Quantum  Information

Prof. Hoi-Kwong Lo

University of Toronto
Quantoss

Selected Publication

Invited Review Papers

 

Survey Articles

 

S1) From Quantum Cheating to Quantum Security,  D. Gottesman and H.-K. Lo, Physics Today, Nov. 2000, p. 22. http://www.aip.org/pt/vol-53/iss-11/p22.html       (Listed as a notable article in “The Best American Science and Nature Writing, 2001" edited by Ed. O. Wilson.)

 

S2) Cryptography's Quantum Barrier, H.-K. Lo, Physics World, June 2001, p. 17.

 

 

 

Refereed Journal Articles

  (All citation counts listed below are from Google Scholar accessed on Apr. 3, 2011 .)

 

  1. Insecurity of position-based quantum cryptography protocols against entanglement attacks, H. K. Lau and H.-K. Lo, Phys. Rev. A 83, 012322 (2011).
  2. Balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution,Yue-Meng Chi, Bing Qi, Wen Zhu, Li Qian, Hoi-Kwong Lo, Sun-Hyun Youn, A. I. Lvovsky, Liang Tian, New J. Phys. 13 (2011) 013003.
  3. Optimal entanglement transformations among N-qubit W-class states, W. Cui, E. Chitambar, and H.-K. Lo, Phys. Rev. A 82, 062314 (2010)
  4. Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals, M. Curty, X. Ma, H.-K. Lo, and N. Lütkenhaus, Phys. Rev. A 82, 052325 (2010).
  5. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, Feihu Xu, Bing Qi, Hoi-Kwong Lo, New J. Phys. 12 (2010) 113026. [cited by 3] [This work has been report by many medias, including The Economist (http://www.economist.com/node/16681905/print), Nature News (http://www.nature.com/news/2010/100520/full/news.2010.256.html), et al.]
  6. Feasibility of Quantum Key Distribution through a dense wavelength division multiplexing network, B. Qing, W. Zhu , L. Qian and H.-K. Lo, New J. Phys. 12 (2010) 103042.
  7. Implementation of two-party protocols in the noisy-storage model, S. Wehner , M. Curty, C. Schaffner, and H.-K. Lo, Phys. Rev. A81, 052336 (2010). http://arxiv.org/abs/0911.2302. [cited by 1]
  8. Passive Estimate of an Untrusted Source for Quantum Key Distribution, Y. Zhao, B. Qi, H.-K. Lo, L. Qian, New J. Phys. 12, 023024 (2010). http://arxiv.org/abs/0905.4225 . [cited by 1]
  9. High-speed quantum random number generation by measuring phase noise of a single mode laser, B. Qi, Y.-M. Chi, H.-K. Lo, L. Qian, Optics Letters 35, 312-314 (2010). http://arxiv.org/abs/0908.3351. [cited by 11]
  10. Bounds on probability of transformations between multipartite pure states, W. Cui, W. Helwig, and H.-K. Lo, Phys. Rev. A 81, 012111 (2010). http://arxiv.org/abs/0910.3295 [cited by 5]
  11. Upper bounds for the secure key rate of decoy-state quantum key distribution, M. Curty, T. Moroder, X. Ma, H.-K. Lo and N. Lutkenhaus, Phys. Rev. A 79, 032335 (2009) http://arxiv.org/abs/0901.4669. [cited by 1]
  12. Security proof of quantum key distribution with detection efficiency mismatch, C.-H.F. Fung, K. Tamaki, B. Qi, H.-K. Lo and X. Ma, Quantum Information and Computation 9,131(2009). [cited by 22]
    http://arxiv.org/abs/0802.3788
  13. Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems. Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen and H.-K. Lo, Phys. Rev. A 78, 042333 (2008) http://arxiv.org/abs/0704.3253 [cited by 35]
    [This is the first experimental demonstration of a feasible attack against a commercial quantum cryptographic system. This surprising result has been highlighted in Nature and has attracted a lot of scientific attention.http://www.nature.com/nature/journal/v447/n7143/full/447372a.html ]
  14. Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment, H. Buhrman, M. Christandl, P. Hayden, H.-K. Lo and S. Wehner, Physical Review A 78, 022316 (2008). [cited by 11] [Selected for publication in the Virtual Journal of Quantum Information, published by the American Physical Society.]
  15. Random-party entanglement distillation in multiparty states, B. Fortescue and H.-K. Lo, Phys. Rev. A 78, 012348 (2008). [cited by 4]
