical sciences ,Quantum information science ,Quantum ,Mathematical Physics ,Quantum optics ,Quantum Physics ,TheoryofComputation_GENERAL ,Physics - Applied Physics ,Mathematical Physics (math-ph) ,Computational Physics (physics.comp-ph) ,021001 nanoscience & nanotechnology ,Atomic and Molecular Physics, and Optics ,Computer engineering ,Quantum cryptography ,0210 nano-technology ,Quantum Physics (quant-ph) ,Physics - Computational Physics ,Physics - Optics ,Optics (physics.optics) - Abstract
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of the art description of the recent advances in the field, both theoretically and experimentally. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum data locking and quantum digital signatures., Comment: Review article. Comments and suggestions are welcome. REVTeX: 118 pages, 20 figures, 785 references
- Published
- 2020
- Full Text
- View/download PDF
42. Quantum Limits to Incoherent Imaging are Achieved by Linear Interferometry
- Author
-
Cosmo Lupo, Pieter Kok, and Zixin Huang
- Subjects
Physics ,Work (thermodynamics) ,business.industry ,General problem ,Paraxial approximation ,General Physics and Astronomy ,Photodetector ,Sense (electronics) ,01 natural sciences ,Interferometry ,Range (mathematics) ,Optics ,0103 physical sciences ,010306 general physics ,business ,Quantum - Abstract
We solve the general problem of determining, through imaging, the three-dimensional positions of N weak incoherent pointlike emitters in an arbitrary spatial configuration. We show that a structured measurement strategy in which a passive linear interferometer feeds into an array of photodetectors is always optimal for this estimation problem, in the sense that it saturates the quantum Cramér-Rao bound. We provide a method for the explicit construction of the optimal interferometer. Further explicit results for the quantum Fisher information and the optimal interferometer design that attains it are obtained for the special case of one and two incoherent emitters in the paraxial regime. This work provides insights into the phenomenon of superresolution through incoherent imaging that has attracted much attention recently. Our results will find a wide range of applications over a broad spectrum of frequencies, from fluorescence microscopy to stellar interferometry.
- Published
- 2019
43. Quantum enigma machine: Experimentally demonstrating quantum data locking
- Author
-
Thomas Gerrits, Seth Lloyd, Michael S. Allman, Daniel J. Lum, Cosmo Lupo, Varun B. Verma, John C. Howell, and Sae Woo Nam
- Subjects
FOS: Physical sciences ,computer.software_genre ,Encryption ,01 natural sciences ,Article ,010309 optics ,Multiple encryption ,0103 physical sciences ,Computer Science::Multimedia ,010306 general physics ,BB84 ,Computer Science::Cryptography and Security ,Physics ,Quantum Physics ,business.industry ,Quantum cryptography ,Probabilistic encryption ,40-bit encryption ,Link encryption ,On-the-fly encryption ,Quantum Physics (quant-ph) ,business ,computer ,Algorithm ,Optics (physics.optics) ,Physics - Optics - Abstract
Claude Shannon proved in 1949 that information-theoretic-secure encryption is possible if the encryption key is used only once, is random, and is at least as long as the message itself. Notwithstanding, when information is encoded in a quantum system, the phenomenon of quantum data locking allows one to encrypt a message with a shorter key and still provide information-theoretic security. We present one of the first feasible experimental demonstrations of quantum data locking for direct communication and propose a scheme for a quantum enigma machine that encrypts 6 bits per photon (containing messages, new encryption keys, and forward error correction bits) with less than 6 bits per photon of encryption key while remaining information-theoretically secure., 10 Figures
- Published
- 2019
44. Multipartite entanglement swapping and mechanical cluster states
- Author
-
Alessandro Ferraro, Cosmo Lupo, Stefano Pirandola, Mauro Paternostro, and Carlo Ottaviani
- Subjects
FOS: Physical sciences ,Quantum entanglement ,Applied Physics (physics.app-ph) ,Topology ,01 natural sciences ,Multipartite entanglement ,010305 fluids & plasmas ,law.invention ,Relay ,law ,0103 physical sciences ,010306 general physics ,Quantum information science ,Quantum ,Physics ,Quantum network ,Quantum Physics ,Cluster state ,Physics - Applied Physics ,Atomic and Molecular Physics, and Optics ,Condensed Matter - Other Condensed Matter ,Multipartite ,Quantum Physics (quant-ph) ,Physics - Optics ,Other Condensed Matter (cond-mat.other) ,Optics (physics.optics) - Abstract
