Selected Publication
- Decoy State Quantum Key Distribution, H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005). http://arxiv.org/abs/quant-ph/0411004
- Security of quantum key distribution with imperfect Devices, D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, Quantum Information and Computation. Vol. 4, No.5 (2004) 325-360. http://xxx.lanl.gov/abs/quant-ph/0212066
- Proof of Security of Quantum Key Distribution With Two-Way Classical Communications, D. Gottesman and H.-K. Lo, IEEE Transactions on Information Theory, Vol. 49, No. 2, p. 457 (2003). http://xxx.lanl.gov/abs/quant-ph/0105121
- Concentrating Entanglement by Local Actions: Beyond Mean Values, H.-K. Lo and S. Popescu , Phys. Rev. A, Vol. 63, 022301 (2001). http://xxx.lanl.gov/abs/quant-ph/9707038
- Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances, H.-K. Lo and H. F. Chau, Science, Vol. 283, 2050 (1999). http://xxx.lanl.gov/abs/quant-ph/9803006
- Is Quantum Bit Commitment Really Possible? H.-K. Lo and H. F. Chau, Phys. Rev. Lett., Vol. 78, 3410 (1997). http://xxx.lanl.gov/abs/quant-ph/9603004
Invited Review Papers
- Quantum Cryptography, H.-K. Lo and Y. Zhao, (Invited paper) Encyclopedia of Complexity and Systems Science,Volume 8, pages 7265-7289, Springer New York, 2009
Survey Articles
S1)
From Quantum Cheating to Quantum Security, D. Gottesman and H.-K. Lo, Physics Today, Nov. 2000, p. 22. http://www.aip.org/pt/vol-53/iss-11/p22.html (Listed as a notable article in “The Best American Science and Nature Writing, 2001" edited by Ed. O. Wilson.)
S2)
Cryptography's Quantum Barrier, H.-K. Lo, Physics World, June 2001, p. 17.
Refereed Journal Articles
(All citation counts listed below are from Google Scholar accessed on Apr. 3, 2011 .)
- Insecurity of position-based quantum cryptography protocols against entanglement attacks, H. K. Lau and H.-K. Lo, Phys. Rev. A 83, 012322 (2011).
- Balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution,Yue-Meng Chi, Bing Qi, Wen Zhu, Li Qian, Hoi-Kwong Lo, Sun-Hyun Youn, A. I. Lvovsky, Liang Tian, New J. Phys. 13 (2011) 013003.
- Optimal entanglement transformations among N-qubit W-class states, W. Cui, E. Chitambar, and H.-K. Lo, Phys. Rev. A 82, 062314 (2010)
- Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals, M. Curty, X. Ma, H.-K. Lo, and N. Lütkenhaus, Phys. Rev. A 82, 052325 (2010).
- Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, Feihu Xu, Bing Qi, Hoi-Kwong Lo, New J. Phys. 12 (2010) 113026. [cited by 3] [This work has been report by many medias, including
The Economist (http://www.economist.com/node/16681905/print),
Nature News (http://www.nature.com/news/2010/100520/full/news.2010.256.html), et al.]
- Feasibility of Quantum Key Distribution through a dense wavelength division multiplexing network, B. Qing, W. Zhu , L. Qian and H.-K. Lo, New J. Phys. 12 (2010) 103042.