    http://arxiv.org/abs/0709.4059
  16. Quantum key distribution with triggering parametric down conversion sources, X. Ma and H.-K. Lo, New J. Phys. 10, 073018 (2008) [cited by 17]
    http://arxiv.org/abs/0803.2543
  17. Quantum key distribution with an unknown and untrusted source, Y. Zhao, B. Qi and H.-K. Lo, Phys. Rev. A 77, 052327 (2008) [cited by 24]
    http://arxiv.org/abs/0802.2725
  18. Quantum Cryptography: from theory to practice (Invited Paper), H.-K. Lo and N. Lutkenhaus, Physics in Canada, Vol. 63, no. 4, pp 191-197 (2007). [cited by 14]
    http://arxiv.org/abs/quant-ph/0702202
  19. Experimental study on Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers, B. Qi, L.-L. Huang, L. Qian and H.-K. Lo, Phys. Rev. A 76, 052323 (2007). [cited by 19], http://arxiv.org/abs/0709.3666 [This paper has been selected for publication in the Dec. 10, 2007 issue of Virtual Journal of Nanoscale Science & Technology and the December 2007 issue of Virtual Journal of Quantum Information.]
  20. Quantum key distribution with entangled photon sources, X. Ma, C.-H. F. Fung, and H.-K. Lo, Phys. Rev. A76, 012307 (2007). [cited by 45]
    http://arxiv.org/abs/quant-ph/0703122
  21. Multi-partite quantum cryptographic protocols with noisy GHZ states, K. Chen and H.-K. Lo, Quantum Information and Computation 7, 689 (2007), [cited by 14]
    http://xxx.lanl.gov/abs/quant-ph/0404133
  22. Random bipartite entanglement from W and W-like states, B. Fortescue and H.-K. Lo, Phys. Rev. Lett. 98, 260501 (2007). [cited by 22]
  23. Quantum key distribution with "dual detectors" B. Qi, Y. Zhao, X. Ma, H.-K. Lo and L. Qian, Phy. Rev. A 75, 052304 (2007). [cited by 11]
    http://arxiv.org/abs/quant-ph/0611044
  24. Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states, M. Curty, L. L.X. Zhang, H.-K. Lo and N. Lutkenhaus, Quantum Information and Computation 7, 665 (2007). [cited by 18], http://arxiv.org/abs/quant-ph/0609094
  25. Phase-remapping attack in practical quantum key distribution systems, C.-H. F. Fung, B. Qi, K. Tamaki, and H.-K. Lo, Phys. Rev. A 75, 032314 (2007) [cited by 6], http://arxiv.org/abs/quant-ph/0601115
  26. Security of quantum key distribution using weak coherent states with Nonrandom phases, H.-K. Lo and J. Preskill, Quantum Information and Computation 7, 431 (2007). [cited by 19]
    http://arxiv.org/abs/quant-ph/0610203
  27. Discrete Rotational Symmetry and Quantum Key Distribution Protocols, D. Shirokoff, C.-H. F. Fung, and H.-K. Lo, Phys. Rev. A75, 032341 (2007). [cited by 4]
    http://arxiv.org/abs/quant-ph/0604198
  28. Experimental quantum key distribution with active phase randomization, Y. Zhao, B. Qi, and H.-K. Lo, Appl. Phys. Lett. 90, 044106 (2007), [cited by 1]
    http://arxiv.org/abs/quant-ph/0611059
  29. Security of quantum bit string commitment depends on the information measure, H. Buhrman, M. Christandl, P. Hayden, H.-K. Lo, S. Wehner, Phys. Rev. Lett. 97, 250501 (2006). [cited by 21]
     http://arxiv.org/abs/quant-ph/0504078
  30. Security proof of a three-state quantum key distribution protocol without rotational symmetry, C.-H. F. Fung, and H.-K. Lo, Phys. Rev. A74, 042342 (2006), [cited by 5]
    http://arxiv.org/abs/quant-ph/0607056
  31. Time-shift attack in practical quantum cryptosystems, B. Qi, C.-H. F. Fung, H.-K. Lo and X. Ma, Quantum Information and Computation 7, 73 (2007). [cited by 39]
    http://arxiv.org/abs/quant-ph/0512080
  32. Decoy-state quantum key distribution with two-way classical postprocessing, X. Ma, C-H. F. Fung, F. Dupuis, K. Chen, K. Tamaki, and H.-K. Lo, Phys. Rev. A74, 032330 (2006). [cited by 29]
  33. Experimental Quantum Key Distribution with Decoy States, Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, Phys. Rev. Lett. 96, 070502 (2006). [cited by 111]
    http://arxiv.org/abs/quant-ph/0503192
    [This work has attracted a lot of media attention including Toronto’s largest city newspaper "Toronto Star" and "Technological Reviews" ]
