Ramona Wolf
Loading...
17 results
Filters
Reset filtersSearch Results
Publications 1 - 10 of 17
- Defining Security in Quantum Key DistributionItem type: Working Paper
arXivFerradini, Carla; Sandfuchs, Martin; Wolf, Ramona; et al. (2025)The security of quantum key distribution (QKD) is quantified by a parameter $\varepsilon>0$, which -- under well-defined physical assumptions -- can be bounded explicitly. This contrasts with computationally secure schemes, where security claims are only asymptotic (i.e., under standard complexity assumptions, one only knows that $\varepsilon \to 0$ as the key size grows, but has no explicit bound). Here we explain the definition and interpretation of $\varepsilon$-security. Adopting an axiomatic approach, we show that $\varepsilon$ can be understood as the maximum probability of a security failure. Finally, we review and address several criticisms of this definition that have appeared in the literature. - Computing associators of endomorphism fusion categoriesItem type: Journal Article
SciPost PhysicsBarter, Daniel; Bridgeman, Jacob C.; Wolf, Ramona (2022)Many applications of fusion categories, particularly in physics, require the associators or F-symbols to be known explicitly. Finding these matrices typically involves solving vast systems of coupled polynomial equations in large numbers of variables. In this work, we present an algorithm that allows associator data for some category with unknown associator to be computed from a Morita equivalent category with known data. Given a module category over the latter, we utilize the representation theory of a module tube category, built from the known data, to compute this unknown associator data. When the input category is unitary, we discuss how to ensure the obtained data is also unitary. We provide several worked examples to illustrate this algorithm. In addition, we include several Mathematica files showing how the algorithm can be used to compute the data for the Haagerup category H1, whose data was previously unknown. - Quantum Key DistributionItem type: Monograph
Lecture Notes in PhysicsWolf, Ramona (2021)This textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk. The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required. - Device-Independent Randomness AmplificationItem type: Working Paper
arXivKulikov, Anatoly; Storz, Simon; Schär, Josua D.; et al. (2024)Successful realization of Bell tests has settled an 80-year-long debate, proving the existence of correlations which cannot be explained by a local realistic model. Recent experimental progress allowed to rule out any possible loopholes in these tests, and opened up the possibility of applications in cryptography envisaged more than three decades ago. A prominent example of such an application is device-independent quantum key distribution, which has recently been demonstrated. One remaining gap in all existing experiments, however, is that access to perfect randomness is assumed. To tackle this problem, the concept of randomness amplification has been introduced, allowing to generate such randomness from a weak source -- a task impossible in classical physics. In this work, we demonstrate the amplification of imperfect randomness coming from a physical source. It is achieved by building on two recent developments: The first is a theoretical protocol implementing the concept of randomness amplification within an experimentally realistic setup, which however requires a combination of the degree of Bell inequality violation (S-value) and the amount of data not attained previously. The second is experimental progress enabling the execution of a loophole-free Bell test with superconducting circuits, which offers a platform to reach the necessary combination. Our experiment marks an important step in achieving the theoretical physical limits of privacy and randomness generation. - Robust Device-Independent Quantum Key DistributionItem type: Working Paper
arXivSchwonnek, René; Goh, Koon Tong; Primaatmaja, Ignatius W.; et al. (2020)Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of today's loophole-free Bell experiments. In this Letter, we close the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality. In using two randomly chosen key generating bases instead of one, we show that the noise tolerance of DIQKD can be significantly improved. In particular, the extended feasibility region now covers some of the most recent loophole-free CHSH experiments, hence indicating that the first realisation of DIQKD already lies within the range of these experiments. - The debate over QKD: A rebuttal to the NSA's objectionsItem type: Working Paper
arXivRenner, Renato; Wolf, Ramona (2023)A recent publication by the NSA assessing the usability of quantum cryptography has generated significant attention, concluding that this technology is not recommended for use. Here, we reply to this criticism and argue that some of the points raised are unjustified, whereas others are problematic now but can be expected to be resolved in the foreseeable future. - Computing associators of endomorphism fusion categoriesItem type: Working Paper