- Implementation of two-party protocols in the noisy-storage model, S. Wehner , M. Curty, C. Schaffner, and H.-K. Lo, Phys. Rev. A81, 052336 (2010). http://arxiv.org/abs/0911.2302. [cited by 1]
- Passive Estimate of an Untrusted Source for Quantum Key Distribution, Y. Zhao, B. Qi, H.-K. Lo, L. Qian, New J. Phys. 12, 023024 (2010). http://arxiv.org/abs/0905.4225 . [cited by 1]
- High-speed quantum random number generation by measuring phase noise of a single mode laser, B. Qi, Y.-M. Chi, H.-K. Lo, L. Qian, Optics Letters 35, 312-314 (2010). http://arxiv.org/abs/0908.3351. [cited by 11]
- Bounds on probability of transformations between multipartite pure states, W. Cui, W. Helwig, and H.-K. Lo, Phys. Rev. A 81, 012111 (2010). http://arxiv.org/abs/0910.3295 [cited by 5]
- Upper bounds for the secure key rate of decoy-state quantum key distribution, M. Curty, T. Moroder, X. Ma, H.-K. Lo and N. Lutkenhaus, Phys. Rev. A 79, 032335 (2009) http://arxiv.org/abs/0901.4669. [cited by 1]
- Security proof of quantum key distribution with detection efficiency
mismatch, C.-H.F. Fung, K. Tamaki, B. Qi, H.-K. Lo and X. Ma, Quantum
Information and Computation 9,131(2009). [cited by 22]
http://arxiv.org/abs/0802.3788
- Quantum Hacking: Experimental demonstration of time-shift attack
against practical quantum key distribution systems. Y. Zhao, C.-H. F.
Fung, B. Qi, C. Chen and H.-K. Lo, Phys. Rev. A 78, 042333 (2008) http://arxiv.org/abs/0704.3253 [cited by 35]
[This
is the first experimental demonstration of a feasible attack against a
commercial quantum cryptographic system. This surprising result has
been highlighted in Nature and has attracted a lot of scientific
attention.http://www.nature.com/nature/journal/v447/n7143/full/447372a.html ]
- Possibility, impossibility, and cheat sensitivity of quantum-bit string
commitment, H. Buhrman, M. Christandl, P. Hayden, H.-K. Lo and S. Wehner,
Physical Review A 78, 022316 (2008). [cited by 11] [Selected for publication in the Virtual Journal of Quantum Information, published by the American Physical Society.]
- Random-party entanglement distillation in multiparty states,
B. Fortescue and H.-K. Lo, Phys. Rev. A 78, 012348 (2008). [cited by 4]
http://arxiv.org/abs/0709.4059
- Quantum key distribution with triggering parametric down conversion sources, X. Ma and H.-K. Lo,
New J. Phys. 10, 073018 (2008) [cited by 17]
http://arxiv.org/abs/0803.2543
- Quantum key distribution with an unknown and untrusted source,
Y. Zhao, B. Qi and H.-K. Lo,
Phys. Rev. A 77, 052327 (2008) [cited by 24]
http://arxiv.org/abs/0802.2725
- Quantum Cryptography: from theory to practice (Invited Paper),
H.-K. Lo and N. Lutkenhaus,
Physics in Canada, Vol. 63, no. 4, pp 191-197 (2007). [cited by 14]
http://arxiv.org/abs/quant-ph/0702202
- Experimental study on Gaussian-modulated coherent-state quantum key
distribution over standard telecommunication fibers, B. Qi, L.-L. Huang, L. Qian and H.-K. Lo,
Phys. Rev. A 76, 052323 (2007). [cited by 19], http://arxiv.org/abs/0709.3666 [This paper has been selected for publication in the Dec. 10, 2007
issue of Virtual Journal of Nanoscale Science & Technology and the
December 2007 issue of Virtual Journal of Quantum Information.]
- Quantum key distribution with entangled photon sources,
X. Ma, C.-H. F. Fung, and H.-K. Lo, Phys. Rev. A76, 012307 (2007). [cited by 45]
http://arxiv.org/abs/quant-ph/0703122
- Multi-partite quantum cryptographic protocols with noisy GHZ states, K.