  34. Performance of two quantum key distribution protocols, C.-H. F. Fung, K. Tamaki and H.-K. Lo, Phys. Rev. A73, 012337 (2006). [cited by 26]
    http://arxiv.org/abs/quant-ph/0510025
  35. Quantum key distribution based on arbitrarily-weak distillable entangled states, K. Horodecki, D. Leung, H.-K. Lo, and J. Oppenheim, Phys. Rev. Lett. 96, 070501 (2006). [cited by 13]
    http://arxiv.org/abs/quant-ph/0510067
  36. Unconditionally secure key distillation from multiphotons, K. Tamaki, and H.-K. Lo, Phys. Rev. A73, 010302(R) 2006, [cited by 15]
    http://arxiv.org/abs/quant-ph/0412035
  37. Two-way quantum communication channels, A. Childs, D. W. Leung, and H.-K. Lo, International Journal of Quantum Information 4, No. 1, (Asher Peres Memorial Issue) pp. 63-83 (2006) [cited by 5]
    http://arxiv.org/abs/quant-ph/0506039
  38. Frequency-shifted Mach-Zehnder Interferometer for Locating Multiple Weak Reflections along a Fiber Link, B. Qi, L. Qian, A Tausz, and H.-K. Lo, IEEE Photonics Technology Letters 18, 295 (2005). [cited by 3]
  39. High-resolution, large dynamic range fiber length measurement based on a frequency-shifted asymmetrical Sagnac interferometer, B. Qi, A. Tausz, L. Qian, and H.-K. Lo, Optics Letters 30, No. 24, 3287 (2005). [citedby 8]
  40. Practical decoy state for quantum key distribution, X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Phys. Rev. A72, 012326 (2005). [cited by 152] http://arxiv.org/abs/quant-ph/0503005
  41. Decoy State Quantum Key Distribution, H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005). [cited by 286], http://arxiv.org/abs/quant-ph/0411004
    [This work has been highlighted in international popular and scientific press including "Globe and Mail" and "ew Scientist".]
  42. Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite states, B. Fortescue and H.-K. Lo, Phys. Rev. A 72, 032336 (2005). [cited by 5]
    http://xxx.lanl.gov/abs/quant-ph/0411200
  43. Getting something out of nothing, H-K. Lo, Quantum Information and Computation Vol 5, No. 4&5 (2005) 413-418. [cited by 24]
    http://arxiv.org/abs/quant-ph/0503004
  44. Efficient Quantum Key Distribution Scheme and Proof of its Security, H.-K. Lo, H. F. Chau, M. Ardehali, J. of Cryptology, 18, Number 2, (2005) 133-165. [cited by 142]
    http://arxiv.org/abs/quant-ph/0011056.
  45. Some attacks on quantum-based cryptographic protocols, H.-K. Lo and T.-M. Ko, Quantum Information and Computation. Vol. 5, No.1 (2005) 40-47. [cited by 15]
     http://xxx.lanl.gov/abs/quant-ph/0309127
  46. Security of quantum key distribution with imperfect Devices, D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, Quantum Information and Computation. Vol. 4, No.5 (2004) 325-360. [cited by 243]
     http://xxx.lanl.gov/abs/quant-ph/0212066
  47. A Tight Lower Bound on the Classical Communication Cost of Entanglement Dilution, A. Harrow and H.-K. Lo, IEEE Transactions on Information Theory, Vol. 50, Issue 2, pp. 319-327 (2004), [cited by 19]
     http://xxx.lanl.gov/abs/quant-ph/0204096
  48. Method for decoupling error correction from privacy amplification, H.-K. Lo, New Journal of Physics 5, 36 (2003). (Invited paper), [cited by 19]
     http://xxx.lanl.gov/abs/quant-ph/0201030
  49. Proof of Security of quantum key distribution with two-way classical communications, D. Gottesman and H.-K. Lo, IEEE Transactions on Information Theory, Vol. 49, No. 2, p. 457 (2003). [cited by 198]
     http://xxx.lanl.gov/abs/quant-ph/0105121
  50. Proof of Unconditional Security of Six-State Quantum Key Distribution Scheme, H.-K. Lo, Quantum Information and Computation, Vol. 1, Number 2, 81 (2001). [cited by 67]
    http://xxx.lanl.gov/abs/quant-ph/0102138
  51. A Simple Proof of the Unconditional Security of Quantum Key Distribution, H.-K. Lo, J. of Phys. A, Vol. 34, 6957 (2001). [cited by 23]
    http://xxx.lanl.gov/abs/quant-ph/9904091