We present a protocol for generating multipartite quantum correlations across a quantum network with a continuous-variable architecture. An arbitrary number of users possess two-mode entangled states, keeping one mode while sending the other to a central relay. Here a suitable multipartite Bell detection is performed which conditionally generates a cluster state on the retained modes. This cluster state can be suitably manipulated by the parties and used for tasks of quantum communication in a fully optical scenario. More interestingly, the protocol can be used to create a purely-mechanical cluster state starting from a supply of optomechanical systems. We show that detecting the optical parts of optomechanical cavities may efficiently swap entanglement into their mechanical modes, creating cluster states up to 5 modes under suitable cryogenic conditions., Comment: REVTeX. 5 pages. 2 figures. Comments are welcome
- Published
- 2019
- Full Text
- View/download PDF
45. Modular network for high-rate quantum conferencing
- Author
-
Stefano Pirandola, Carlo Ottaviani, Riccardo Laurenza, and Cosmo Lupo
- Subjects
Star network ,Computer science ,FOS: Physical sciences ,General Physics and Astronomy ,lcsh:Astrophysics ,Quantum channel ,Quantum key distribution ,01 natural sciences ,010305 fluids & plasmas ,lcsh:QB460-466 ,0103 physical sciences ,010306 general physics ,Quantum information science ,Protocol (object-oriented programming) ,Computer Science::Cryptography and Security ,Quantum Physics ,Quantum network ,business.industry ,Modular design ,lcsh:QC1-999 ,ComputerSystemsOrganization_MISCELLANEOUS ,Scalability ,Quantum Physics (quant-ph) ,business ,lcsh:Physics ,Computer network - Abstract
One of the main open problems in quantum communication is the design of efficient quantum-secured networks. This is a challenging goal, because it requires protocols that guarantee both unconditional security and high communication rates, while increasing the number of users. In this scenario, continuous-variable systems provide an ideal platform where high rates can be achieved by using off-the-shelf optical components. At the same time, the measurement-device independent architecture is also appealing for its feature of removing a substantial portion of practical weaknesses. Driven by these ideas, here we introduce a modular design of continuous-variable network where each individual module is a measurement-device-independent star network. In each module, the users send modulated coherent states to an untrusted relay, creating multipartite secret correlations via a generalized Bell detection. Using one-time pad between different modules, the network users may share a quantum-secure conference key over arbitrary distances at constant rate., Comment: REVTeX. 18 pages (main text plus supplementary information), 8 figures
- Published
- 2019
- Full Text
- View/download PDF
46. Towards practical security of continuous-variable quantum key distribution
- Author
-
Cosmo Lupo
- Subjects
Physics ,Quantum Physics ,Scope (project management) ,Workaround ,FOS: Physical sciences ,Quantum key distribution ,Mathematical proof ,01 natural sciences ,010305 fluids & plasmas ,Continuous variable ,0103 physical sciences ,Calculus ,010306 general physics ,Quantum Physics (quant-ph) ,Computer Science::Cryptography and Security - Abstract
Rigorous mathematical proofs of the security of continuous-variable quantum key distribution (CV QKD) have been obtained recently. Unfortunately, these security proofs rely on assumptions that are hardly met in experimental practice. Here I investigate these issues in detail, and discuss experimentally-friendly workarounds to assess the security of CV QKD. The aim of this paper is to show that there are hidden and unsolved issues and to indicate possible partial solutions. To provide a complete and rigorous mathematical security proof is out of the scope of this contribution., Comment: Comments welcome. V3: close to published version
- Published
- 2019
- Full Text
- View/download PDF
47. Subwavelength quantum imaging with noisy detectors
- Author
-
Cosmo Lupo
- Subjects
Physics ,Quantum Physics ,business.industry ,Detector ,Resolution (electron density) ,FOS: Physical sciences ,Quantum imaging ,01 natural sciences ,Imaging phantom ,010305 fluids & plasmas ,Wavelength ,Interferometry ,Optics ,Square root ,0103 physical sciences ,010306 general physics ,business ,Quantum Physics (quant-ph) ,Order of magnitude - Abstract
It has been recently shown that an interferometric measurement may allow for sub-wavelength resolution of incoherent light. Whereas this holds for noiseless detectors, one could expect that the resolution is in practice limited by signal-to-noise ratio. Here I present an assessment of the ultimate resolution limits that can be achieved using noisy detectors. My analysis indeed indicates that the signal-to-noise ratio represents a fundamental limit to quantum imaging, and the reduced resolution scales with the square root of the signal-to-noise ratio. For example, a signal-to-ratio of $20 dB$ is needed to resolve one order of magnitude below the Rayleigh limit., Comment: Comments welcome. v2: close to the published version
- Published
- 2019
- Full Text
- View/download PDF
48. Photonic quantum data locking
- Author
-