Chen and H.-K. Lo, Quantum Information and Computation 7, 689 (2007), [cited by 14]
http://xxx.lanl.gov/abs/quant-ph/0404133
- Random bipartite entanglement from W and W-like states, B. Fortescue and H.-K. Lo, Phys. Rev. Lett. 98, 260501 (2007). [cited by 22]
- Quantum key distribution with "dual detectors"
B. Qi, Y. Zhao, X. Ma, H.-K. Lo and L. Qian, Phy. Rev. A 75, 052304 (2007). [cited by 11]
http://arxiv.org/abs/quant-ph/0611044
- Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states,
M. Curty, L. L.X. Zhang, H.-K. Lo and N. Lutkenhaus, Quantum Information and Computation 7, 665 (2007). [cited by 18], http://arxiv.org/abs/quant-ph/0609094
-
Phase-remapping attack in practical quantum key distribution systems,
C.-H. F. Fung, B. Qi, K. Tamaki, and H.-K. Lo, Phys. Rev. A 75, 032314 (2007) [cited by 6], http://arxiv.org/abs/quant-ph/0601115
- Security of quantum key distribution using weak coherent states with
Nonrandom phases,
H.-K. Lo and J. Preskill, Quantum Information and Computation 7, 431 (2007). [cited by 19]
http://arxiv.org/abs/quant-ph/0610203
- Discrete Rotational Symmetry and Quantum Key Distribution Protocols,
D. Shirokoff, C.-H. F. Fung, and H.-K. Lo, Phys. Rev. A75, 032341 (2007). [cited by 4]
http://arxiv.org/abs/quant-ph/0604198
- Experimental quantum key distribution with active phase randomization,
Y. Zhao, B. Qi, and H.-K. Lo, Appl. Phys. Lett. 90, 044106 (2007), [cited by 1]
http://arxiv.org/abs/quant-ph/0611059
- Security of quantum bit string commitment depends on the information
measure, H. Buhrman, M. Christandl, P. Hayden, H.-K. Lo, S. Wehner, Phys. Rev. Lett. 97, 250501 (2006). [cited by 21]
http://arxiv.org/abs/quant-ph/0504078
- Security proof of a three-state quantum key distribution protocol without rotational symmetry,
C.-H. F. Fung, and H.-K. Lo, Phys. Rev. A74, 042342 (2006), [cited by 5]
http://arxiv.org/abs/quant-ph/0607056
- Time-shift attack in practical quantum cryptosystems,
B. Qi, C.-H. F. Fung, H.-K. Lo and X. Ma, Quantum Information and Computation 7, 73 (2007). [cited by 39]
http://arxiv.org/abs/quant-ph/0512080
-
Decoy-state quantum key distribution with two-way classical
postprocessing, X. Ma, C-H. F. Fung, F. Dupuis, K. Chen, K. Tamaki, and
H.-K. Lo, Phys. Rev. A74, 032330 (2006). [cited by 29]
- Experimental Quantum Key Distribution with Decoy States, Y. Zhao, B.
Qi, X. Ma, H.-K. Lo, and L. Qian, Phys. Rev. Lett. 96, 070502 (2006). [cited by 111]
http://arxiv.org/abs/quant-ph/0503192
[This work has attracted a lot of media attention including Toronto’s largest city newspaper "Toronto Star" and "Technological Reviews" ]
-
Performance of two quantum key distribution protocols, C.-H. F. Fung,
K. Tamaki and H.-K. Lo, Phys. Rev. A73, 012337 (2006). [cited by 26]
http://arxiv.org/abs/quant-ph/0510025
- Quantum key distribution based on arbitrarily-weak distillable
entangled states, K. Horodecki, D. Leung, H.-K. Lo, and J. Oppenheim, Phys. Rev. Lett. 96, 070501 (2006). [cited by 13]
http://arxiv.org/abs/quant-ph/0510067
- Unconditionally secure key distillation from multiphotons, K. Tamaki, and H.-K. Lo, Phys. Rev. A73, 010302(R) 2006, [cited by 15]
http://arxiv.org/abs/quant-ph/0412035
- Two-way quantum communication channels, A. Childs, D. W. Leung, and
H.-K. Lo, International Journal of Quantum Information 4, No. 1, (Asher
Peres Memorial Issue) pp. 63-83 (2006) [cited by 5]
http://arxiv.org/abs/quant-ph/0506039
- Frequency-shifted Mach-Zehnder Interferometer for Locating Multiple Weak Reflections along a Fiber Link,
B. Qi, L. Qian, A Tausz, and H.-K. Lo, IEEE Photonics Technology Letters 18, 295 (2005). [cited by 3]
- High-resolution, large dynamic range fiber length measurement based on
a frequency-shifted asymmetrical Sagnac interferometer, B. Qi, A.