  52. Concentrating Entanglement by Local Actions: Beyond Mean Properties, H.-K. Lo and S. Popescu, Phys. Rev. A, Vol. 63, 022301 (2001). [cited by 139]
       http://xxx.lanl.gov/abs/quant-ph/9707038
  53. A Quantum Analog of Huffman Coding, S. L. Braunstein, C. A. Fuchs, D.Gottesman, and H.-K. Lo, IEEE Transactions on Information Theory, Vol. 46, 1644 (2000). [cited by 29]
     http://xxx.lanl.gov/abs/quant-ph/9805080
  54. Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity, H.-K. Lo, Phys. Rev. A, Vol. 62, 012313 (2000). [cited by 200]
  55. Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances, H.-K. Lo and H. F. Chau, Science Vol. 283, 2050 (1999). [cited by 595]
       http://xxx.lanl.gov/abs/quant-ph/9803006 [ Highlighted by a Perspective article in Science by Peter Shor and Charles Bennett.]
  56. How to Share a Quantum Secret, R. Cleve, D. Gottesman and H.-K. Lo, Physical Review Letters Vol. 83, 648 (1999).
       http://xxx.lanl.gov/abs/quant-ph/9901025, [Cited by 443.]
  57. Classical Communication Cost of Entanglement Manipulation: Is Entanglement an Interconvertible Resource?, H.-K. Lo and S. Popescu, Physical Review Letters, Vol. 83, 1459 (1999). [cited by 65]
     http://xxx.lanl.gov/abs/quant-ph/9902045
  58. Making An Empty Promise With A Quantum Computer, (Invited Paper), H. F. Chau and H.-K. Lo, Fort. de. Phys., Vol. 46, No. 4-5, 325 (1998). [citd by 10]
     http://xxx.lanl.gov/abs/quant-ph/9709053
    [Also, re-published in the book ``Quantum Computing’’, eds. S. Braunstein. http://www.sees.bangor.ac.uk/~schmuel/book/book1.html ]
  59. Why Quantum Bit Commitment and Ideal Quantum Coin Tossing Are Impossible, H.-K. Lo and H. F. Chau, Physica D, Vol. 120, 177 (1998). [cited by 146]        
     http://xxx.lanl.gov/abs/quant-ph/9711065
  60. Insecurity of Quantum Secure Computations, H.-K. Lo, Phys. Rev. A, Vol.56, 1154 (1997). [cited by 105]
     http://xxx.lanl.gov/abs/quant-ph/9611031
  61. Is Quantum Bit Commitment Really Possible?, H.-K. Lo and H. F. Chau, Phys. Rev. Lett., Vol. 78, 3410 (1997). [cited by 304]
      http://xxx.lanl.gov/abs/quant-ph/9603004 [This fundamental result has been highlighted in Science and Science News.]
  62. One Way Functions in Reversible Computations, H. F. Chau and H.-K. Lo, Cryptologia, Vol. 21, No. 2, 139 (1997). [cited by 6]
    http://xxx.lanl.gov/abs/quant-ph/9506012
  63. Primality Test via Quantum Factorization, H. F. Chau and H.-K. Lo, International Journal of Modern Physics C, Vol. 8, No. 2, 131 (1997).
    http://xxx.lanl.gov/abs/quant-ph/9508005
  64. Quantum coding Theorem for mixed states, H.-K. Lo, Optics Communications, Vol. 119, 552 (1995).
     http://xxx.lanl.gov/abs/quant-ph/9504004
  65. Aharonov-Bohm Order Parameters for Non-Abelian Gauge Theories, H.-K. Lo, Phys. Rev. D, Vol. 52, 7247 (1995). [cited by 7]
     http://xxx.lanl.gov/abs/hep-th/9502080
  66. Is Baryon Number Violated when Electroweak Strings Intercommute? H.-K. Lo, Phys. Rev. D, Vol. 51, 7152 (1995). [cited by 6]
     http://xxx.lanl.gov/abs/hep-ph/9409319
  67. Scattering from Electroweak Strings, H.-K. Lo, Phys. Rev. D, Vol. 51, 802 (1995). [cited by 3]
     http://xxx.lanl.gov/abs/hep-ph/9404273
  68. Exact Wave Functions for non-Abelian Chern-Simons Particles, H.-K. Lo, Phys. Rev. D, Vol. 48, 4999 (1993). [cited by 1]
     http://xxx.lanl.gov/abs/hep-th/9306076
  69. Complementarity in Wormhole Chromodynamics, H.-K. Lo, K.-M. Lee and J. Preskill, Phys. Lett. B, Vol. 318, 287 (1993). [cited by 4]
     http://xxx.lanl.gov/abs/hep-th/9308044
  70. Non-Abelian Vortices and non-Abelian Statistics, H.-K. Lo and J. Preskill, Phys. Rev. D, Vol. 48, 4821 (1993). [cited by 43]
     http://xxx.lanl.gov/abs/hep-th/9306006
  71. Topological Approach to Alice Electrodynamics, M. Bucher, H.-K. Lo and J. Preskill, Nucl. Phys. B, Vol. 386, 3 (1992). [cited by 37]
     http://xxx.lanl.gov/abs/hep-th/9112039
      

