#### Filter Results:

- Full text PDF available (91)

#### Publication Year

1992

2018

- This year (3)
- Last 5 years (19)
- Last 10 years (40)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

We investigate the concept of quantum secret sharing. In a ((k, n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct theâ€¦ (More)

There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, inâ€¦ (More)

- Hoi-Kwong Lo, Hoi Fung Chau
- ArXiv
- 1996

Work on quantum cryptography was started by S. J. Wiesner in a paper written in about 1970, but remained unpublished until 1983 [1]. Recently, there have been lots of renewed activities in theâ€¦ (More)

- Hoi-Kwong Lo
- ArXiv
- 1996

It had been widely claimed that quantum mechanics can protect private information during public decision in for example the so-called two-party secure computation. If this were the case, quantumâ€¦ (More)

- Hoi-Kwong Lo, Xiongfeng Ma, Kai Chen
- Physical review letters
- 2005

There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue inâ€¦ (More)

- Hoi-Kwong Lo, Marcos Curty, Bing Qi
- Physical review letters
- 2012

How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum keyâ€¦ (More)

- Xiongfeng Ma, Bing Qi, Yi Zhao, Hoi-Kwong Lo
- 2005

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution. Here, we present a general theory of the decoy state protocolâ€¦ (More)

- Daniel Gottesman, Hoi-Kwong Lo, Norbert LÃ¼tkenhaus, John Preskill
- International Symposium onInformation Theoryâ€¦
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proofâ€¦ (More)

- Daniel Gottesman, Hoi-Kwong Lo
- IEEE Trans. Information Theory
- 2003

Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution andâ€¦ (More)

entanglement, quantum theory, quantum information, quantum computation, foundations of quantum mechanics Previous investigations of entanglement manipulations have focused on the average propertiesâ€¦ (More)