Tausz, L. Qian, and H.-K. Lo, Optics Letters 30, No. 24, 3287 (2005). [citedby 8]
- Practical decoy state for quantum key distribution, X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Phys. Rev. A72, 012326 (2005). [cited by 152] http://arxiv.org/abs/quant-ph/0503005
- Decoy State Quantum Key Distribution, H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005). [cited by 286], http://arxiv.org/abs/quant-ph/0411004
[This
work has been highlighted in international popular and scientific press
including "Globe and Mail" and "ew Scientist".]
- Inefficiency and classical communication bounds for conversion
between partially entangled pure bipartite states,
B. Fortescue and H.-K. Lo,
Phys. Rev. A 72, 032336 (2005). [cited by 5]
http://xxx.lanl.gov/abs/quant-ph/0411200
- Getting something out of nothing, H-K. Lo, Quantum Information and Computation Vol 5, No. 4&5 (2005) 413-418. [cited by 24]
http://arxiv.org/abs/quant-ph/0503004
- Efficient Quantum Key Distribution Scheme and Proof of its Security,
H.-K. Lo, H. F. Chau, M. Ardehali, J. of Cryptology, 18, Number 2,
(2005) 133-165. [cited by 142]
http://arxiv.org/abs/quant-ph/0011056.
- Some attacks on quantum-based cryptographic protocols, H.-K. Lo and
T.-M. Ko, Quantum Information and Computation. Vol. 5, No.1 (2005)
40-47. [cited by 15]
http://xxx.lanl.gov/abs/quant-ph/0309127
-
Security of quantum key distribution with imperfect Devices, D.
Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, Quantum
Information and Computation. Vol. 4, No.5 (2004) 325-360. [cited by 243]
http://xxx.lanl.gov/abs/quant-ph/0212066
- A Tight Lower Bound on the Classical Communication Cost of Entanglement Dilution,
A. Harrow and H.-K. Lo, IEEE Transactions on Information Theory, Vol. 50, Issue 2, pp. 319-327 (2004), [cited by 19]
http://xxx.lanl.gov/abs/quant-ph/0204096
- Method for decoupling error correction from privacy amplification, H.-K. Lo, New Journal of Physics 5, 36 (2003). (Invited paper), [cited by 19]
http://xxx.lanl.gov/abs/quant-ph/0201030
- Proof of Security of quantum key distribution with two-way classical communications, D. Gottesman and H.-K. Lo,
IEEE Transactions on Information Theory, Vol. 49, No. 2, p. 457 (2003). [cited by 198]
http://xxx.lanl.gov/abs/quant-ph/0105121
- Proof of Unconditional Security of Six-State Quantum Key Distribution
Scheme, H.-K. Lo, Quantum Information and Computation, Vol. 1,
Number 2, 81 (2001). [cited by 67]
http://xxx.lanl.gov/abs/quant-ph/0102138
- A Simple Proof of the Unconditional Security of Quantum Key Distribution, H.-K. Lo, J. of Phys. A, Vol. 34, 6957 (2001). [cited by 23]
http://xxx.lanl.gov/abs/quant-ph/9904091
-
Concentrating Entanglement by Local Actions: Beyond Mean Properties,
H.-K. Lo and S. Popescu, Phys. Rev. A, Vol. 63, 022301 (2001). [cited by 139]
http://xxx.lanl.gov/abs/quant-ph/9707038
- A Quantum Analog of Huffman Coding, S. L. Braunstein, C. A. Fuchs,
D.Gottesman, and H.-K. Lo, IEEE Transactions on Information Theory,
Vol. 46, 1644 (2000). [cited by 29]
http://xxx.lanl.gov/abs/quant-ph/9805080
-
Classical-communication cost in distributed quantum-information
processing: a generalization of quantum-communication complexity, H.-K.