Preprints

 

P1) arXiv:1011.2982 [pdf, ps, other] Title: Universal Squash Model For Optical Communications Using Linear Optics And Threshold Detectors, Authors: Chi-Hang Fred Fung, H. F. Chau, Hoi-Kwong Lo

Comments: 14 pages, Subjects: Quantum Physics (quant-ph)

P2) arXiv:1005.0272 [pdf, other], Title: Security of high speed quantum key distribution with finite detector dead time, Authors: Viacheslav Burenkov, Bing Qi, Ben Fortescue, Hoi-Kwong Lo, Comments: 18 pages, 7 figures

P3). A brief introduction of quantum cryptography for engineers, B. Qi, L. Qian and H.-K. Lo, http://arxiv.org/abs/1002.1237

 

Publications by group members
[Group members are encouraged to publish their results on their own.]

G1) Unconditional security at a low cost, by Xiongfeng Ma, Phys. Rev. A. 052325 (2006).

G2) Bing Qi, Li Qian, "Optimal filters for photon cloning with an optical amplifier", Optics Letters 32, 418-420 (2007).

G3) Bing Qi, "Single photon continuous variable quantum key distribution based on energy-time uncertainty relation,"Optics letters 31, 2795-2797 (2006) (This paper has been selected for publication in the September 11, 2006 issue of Virtual Journal of Nanoscale Science & Technology and the September 2006 issue of Virtual Journal of Quantum Information)

G4) Marcos Curty, Xiongfeng Ma, Bing Qi, Tobias Moroder, "Passive decoy state, quantum key distribution with practical light sources" Physical Review A 81, 022310 (2010)

G5) Fei Ye, Li Qian, and Bing Qi, "Multipoint Chemical Gas Sensing Using Frequency-Shifted Interferometry", Journal of Lightwave Technology 27, 5356-5364 (2009)

 

Books

Book chapter: Quantum cryptology, Chapter 4 of Introduction to quantum computation and information, eds. H.-K. Lo,  S. Popescu, and T. Spiller

(World Scientific, Singapore, Hardcover 1998, Paperback 2000).

http://www.worldscientific.com/books/physics/3724.html

Books edited

1) Introduction to quantum computation and information, eds. H.-K. Lo, S. Popescu, and T. Spiller (World Scientific, Singapore,Hardcover 1998 Paperback 2000).
http://www.worldscientific.com/books/physics/3724.html
[Cited by 182. Reviewed in Nature 339, p. 119 (1999).]

2) As an editor: Scalable quantum computers: paving the way to realization, eds. S. L. Braunstein and H.-K. Lo (Wiley-VCH, Berlin, 2000).
http://www.sees.bangor.ac.uk/~schmuel/book/book2.html

 

Non-refereed publications

Book Review on "How Cryptology Went Commercial" H.-K. Lo, Physic World, June 2001, p. 53.  (A review of Steven Levy's book, Crypto.)

