Search Results - "Kon, Wen Yu"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography by Kon, Wen Yu, Lim, Charles Ci Wen

    Published in Entropy (Basel, Switzerland) (31-12-2020)
    “…Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of…”
    Get full text
    Journal Article
  2. 2

    Experimental symmetric private information retrieval with measurement-device-independent quantum network by Wang, Chao, Kon, Wen Yu, Ng, Hong Jie, Lim, Charles C.-W.

    Published in Light, science & applications (13-09-2022)
    “…Secure information retrieval is an essential task in today’s highly digitised society. In some applications, it may be necessary that user query’s privacy and…”
    Get full text
    Journal Article
  3. 3

    Sampled sub-block hashing for large input randomness extraction by Ng, Hong Jie, Kon, Wen Yu, Primaatmaja, Ignatius William, Wang, Chao, Lim, Charles

    Published 05-08-2023
    “…Randomness extraction is an essential post-processing step in practical quantum cryptography systems. When statistical fluctuations are taken into…”
    Get full text
    Journal Article
  4. 4

    Provably-secure symmetric private information retrieval with quantum cryptography by Kon, Wen Yu, Lim, Charles Ci Wen

    Published 18-01-2021
    “…Entropy 23, 54 (2021) Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular…”
    Get full text
    Journal Article
  5. 5

    Estimating the photon-number distribution of photonic channels with realistic devices and applications in photonic quantum information processing by Lavie, Emilien, Primaatmaja, Ignatius William, Kon, Wen Yu, Wang, Chao, Lim, Charles Ci Wen

    Published 11-09-2021
    “…Phys. Rev. Applied 16, 034020 (2021) Characterising the input-output photon-number distribution of an unknown optical quantum channel is an important task for…”
    Get full text
    Journal Article
  6. 6

    Discrete-modulated continuous-variable quantum key distribution secure against general attacks by Primaatmaja, Ignatius William, Kon, Wen Yu, Lim, Charles

    Published 04-09-2024
    “…In recent years, discrete-modulated continuous-variable quantum key distribution (DM-CV-QKD) has gained traction due to its practical advantages:…”
    Get full text
    Journal Article
  7. 7

    On the Relativistic Zero Knowledge Quantum Proofs of Knowledge by Shi, Kaiyan, Chakraborty, Kaushik, Kon, Wen Yu, Amer, Omar, Pistoia, Marco, Lim, Charles

    Published 05-09-2024
    “…We initiate the study of relativistic zero-knowledge quantum proof of knowledge systems with classical communication, formally defining a number of useful…”
    Get full text
    Journal Article
  8. 8

    Quantum Authenticated Key Expansion with Key Recycling by Kon, Wen Yu, Chu, Jefferson, Loh, Kevin Han Yong, Alia, Obada, Amer, Omar, Pistoia, Marco, Chakraborty, Kaushik, Lim, Charles

    Published 24-09-2024
    “…Data privacy and authentication are two main security requirements for remote access and cloud services. While QKD has been explored to address data privacy…”
    Get full text
    Journal Article
  9. 9

    Experimental symmetric private information retrieval with measurement-device-independent quantum network by Wang, Chao, Kon, Wen Yu, Jie Ng, Hong, Lim, Charles C.-W.

    “…We report the first realisation of a provably-secure symmetric private information retrieval (SPIR) scheme supported by a quantum-secure key-exchange network,…”
    Get full text
    Conference Proceeding
  10. 10

    Experimental symmetric private information retrieval with measurement-device-independent quantum network by Wang, Chao, Kon, Wen Yu, Ng, Hong Jie, Lim, Charles C. -W

    Published 27-09-2021
    “…Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and…”
    Get full text
    Journal Article