Lo, Phys. Rev. A, Vol. 62, 012313 (2000). [cited by 200]
- Unconditional Security of Quantum Key Distribution over Arbitrarily
Long Distances, H.-K. Lo and H. F. Chau, Science Vol. 283, 2050 (1999). [cited by 595]
http://xxx.lanl.gov/abs/quant-ph/9803006 [ Highlighted by a Perspective article in Science by Peter Shor and Charles Bennett.]
- How to Share a Quantum Secret, R. Cleve, D. Gottesman and H.-K. Lo, Physical Review Letters Vol. 83, 648 (1999).
http://xxx.lanl.gov/abs/quant-ph/9901025, [Cited by 443.]
-
Classical Communication Cost of Entanglement Manipulation: Is
Entanglement an Interconvertible Resource?, H.-K. Lo and S. Popescu,
Physical Review Letters, Vol. 83, 1459 (1999). [cited by 65]
http://xxx.lanl.gov/abs/quant-ph/9902045
-
Making An Empty Promise With A Quantum Computer, (Invited Paper), H. F.
Chau and H.-K. Lo, Fort. de. Phys., Vol. 46, No. 4-5, 325 (1998). [citd by 10]
http://xxx.lanl.gov/abs/quant-ph/9709053
[Also, re-published in the book ``Quantum Computing’’, eds. S. Braunstein. http://www.sees.bangor.ac.uk/~schmuel/book/book1.html ]
- Why Quantum Bit Commitment and Ideal Quantum Coin Tossing Are
Impossible, H.-K. Lo and H. F. Chau, Physica D, Vol. 120, 177
(1998). [cited by 146]
http://xxx.lanl.gov/abs/quant-ph/9711065
- Insecurity of Quantum Secure Computations, H.-K. Lo, Phys. Rev. A, Vol.56, 1154 (1997). [cited by 105]
http://xxx.lanl.gov/abs/quant-ph/9611031
- Is Quantum Bit Commitment Really Possible?, H.-K. Lo and H. F. Chau, Phys. Rev. Lett., Vol. 78, 3410 (1997). [cited by 304]
http://xxx.lanl.gov/abs/quant-ph/9603004 [This fundamental result has been highlighted in Science and Science News.]
- One Way Functions in Reversible Computations, H. F. Chau and H.-K. Lo, Cryptologia, Vol. 21, No. 2, 139 (1997). [cited by 6]
http://xxx.lanl.gov/abs/quant-ph/9506012
-
Primality Test via Quantum Factorization, H. F. Chau and H.-K. Lo,
International Journal of Modern Physics C, Vol. 8, No. 2, 131 (1997).
http://xxx.lanl.gov/abs/quant-ph/9508005
- Quantum coding Theorem for mixed states, H.-K. Lo, Optics Communications, Vol. 119, 552 (1995).
http://xxx.lanl.gov/abs/quant-ph/9504004
- Aharonov-Bohm Order Parameters for Non-Abelian Gauge Theories, H.-K. Lo, Phys. Rev. D, Vol. 52, 7247 (1995). [cited by 7]
http://xxx.lanl.gov/abs/hep-th/9502080
- Is Baryon Number Violated when Electroweak Strings Intercommute? H.-K. Lo, Phys. Rev. D, Vol. 51, 7152 (1995). [cited by 6]
http://xxx.lanl.gov/abs/hep-ph/9409319
- Scattering from Electroweak Strings, H.-K. Lo, Phys. Rev. D, Vol. 51, 802 (1995). [cited by 3]
http://xxx.lanl.gov/abs/hep-ph/9404273
- Exact Wave Functions for non-Abelian Chern-Simons Particles, H.-K. Lo, Phys. Rev. D, Vol. 48, 4999 (1993). [cited by 1]
http://xxx.lanl.gov/abs/hep-th/9306076
- Complementarity in Wormhole Chromodynamics, H.-K. Lo, K.-M. Lee and J. Preskill, Phys. Lett. B, Vol. 318, 287 (1993). [cited by 4]
http://xxx.lanl.gov/abs/hep-th/9308044
- Non-Abelian Vortices and non-Abelian Statistics, H.-K. Lo and J. Preskill, Phys. Rev. D, Vol. 48, 4821 (1993). [cited by 43]
http://xxx.lanl.gov/abs/hep-th/9306006
- Topological Approach to Alice Electrodynamics, M. Bucher, H.-K. Lo and J. Preskill, Nucl. Phys. B, Vol. 386, 3 (1992). [cited by 37]