Abstract of this review is available at: http://physicsweb.org/article/review/14/6/2

 

Selected Recent Refereed Conference Proceedings/Abstracts

 

1) Improve the efficiency of a practical quantum key distribution system, B. Qi, Y. Zhao, X. Ma, H.-K. Lo, L Qian, Proceedings of SPIE 6710 (Quantum Communications and Quantum Imaging V): 671015 (2007).

2) Quantum hacking: attacking practical quantum key distribution Systems, B. Qi, C.-H. F. Fung, Y. Zhao, X. Ma, K. Tamaki, C. Chen, H.-K. Lo, Proceedings of SPIE 6710 (Quantum Communications and Quantum Imaging V): 671001 (2007).

3) Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber, Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian
Proceedings of IEEE International Symposium on Information Theory 2006, pp. 2094-2098, http://arxiv.org/abs/quant-ph/0601168

4) Quantum key distribution based on a Sagnac loop interferometer and Polarization-insensitive phase modulators, B. Qi, L.-L. Huang, H.-K. Lo and L. Qian
Proceedings of IEEE International Symposium on Information Theory 2006, pp. 2090-2093, http://arxiv.org/abs/quant-ph/0604187

5) Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite quantum states, Fortescue, B.; Hoi-Kwong Lo,
Proceedings of IEEE ISIT (International Symposium on Information Theory) 2005, 4-9 Sept. 2005 Page(s):889 - 892

6) Conference key agreement and quantum sharing of classical secrets with noisy GHZ states, Kai Chen; Hoi-Kwong Lo, Proceedings of IEEE ISIT (International Symposium on Information Theory) 2005, 4-9 Sept. 2005 Page(s):1607 - 1611

7) Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution, Tamaki, K.; Hoi-Kwong Lo,
Proceedings of IEEE ISIT (International Symposium on Information Theory) 2005, 4-9 Sept. 2005 Page(s):1603 - 1606

8) Decoy state quantum key distribution, H.-K. Lo, International Journal of Quantum Information Vol. 3, No. supp01, p. 143 (2005).

9) Quantum key distribution with vacua and dim pulses as decoy states, H.-K. Lo, Proceedings of IEEE ISIT (International Symposium on Information
Theory) 2004, Page(s):137

10) Security of quantum key distribution with imperfect devices, Proceedings of IEEE ISIT, 2004, D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill

11)  A tight lower bound on the classical communication cost of entanglement dilution, A. W. Harrow and H. K. Lo, Proceedings of IEEE ISIT 2003

12)  Error correction and security in quantum cryptography, H.-K. Lo, Proceedings of IEEE ISIT 2003

13) Optical Fiber Communications 2006, Anaheim, California. Frequency-shifted interferometer and its applications, B. Qi, L. Qian, A. Tausz, Y. Liu, and H.-K. Lo.

14) A Quantum Jump in Security, H.-K. Lo, Proc. SPIE 5260, 127 (2003)

  Selected Invited Talks

Over 45 invited talks over the last seven years. Some examples are:

