Search Results - "Lim, Charles Ci Wen"

Refine Results
  1. 1

    Finite-key security analysis of quantum key distribution with imperfect light sources by Mizutani, Akihiro, Curty, Marcos, Lim, Charles Ci Wen, Imoto, Nobuyuki, Tamaki, Kiyoshi

    Published in New journal of physics (09-09-2015)
    “…In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with…”
    Get full text
    Journal Article
  2. 2

    Device-Independent Quantum Key Distribution with Local Bell Test by Lim, Charles Ci Wen, Portmann, Christopher, Tomamichel, Marco, Renner, Renato, Gisin, Nicolas

    Published in Physical review. X (01-07-2013)
    “…Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a Bell’s inequality between two parties, Alice and Bob, who…”
    Get full text
    Journal Article
  3. 3

    Tight finite-key analysis for quantum cryptography by Tomamichel, Marco, Lim, Charles Ci Wen, Gisin, Nicolas, Renner, Renato

    Published in Nature communications (17-01-2012)
    “…Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is…”
    Get full text
    Journal Article
  4. 4

    Security Analysis of Quantum Key Distribution with Small Block Length and Its Application to Quantum Space Communications by Lim, Charles Ci-Wen, Xu, Feihu, Pan, Jian-Wei, Ekert, Artur

    Published in Physical review letters (12-03-2021)
    “…The security of real-world quantum key distribution (QKD) critically depends on the number of data points the system can collect in a finite time interval. To…”
    Get full text
    Journal Article
  5. 5

    Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography by Kon, Wen Yu, Lim, Charles Ci Wen

    Published in Entropy (Basel, Switzerland) (31-12-2020)
    “…Private information retrieval (PIR) is a database query protocol that provides user privacy in that the user can learn a particular entry of the database of…”
    Get full text
    Journal Article
  6. 6

    Characterising the correlations of prepare-and-measure quantum networks by Wang, Yukun, Primaatmaja, Ignatius William, Lavie, Emilien, Varvitsiotis, Antonios, Lim, Charles Ci Wen

    Published in npj quantum information (08-02-2019)
    “…Prepare-and-measure (P&M) quantum networks are the basic building blocks of quantum communication and cryptography. These networks crucially rely on…”
    Get full text
    Journal Article
  7. 7

    Bright-light detector control emulates the local bounds of Bell-type inequalities by Sajeed, Shihan, Sultana, Nigar, Lim, Charles Ci Wen, Makarov, Vadim

    Published in Scientific reports (06-08-2020)
    “…It is well-known that no local model—in theory—can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than…”
    Get full text
    Journal Article
  8. 8

    Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution by Lim, Charles Ci Wen, Walenta, Nino, Legre, Matthieu, Gisin, Nicolas, Zbinden, Hugo

    “…In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks. In particular, by exploiting the internal…”
    Get full text
    Journal Article
  9. 9

    Detector-device-independent quantum key distribution by Lim, Charles Ci Wen, Korzh, Boris, Martin, Anthony, Bussières, Félix, Thew, Rob, Zbinden, Hugo

    Published in Applied physics letters (01-12-2014)
    “…Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass…”
    Get full text
    Journal Article
  10. 10
  11. 11

    Securing Practical Quantum Communication Systems with Optical Power Limiters by Zhang, Gong, Primaatmaja, Ignatius William, Haw, Jing Yan, Gong, Xiao, Wang, Chao, Lim, Charles Ci Wen

    Published in PRX quantum (01-07-2021)
    “…Controlling the energy of unauthorized light signals in a quantum cryptosystem is an essential criterion for implementation security. Here, we propose a…”
    Get full text
    Journal Article
  12. 12

    Security of distributed-phase-reference quantum key distribution by Moroder, Tobias, Curty, Marcos, Lim, Charles Ci Wen, Thinh, Le Phuc, Zbinden, Hugo, Gisin, Nicolas

    Published in Physical review letters (26-12-2012)
    “…Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof…”
    Get full text
    Journal Article
  13. 13

    Discrete-variable quantum key distribution with homodyne detection by Primaatmaja, Ignatius William, Liang, Cassey Crystania, Zhang, Gong, Haw, Jing Yan, Wang, Chao, Lim, Charles Ci-Wen

    Published in Quantum (Vienna, Austria) (03-01-2022)
    “…Most quantum key distribution (QKD) protocols can be classified as either a discrete-variable (DV) protocol or continuous-variable (CV) protocol, based on how…”
    Get full text
    Journal Article
  14. 14

    Finite-key analysis for measurement-device-independent quantum key distribution by Curty, Marcos, Xu, Feihu, Cui, Wei, Lim, Charles Ci Wen, Tamaki, Kiyoshi, Lo, Hoi-Kwong

    Published in Nature communications (29-04-2014)
    “…Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security…”
    Get full text
    Journal Article
  15. 15

    Provably secure and practical quantum key distribution over 307km of optical fibre by Korzh, Boris, Lim, Charles Ci Wen, Houlmann, Raphael, Gisin, Nicolas, Li, Ming Jun, Nolan, Daniel, Sanguinetti, Bruno, Thew, Rob, Zbinden, Hugo

    Published in Nature photonics (01-03-2015)
    “…Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD…”
    Get full text
    Journal Article
  16. 16

    Self-testing quantum random number generator by Lunghi, Tommaso, Brask, Jonatan Bohr, Lim, Charles Ci Wen, Lavigne, Quentin, Bowles, Joseph, Martin, Anthony, Zbinden, Hugo, Brunner, Nicolas

    Published in Physical review letters (17-04-2015)
    “…The generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is…”
    Get full text
    Journal Article
  17. 17

    Provably secure and practical quantum key distribution over 307 km of optical fibre by Korzh, Boris, Lim, Charles Ci Wen, Houlmann, Raphael, Gisin, Nicolas, Li, Ming Jun, Nolan, Daniel, Sanguinetti, Bruno, Thew, Rob, Zbinden, Hugo

    Published in Nature photonics (01-03-2015)
    “…A discrete-variable quantum key distribution system that is capable of distributing a provably-secure cryptographic key over 307 kilometres is demonstrated at…”
    Get full text
    Journal Article
  18. 18

    Provably-secure symmetric private information retrieval with quantum cryptography by Kon, Wen Yu, Lim, Charles Ci Wen

    Published 18-01-2021
    “…Entropy 23, 54 (2021) Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular…”
    Get full text
    Journal Article
  19. 19

    Provably secure and high-rate quantum key distribution with time-bin qudits by Islam, Nurul T, Lim, Charles Ci Wen, Cahall, Clinton, Kim, Jungsang, Gauthier, Daniel J

    Published in Science advances (01-11-2017)
    “…The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features…”
    Get full text
    Journal Article
  20. 20

    Provably-secure quantum randomness expansion with uncharacterised homodyne detection by Wang, Chao, Primaatmaja, Ignatius William, Ng, Hong Jie, Haw, Jing Yan, Ho, Raymond, Zhang, Jianran, Zhang, Gong, Lim, Charles Ci-Wen

    Published 09-06-2022
    “…Quantum random number generators (QRNGs) are able to generate numbers that are certifiably random, even to an agent who holds some side-information. Such…”
    Get full text
    Journal Article