http://xxx.lanl.gov/abs/hep-th/9112039
Preprints
P1) arXiv:1011.2982 [pdf, ps, other] Title: Universal Squash Model For Optical Communications Using Linear Optics And Threshold Detectors, Authors: Chi-Hang Fred Fung, H. F. Chau, Hoi-Kwong Lo
Comments: 14 pages, Subjects: Quantum Physics (quant-ph)
P2) arXiv:1005.0272 [pdf, other], Title: Security of high speed quantum key distribution with finite detector dead time, Authors: Viacheslav Burenkov, Bing Qi, Ben Fortescue, Hoi-Kwong Lo, Comments: 18 pages, 7 figures
P3). A brief introduction of quantum cryptography for engineers, B. Qi, L. Qian and H.-K. Lo, http://arxiv.org/abs/1002.1237
Publications by group members
[Group members are encouraged to publish their results on their own.]
G1) Unconditional security at a low cost, by Xiongfeng Ma, Phys. Rev. A. 052325 (2006).
G2) Bing Qi, Li Qian, "Optimal filters for photon cloning with an optical amplifier", Optics Letters 32, 418-420 (2007).
G3) Bing Qi, "Single photon continuous variable quantum key distribution based on energy-time uncertainty relation,"Optics letters 31,
2795-2797 (2006) (This paper has been selected for publication in the
September 11, 2006 issue of Virtual Journal of Nanoscale Science &
Technology and the September 2006 issue of Virtual Journal of Quantum
Information)
G4) Marcos Curty, Xiongfeng Ma, Bing Qi, Tobias Moroder, "Passive decoy state, quantum key distribution with practical light sources" Physical Review A 81, 022310 (2010)
G5) Fei Ye, Li Qian, and Bing Qi, "Multipoint Chemical Gas Sensing Using Frequency-Shifted Interferometry", Journal of Lightwave Technology 27, 5356-5364 (2009)
Books
Book
chapter: Quantum cryptology, Chapter 4 of Introduction to quantum
computation and information, eds. H.-K. Lo, S. Popescu, and T.
Spiller
(World Scientific, Singapore, Hardcover 1998, Paperback 2000).
http://www.worldscientific.com/books/physics/3724.html
Books edited
1)
Introduction to quantum computation and information, eds. H.-K. Lo, S.
Popescu, and T. Spiller (World Scientific, Singapore,Hardcover 1998
Paperback 2000).
http://www.worldscientific.com/books/physics/3724.html
[Cited by 182. Reviewed in Nature 339, p. 119 (1999).]
2)
As an editor: Scalable quantum computers: paving the way to
realization, eds. S. L. Braunstein and H.-K. Lo (Wiley-VCH, Berlin,
2000).
http://www.sees.bangor.ac.uk/~schmuel/book/book2.html
Non-refereed publications
Book
Review on "How Cryptology Went Commercial" H.-K. Lo, Physic World,
June 2001, p. 53. (A review of Steven Levy's book, Crypto.)
Abstract of this review is available at: http://physicsweb.org/article/review/14/6/2
Selected Recent Refereed Conference Proceedings/Abstracts
1) Improve the efficiency of a practical quantum key distribution system, B. Qi, Y. Zhao, X. Ma, H.-K. Lo, L Qian,
Proceedings of SPIE 6710 (Quantum Communications and Quantum Imaging V): 671015 (2007).
2)
Quantum hacking: attacking practical quantum key distribution Systems,
B. Qi, C.-H. F. Fung, Y. Zhao, X. Ma, K. Tamaki, C. Chen, H.-K. Lo,
Proceedings of SPIE 6710 (Quantum Communications and Quantum Imaging
V): 671001 (2007).