2nd Workshop on Quantum Information Science, Hong Kong Poly. U., Jan. 2011.
CIFAR Quantum Information Processing Meeting, Toronto , Nov. 2010.
Physics Colloquium, University of Hong Kong , March 2010.
Physics Seminar, Hong Kong University of Science and Technology, Feb. 2010.
Quantum Information Science Program, KITP, UCSB, October 09.
Classical and Quantum Information Assurance Foundations and Practice, Dagstuhl Workshop, July 09.
Topical Team Meeting, Space-QUEST project, Austria, October 08
European SECOQC QKD public demonstration, Austria, October 08
QCMC (Quantum Communication, Measurement and Computing) 08, Calgary, August 08
Information Security in a Quantum World, IQC, Waterloo, August 08.
CEQIP'8 (5 th Central European Quantum Information Processing Workshop) Czech Republic, June 2008
Chinese University of Hong Kong, Physics Department Seminar, Jan. 2008.
Brock University, Physics Departmental Seminar, Oct. 2007.
Lisbon Workshop on Quantum Cryptography and Security. July 2007
Invited speaker, American Physical Society March Meeting (declined for personal reason), March 2007.
University of Hong Kong, Physics Dept., March 2007.
University of Buffalo, Physics Seminar, Oct. 2006
Fields Institute "Quantum Cryptography and Computing Workshop" Oct., 2006.
Perimeter Institute, Invited Talk, Sept. 2006.
International Conference on Quantum Foundation and Technology: Frontier and Future, Hangzhou, China, August 2006.
Gordon Research Conference, Italy, Discussion Leader, May 2006.
Certicom, Lunch and Learn, March 2006.
Caltech Workshop "Classical and Quantum Security" Dec. 2005.
University of Erlangen-Nuremberg, July 2005
Benasque Workshop on Quantum Information, June-July 2005.
CIAR meeting, Halifax, May 2005.
IQI Seminar, Caltech, March 2005.
First Asia-Pacific Conference on QIS, Taiwan, Dec. 2004
Special Week on Quantum Cryptography, Isaac Newton Institute, Sept. 2004.
QIT: Present Status and Future Directions, Isaac Newton Institute, Sept. 2004.
Conference on Quantum Information and Quantum Control, Fields Institute, Toronto, July 2004.
Eastern Formosa Summer School, June, 2004
Workshop on Quantum Information, Tainan, Taiwan, June, 2004.
Colloquium, Academic Sinica, Taiwan, June 2004.
RSA Japan Conference, May-June, 2004.
Fields Institute Workshop on Quantum Geometry and Q. Computing, May 2004.
Invited talk at National Research Council, Ottawa, May 2004
Physics Division Colloquium, Los Alamos National Labs, April 2004.
Invited talk at U. of Michigan, April 2004.
Snowmass Conference on Quantum Electronics, Utah, Jan. 2004.
Invited talk, CIAR Quantum Information Processing Program, Oct. 2003.
Invited talk at, Center for Photonic Communications and Computing, Northwestern University, Oct. 2003.
Photonics North, Montreal, May 2003, http://www.hospitalite.com/pn2003/pn_welcome.html
Workshop on "Cryptographic Reduction in Classical and Quantum Cryptography" Montreal, May 2003.
James H. Simons Conference, Stony Brook, New York, USA, May 2003
Invited talk at ACM Toronto Chapter, March 2003.
Workshop on Quantum Information, Cryptography and Error Correction MSRI, Berkeley, Nov. 2002
Physics Society Japan (JPS) Autumn Meeting, Nagoya, Japan, Sept. 2002.
EQIS'02 (ERATO Quantum Information Science), Tokyo, Japan, Sept. 2002.
Feynman Festival, College Park, M.D., August 2002.
Quantum Communications, Measurements and Computing (QCM&C) 2002, Boston, July 2002.
Quantum Device Technology workshop, Clarkson University, May 2002
RSA Conference 2002, San Jose, CA, Feb. 2002
EuroWorkshop on ``Quantum Computing Theory’’. Torino, Italy, June, 2001.
Quantum Communications, Measurements and Computing (QCM&C) 2000, Capri, Italy, June, 2000
Instructional Course in Quantum Computing, Edinburgh, UK, March 2000.
Quantum Information Processing 2000 Workshop, Montreal, CA, Dec. 1999
Princeton workshop on "quantum cryptography" Princeton, NJ, Nov., 1999
Issac Newton Institute workshop on ``Physics of Information’’, Cambridge, UK, June 1999.
Dagstuhl seminars on quantum computation, Dagstuhl, Germany, 1998.

Contributed Conference Talks delivered by my group

In addition, Lo's group members have delivered over 30 Contributed conference talks and other invited talks in the last seven years. These include 10 Talks at IEEE ISIT (International Symposium on Information Theory), which is the top conference in information theory. 6 Talks at the AQIS conference, which is the top Asian Pacific Conference on Quantum Information, and invited talks at places such as the Perimeter Institute for Theoretical Physics, Waterloo and the Institute for Quantum Information (IQC), Waterloo , and Caltech.

          Book Review

 

How Cryptology Went Commercial, H.-K. Lo, Physic World, June 2001, p. 53. (A review of Steven Levy's book, Crypto.) Abstract of this review is available at: http://physicsweb.org/article/review/14/6/2

 


Canadian Institute for Photonic InnovationsNatural Science and Engineering Research Council of CanadaCanada Research ChairsCanada Foundation for InnovationOntario Innovation TrustPremier's Research Excellence Awards The Canadian Institute for Advanced Researchmitacs