Dominic W. Berry, Peter P. Rohde, Zixin Huang, Jonathan P. Dowling, Cosmo Lupo, and Pieter Kok
- Subjects
Quantum Physics ,Photon ,Physics and Astronomy (miscellaneous) ,Computer science ,business.industry ,Physics ,QC1-999 ,FOS: Physical sciences ,Topology ,Information theory ,Encryption ,01 natural sciences ,Atomic and Molecular Physics, and Optics ,010305 fluids & plasmas ,Quantum cryptography ,0103 physical sciences ,Key (cryptography) ,Photonics ,010306 general physics ,business ,Quantum Physics (quant-ph) ,Quantum ,Boson ,Computer Science::Cryptography and Security - Abstract
Quantum data locking is a quantum phenomenon that allows us to encrypt a long message with a small secret key with information-theoretic security. This is in sharp contrast with classical information theory where, according to Shannon, the secret key needs to be at least as long as the message. Here we explore photonic architectures for quantum data locking, where information is encoded in multi-photon states and processed using multi-mode linear optics and photo-detection, with the goal of extending an initial secret key into a longer one. The secret key consumption depends on the number of modes and photons employed. In the no-collision limit, where the likelihood of photon bunching is suppressed, the key consumption is shown to be logarithmic in the dimensions of the system. Our protocol can be viewed as an application of the physics of Boson Sampling to quantum cryptography. Experimental realisations are challenging but feasible with state-of-the-art technology, as techniques recently used to demonstrate Boson Sampling can be adapted to our scheme (e.g., Phys. Rev. Lett. 123, 250503, 2019).
- Published
- 2019
- Full Text
- View/download PDF
49. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks
- Author
-
Cosmo Lupo, Panagiotis Papanastasiou, Stefano Pirandola, and Carlo Ottaviani
- Subjects
Physics ,Security analysis ,Quantum Physics ,Estimation theory ,Gaussian ,FOS: Physical sciences ,Quantum key distribution ,16. Peace & justice ,Topology ,01 natural sciences ,Noise (electronics) ,010305 fluids & plasmas ,Reduction (complexity) ,symbols.namesake ,0103 physical sciences ,symbols ,Key (cryptography) ,Quantum Physics (quant-ph) ,010306 general physics ,Quantum ,Computer Science::Cryptography and Security - Abstract
We present a rigorous security analysis of Continuous-Variable Measurement-Device Independent Quantum Key Distribution (CV MDI QKD) in a finite size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with new findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 10^7-10^9 quantum signal transmissions, depending on loss and noise, and on the required level of security., v4: close to the published version (which is shorter than previous arXiv versions)
- Published
- 2018
50. Fundamental limits to quantum channel discrimination
- Author
-
Jason Pereira, Riccardo Laurenza, Cosmo Lupo, and Stefano Pirandola
- Subjects
Computer Networks and Communications ,Computer science ,FOS: Physical sciences ,Quantum channel ,distinguishability ,Topology ,01 natural sciences ,Teleportation ,lcsh:QA75.5-76.95 ,010305 fluids & plasmas ,0103 physical sciences ,Computer Science (miscellaneous) ,Quantum metrology ,Quantum information ,010306 general physics ,Quantum information science ,Quantum ,Quantum optics ,Quantum Physics ,Statistical and Nonlinear Physics ,lcsh:QC1-999 ,Condensed Matter - Other Condensed Matter ,Computational Theory and Mathematics ,Quantum illumination ,lcsh:Electronic computers. Computer science ,Quantum Physics (quant-ph) ,lcsh:Physics ,Other Condensed Matter (cond-mat.other) ,Optics (physics.optics) ,Physics - Optics - Abstract
What is the ultimate performance for discriminating two arbitrary quantum channels acting on a finite-dimensional Hilbert space? Here we address this basic question by deriving a general and fundamental lower bound. More precisely, we investigate the symmetric discrimination of two arbitrary qudit channels by means of the most general protocols based on adaptive (feedback-assisted) quantum operations. In this general scenario, we first show how port-based teleportation can be used to simplify these adaptive protocols into a much simpler non-adaptive form, designing a new type of teleportation stretching. Then, we prove that the minimum error probability affecting the channel discrimination cannot beat a bound determined by the Choi matrices of the channels, establishing a general, yet computable formula for quantum hypothesis testing. As a consequence of this bound, we derive ultimate limits and no-go theorems for adaptive quantum illumination and single-photon quantum optical resolution. Finally, we show how the methodology can also be applied to other tasks, such as quantum metrology, quantum communication and secret key generation., Close to published version. Main Text, Methods, and Supplementary Information all in a single file. 21 pages and 4 figures. REVTeX. Co-author added
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.