3)
Simulation and Implementation of Decoy State Quantum Key Distribution
over 60km Telecom Fiber, Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo,
Li Qian
Proceedings of IEEE International Symposium on Information
Theory 2006, pp. 2094-2098, http://arxiv.org/abs/quant-ph/0601168
4) Quantum key distribution based on a Sagnac loop interferometer and Polarization-insensitive phase modulators,
B. Qi, L.-L. Huang, H.-K. Lo and L. Qian
Proceedings of IEEE International Symposium on Information Theory 2006, pp. 2090-2093, http://arxiv.org/abs/quant-ph/0604187
5)
Inefficiency and classical communication bounds for conversion between
partially entangled pure bipartite quantum states, Fortescue, B.;
Hoi-Kwong Lo,
Proceedings of IEEE ISIT (International Symposium on Information
Theory) 2005, 4-9 Sept. 2005 Page(s):889 - 892
6) Conference key agreement and quantum sharing of classical secrets with noisy GHZ states, Kai Chen; Hoi-Kwong Lo,
Proceedings of IEEE ISIT (International Symposium on Information
Theory) 2005, 4-9 Sept. 2005 Page(s):1607 - 1611
7)
Unconditionally secure key distillation from multi-photons in a
single-photon polarization based quantum key distribution, Tamaki, K.;
Hoi-Kwong Lo,
Proceedings of IEEE ISIT (International Symposium on Information
Theory) 2005, 4-9 Sept. 2005 Page(s):1603 - 1606
8)
Decoy state quantum key distribution, H.-K. Lo, International Journal
of Quantum Information Vol. 3, No. supp01, p. 143 (2005).
9) Quantum key distribution with vacua and dim pulses as decoy states, H.-K. Lo,
Proceedings of IEEE ISIT (International Symposium on Information
Theory) 2004, Page(s):137
10)
Security of quantum key distribution with imperfect devices,
Proceedings of IEEE ISIT, 2004, D. Gottesman, H.-K. Lo, N. Lutkenhaus,
and J. Preskill
11) A tight lower bound on the classical communication cost of entanglement dilution, A. W. Harrow and H. K. Lo,
Proceedings of IEEE ISIT 2003
12) Error correction and security in quantum cryptography, H.-K. Lo, Proceedings of IEEE ISIT 2003
13)
Optical Fiber Communications 2006, Anaheim, California.
Frequency-shifted interferometer and its applications, B. Qi, L. Qian,
A. Tausz, Y. Liu, and H.-K. Lo.
14) A Quantum Jump in Security, H.-K. Lo, Proc. SPIE 5260, 127 (2003)
Selected Invited Talks
Over 45 invited talks over the last seven years. Some examples are:
2nd Workshop on Quantum Information Science, Hong Kong Poly. U., Jan. 2011. CIFAR Quantum Information Processing Meeting, Toronto , Nov. 2010. Physics Colloquium, University of Hong Kong , March 2010. Physics Seminar, Hong Kong University of Science and Technology, Feb. 2010. Quantum Information Science Program, KITP, UCSB, October 09. Classical and Quantum Information Assurance Foundations and Practice, Dagstuhl Workshop, July 09. Topical Team Meeting, Space-QUEST project, Austria, October 08
European SECOQC QKD public demonstration, Austria, October 08
QCMC (Quantum Communication, Measurement and Computing) 08, Calgary, August 08
Information Security in a Quantum World, IQC, Waterloo, August 08.
CEQIP'8 (5 th Central European Quantum Information Processing Workshop) Czech Republic, June 2008
Chinese University of Hong Kong, Physics Department Seminar, Jan. 2008.
Brock University, Physics Departmental Seminar, Oct. 2007.
Lisbon Workshop on Quantum Cryptography and Security. July 2007
Invited speaker, American Physical Society March Meeting (declined for personal reason), March 2007.
University of Hong Kong, Physics Dept., March 2007.