arXivBarter, Daniel; Bridgeman, Jacob C.; Wolf, Ramona (2021)Many applications of fusion categories, particularly in physics, require the associators or F-symbols to be known explicitly. Finding these matrices typically involves solving vast systems of coupled polynomial equations in large numbers of variables. In this work, we present an algorithm that allows associator data for some category with unknown associator to be computed from a Morita equivalent category with known data. Given a module category over the latter, we utilize the representation theory of a module tube category, built from the known data, to compute this unknown associator data. When the input category is unitary, we discuss how to ensure the obtained data is also unitary. We provide several worked examples to illustrate this algorithm. In addition, we include several Mathematica files showing how the algorithm can be used to compute the data for the Haagerup category H1, whose data was previously unknown. - Security of differential phase shift QKD from relativistic principlesItem type: Working Paper
arXivSandfuchs, Martin; Haberland, Marcus; Vilasini, Venkatesh; et al. (2023)The design of quantum protocols for secure key generation poses many challenges: On the one hand, they need to be practical concerning experimental realisations. On the other hand, their theoretical description must be simple enough to allow for a security proof against all possible attacks. Often, these two requirements are in conflict with each other, and the differential phase shift (DPS) QKD protocol is an excellent example of this: It is designed to be implementable with current optical telecommunication technology, which, for this protocol, comes at the cost that many standard security proof techniques do not apply to it. In this work, we give the first full security proof of DPS QKD against general attacks, including finite-size effects. The proof combines techniques from quantum information theory, quantum optics, and relativity. We first give a security proof of a QKD protocol whose security stems from relativistic constraints. We then show that DPS QKD can be formulated as an instance of the relativistic protocol. In addition, we show that coherent attacks on the DPS protocol are, in fact, stronger than collective attacks. - Entropy Bounds for Device-Independent Quantum Key Distribution with Local Bell TestItem type: Journal Article
Physical Review LettersTan, Ying Zhe Ernest; Wolf, Ramona (2024)One of the main challenges in device-independent quantum key distribution (DIQKD) is achieving the required Bell violation over long distances, as the channel losses result in low overall detection efficiencies. Recent works have explored the concept of certifying nonlocal correlations over extended distances through the use of a local Bell test. Here, an additional quantum device is placed in close proximity to one party, using short-distance correlations to verify nonlocal behavior at long distances. However, existing works have either not resolved the question of DIQKD security against active attackers in this setup, or used methods that do not yield tight bounds on the key rates. In this work, we introduce a general formulation of the key rate computation task in this setup that can be combined with recently developed methods for analyzing standard DIQKD. Using this method, we show that if the short-distance devices exhibit sufficiently high detection efficiencies, positive key rates can be achieved in the long-distance branch with lower detection efficiencies as compared to standard DIQKD setups. This highlights the potential for improved performance of DIQKD over extended distances in scenarios where short-distance correlations are leveraged to validate quantum correlations. - A critical lattice model for a Haagerup conformal field theoryItem type: Working Paper
arXivVanhove, Robijn; Lootens, Laurens; van Damme, Maarten; et al. (2021)We use the formalism of strange correlators to construct a critical classical lattice model in two dimensions with the \emph{Haagerup fusion category} H3 as input data. We present compelling numerical evidence in the form of finite entanglement scaling to support a Haagerup conformal field theory (CFT) with central charge c=2. Generalized twisted CFT spectra are numerically obtained through exact diagonalization of the transfer matrix and the conformal towers are separated in the spectra through their identification with the topological sectors. It is further argued that our model can be obtained through an orbifold procedure from a larger lattice model with input Z(H3), which is the simplest modular tensor category that does not admit an algebraic construction. This provides a counterexample for the conjecture that all rational CFT can be constructed from standard methods.
Publications 1 - 10 of 17