50
50
Jul 20, 2013
07/13
by
M. -A. Abchir; Isis Truck; Anna Pappa
texts
eye 50
favorite 0
comment 0
In the geolocation field where high-level programs and low-level devices coexist, it is often difficult to find a friendly user inter- face to configure all the parameters. The challenge addressed in this paper is to propose intuitive and simple, thus natural lan- guage interfaces to interact with low-level devices. Such inter- faces contain natural language processing and fuzzy represen- tations of words that facilitate the elicitation of business-level objectives in our context.
Source: http://arxiv.org/abs/1304.5880v1
2
2.0
Jun 30, 2018
06/18
by
Daniel Mills; Anna Pappa; Theodoros Kapourniotis; Elham Kashefi
texts
eye 2
favorite 0
comment 0
We propose a new composable and information-theoretically secure protocol to verify that a server has the power to sample from a sub-universal quantum machine implementing only commuting gates. By allowing the client to manipulate single qubits, we exploit properties of Measurement based Blind Quantum Computing to prove security against a malicious Server and therefore certify quantum supremacy without the need for a universal quantum computer.
Topic: Quantum Physics
Source: http://arxiv.org/abs/1704.01998
61
61
Sep 21, 2013
09/13
by
Anna Pappa; André Chailloux; Eleni Diamanti; Iordanis Kerenidis
texts
eye 61
favorite 0
comment 0
In this article we show for the first time that quantum coin flipping with security guarantees that are strictly better than any classical protocol is possible to implement with current technology. Our protocol takes into account all aspects of an experimental implementation like losses, multi-photon pulses emitted by practical photon sources, channel noise, detector dark counts and finite quantum efficiency. We calculate the abort probability when both players are honest, as well as the...
Source: http://arxiv.org/abs/1106.1099v2
77
77
Sep 24, 2013
09/13
by
Anna Pappa; André Chailloux; Stephanie Wehner; Eleni Diamanti; Iordanis Kerenidis
texts
eye 77
favorite 0
comment 0
Future quantum information networks will likely consist of quantum and classical agents, who have the ability to communicate in a variety of ways with trusted and untrusted parties and securely delegate computational tasks to untrusted large-scale quantum computing servers. Multipartite quantum entanglement is a fundamental resource for such a network and hence it is imperative to study the possibility of verifying a multipartite entanglement source in a way that is efficient and provides...
Source: http://arxiv.org/abs/1112.5064v4
2
2.0
Jun 30, 2018
06/18
by
Thomas Lawson; Anna Pappa; Boris Bourdoncle; Iordanis Kerenidis; Damian Markham; Eleni Diamanti
texts
eye 2
favorite 0
comment 0
Simply and reliably detecting and quantifying entanglement outside laboratory conditions will be essential for future quantum information technologies. Here we address this issue by proposing a method for generating expressions which can perform this task between two parties who do not share a common reference frame. These reference frame independent expressions only require simple local measurements, which allows us to experimentally test them using an off-the-shelf entangled photon source. We...
Topic: Quantum Physics
Source: http://arxiv.org/abs/1407.8408
5
5.0
Jun 30, 2018
06/18
by
Anna Pappa; Niraj Kumar; Thomas Lawson; Miklos Santha; Shengyu Zhang; Eleni Diamanti; Iordanis Kerenidis
texts
eye 5
favorite 0
comment 0
Nonlocality enables two parties to win specific games with probabilities strictly higher than allowed by any classical theory. Nevertheless, all known such examples consider games where the two parties have a common interest, since they jointly win or lose the game. The main question we ask here is whether the nonlocal feature of quantum mechanics can offer an advantage in a scenario where the two parties have conflicting interests. We answer this in the affirmative by presenting a simple...
Topic: Quantum Physics
Source: http://arxiv.org/abs/1408.3281
6
6.0
Jun 30, 2018
06/18
by
Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov
texts
eye 6
favorite 0
comment 0
The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acin-Ribordy-Gisin 2004...
Topics: Quantum Physics, Cryptography and Security, Computing Research Repository
Source: http://arxiv.org/abs/1412.8032