University of Buffalo, Physics Seminar, Oct. 2006
Fields Institute "Quantum Cryptography and Computing Workshop" Oct., 2006.
Perimeter Institute, Invited Talk, Sept. 2006.
International Conference on Quantum Foundation and Technology: Frontier and Future, Hangzhou, China, August 2006.
Gordon Research Conference, Italy, Discussion Leader, May 2006.
Certicom, Lunch and Learn, March 2006.
Caltech Workshop "Classical and Quantum Security" Dec. 2005.
University of Erlangen-Nuremberg, July 2005
Benasque Workshop on Quantum Information, June-July 2005.
CIAR meeting, Halifax, May 2005.
IQI Seminar, Caltech, March 2005.
First Asia-Pacific Conference on QIS, Taiwan, Dec. 2004
Special Week on Quantum Cryptography, Isaac Newton Institute, Sept. 2004.
QIT: Present Status and Future Directions, Isaac Newton Institute, Sept. 2004.
Conference on Quantum Information and Quantum Control, Fields Institute, Toronto, July 2004.
Eastern Formosa Summer School, June, 2004
Workshop on Quantum Information, Tainan, Taiwan, June, 2004.
Colloquium, Academic Sinica, Taiwan, June 2004.
RSA Japan Conference, May-June, 2004.
Fields Institute Workshop on Quantum Geometry and Q. Computing, May 2004.
Invited talk at National Research Council, Ottawa, May 2004
Physics Division Colloquium, Los Alamos National Labs, April 2004.
Invited talk at U. of Michigan, April 2004.
Snowmass Conference on Quantum Electronics, Utah, Jan. 2004.
Invited talk, CIAR Quantum Information Processing Program, Oct. 2003.
Invited talk at, Center for Photonic Communications and Computing, Northwestern University, Oct. 2003.
Photonics North, Montreal, May 2003, http://www.hospitalite.com/pn2003/pn_welcome.html
Workshop on "Cryptographic Reduction in Classical and Quantum Cryptography" Montreal, May 2003.
James H. Simons Conference, Stony Brook, New York, USA, May 2003
Invited talk at ACM Toronto Chapter, March 2003.
Workshop on Quantum Information, Cryptography and Error Correction MSRI, Berkeley, Nov. 2002
Physics Society Japan (JPS) Autumn Meeting, Nagoya, Japan, Sept. 2002.
EQIS'02 (ERATO Quantum Information Science), Tokyo, Japan, Sept. 2002.
Feynman Festival, College Park, M.D., August 2002.
Quantum Communications, Measurements and Computing (QCM&C) 2002, Boston, July 2002.
Quantum Device Technology workshop, Clarkson University, May 2002
RSA Conference 2002, San Jose, CA, Feb. 2002
EuroWorkshop on ``Quantum Computing Theory’’. Torino, Italy, June, 2001.
Quantum Communications, Measurements and Computing (QCM&C) 2000, Capri, Italy, June, 2000
Instructional Course in Quantum Computing, Edinburgh, UK, March 2000.
Quantum Information Processing 2000 Workshop, Montreal, CA, Dec. 1999
Princeton workshop on "quantum cryptography" Princeton, NJ, Nov., 1999
Issac Newton Institute workshop on ``Physics of Information’’, Cambridge, UK, June 1999.
Dagstuhl seminars on quantum computation, Dagstuhl, Germany, 1998.
Contributed Conference Talks delivered by my group
In addition, Lo's group members have delivered over 30 Contributed conference talks and other invited talks in the last seven years. These include 10 Talks at IEEE ISIT (International Symposium on Information Theory), which is the top conference in information theory. 6 Talks at the AQIS conference, which is the top Asian Pacific Conference on Quantum Information, and invited talks at places such as the Perimeter Institute for Theoretical Physics, Waterloo and the Institute for Quantum Information (IQC), Waterloo , and Caltech.
Book Review
How Cryptology Went Commercial, H.-K. Lo, Physic World, June 2001, p. 53. (A review of Steven Levy's book, Crypto.) Abstract of this review is available at: http://physicsweb.org/article/review/14/6/2