Search Results - "Kon, Wen Yu"
-
1
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
Published in Entropy (Basel, Switzerland) (31-12-2020)“…Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of…”
Get full text
Journal Article -
2
Experimental symmetric private information retrieval with measurement-device-independent quantum network
Published in Light, science & applications (13-09-2022)“…Secure information retrieval is an essential task in today’s highly digitised society. In some applications, it may be necessary that user query’s privacy and…”
Get full text
Journal Article -
3
Sampled sub-block hashing for large input randomness extraction
Published 05-08-2023“…Randomness extraction is an essential post-processing step in practical quantum cryptography systems. When statistical fluctuations are taken into…”
Get full text
Journal Article -
4
Provably-secure symmetric private information retrieval with quantum cryptography
Published 18-01-2021“…Entropy 23, 54 (2021) Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular…”
Get full text
Journal Article -
5
Estimating the photon-number distribution of photonic channels with realistic devices and applications in photonic quantum information processing
Published 11-09-2021“…Phys. Rev. Applied 16, 034020 (2021) Characterising the input-output photon-number distribution of an unknown optical quantum channel is an important task for…”
Get full text
Journal Article -
6
Discrete-modulated continuous-variable quantum key distribution secure against general attacks
Published 04-09-2024“…In recent years, discrete-modulated continuous-variable quantum key distribution (DM-CV-QKD) has gained traction due to its practical advantages:…”
Get full text
Journal Article -
7
On the Relativistic Zero Knowledge Quantum Proofs of Knowledge
Published 05-09-2024“…We initiate the study of relativistic zero-knowledge quantum proof of knowledge systems with classical communication, formally defining a number of useful…”
Get full text
Journal Article -
8
Quantum Authenticated Key Expansion with Key Recycling
Published 24-09-2024“…Data privacy and authentication are two main security requirements for remote access and cloud services. While QKD has been explored to address data privacy…”
Get full text
Journal Article -
9
Experimental symmetric private information retrieval with measurement-device-independent quantum network
Published in 2023 Conference on Lasers and Electro-Optics (CLEO) (01-05-2023)“…We report the first realisation of a provably-secure symmetric private information retrieval (SPIR) scheme supported by a quantum-secure key-exchange network,…”
Get full text
Conference Proceeding -
10
Experimental symmetric private information retrieval with measurement-device-independent quantum network
Published 27-09-2021“…Secure information retrieval is an essential task in today's highly digitised society. In some applications, it may be necessary that user query's privacy and…”
Get full text
Journal Article