liu.seSearch for publications in DiVA
Change search
Link to record
Permanent link

Direct link
Publications (6 of 6) Show all publications
Jogenfors, J. (2019). Quantum Bitcoin: An Anonymous, Distributed, and Secure Currency Secured by the No-Cloning Theorem of Quantum Mechanics. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC): . Paper presented at 1st IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC). IEEE
Open this publication in new window or tab >>Quantum Bitcoin: An Anonymous, Distributed, and Secure Currency Secured by the No-Cloning Theorem of Quantum Mechanics
2019 (English)In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

The digital currency Bitcoin has had remarkable growth since it was first proposed in 2008. Its distributed nature allows currency transactions without a central authority by using cryptographic methods and a data structure called the blockchain. Imagine that you could run the Bitcoin protocol on a quantum computer. What advantages can be had over classical Bitcoin? This is the question we answer here by introducing Quantum Bitcoin which, among other features, has immediate local verification of transactions. This is a major improvement over classical Bitcoin since we no longer need the computationally-intensive and time-consuming method of recording all transactions in the blockchain. Quantum Bitcoin is the first distributed quantum currency, and this paper introduces the necessary tools including a novel two-stage quantum mining process. In addition, we have counterfeiting resistance, fully anonymous and free transactions, and a smaller footprint than classical Bitcoin.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Quantum Bitcoin, Bitcoin, Quantum Computing
National Category
Computer Sciences
Identifiers
urn:nbn:se:liu:diva-129217 (URN)10.1109/BLOC.2019.8751473 (DOI)000491257000057 ()2-s2.0-85069187369 (Scopus ID)978-1-7281-1328-9 (ISBN)978-1-7281-1329-6 (ISBN)
Conference
1st IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC)
Available from: 2016-06-13 Created: 2016-06-13 Last updated: 2021-12-17Bibliographically approved
Jogenfors, J., Cabello, A. & Larsson, J.-Å. (2017). Comment on "Franson Interference Generated by a Two-Level System".
Open this publication in new window or tab >>Comment on "Franson Interference Generated by a Two-Level System"
2017 (English)Manuscript (preprint) (Other academic)
Abstract [en]

In a recent Letter [Phys. Rev. Lett. 118, 030501 (2017)], Peiris, Konthasinghe, and Muller report a Franson interferometry experiment using pairs of photons generated from a two-level semiconductor quantum dot. The authors report a visibility of 66% and claim that this visibility “goes beyond the classical limit of 50% and approaches the limit of violation of Bell’s inequalities (70.7%).” We explain why we do not agree with this last statement and how to fix the problem.

Publisher
p. 1
National Category
Atom and Molecular Physics and Optics
Identifiers
urn:nbn:se:liu:diva-142073 (URN)
Available from: 2017-10-20 Created: 2017-10-20 Last updated: 2022-03-07
Jogenfors, J. (2015). A Classical-Light Attack on Energy-Time Entangled Quantum Key Distribution, and Countermeasures. (Licentiate dissertation). Linköping: Linköping University Electronic Press
Open this publication in new window or tab >>A Classical-Light Attack on Energy-Time Entangled Quantum Key Distribution, and Countermeasures
2015 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Quantum key distribution (QKD) is an application of quantum mechanics that allowstwo parties to communicate with perfect secrecy. Traditional QKD uses polarization of individual photons, but the development of energy-time entanglement could lead to QKD protocols robust against environmental effects. The security proofs of energy-time entangled QKD rely on a violation of the Bell inequality to certify the system as secure. This thesis shows that the Bell violation can be faked in energy-time entangled QKD protocols that involve a postselection step, such as Franson-based setups. Using pulsed and phase-modulated classical light, it is possible to circumvent the Bell test which allows for a local hidden-variable model to give the same predictions as the quantum-mechanical description. We show that this attack works experimentally and also how energy-time-entangled systems can be strengthened to avoid our attack.

Place, publisher, year, edition, pages
Linköping: Linköping University Electronic Press, 2015. p. 60
Series
Linköping Studies in Science and Technology. Thesis, ISSN 0280-7971 ; 1709
Keywords
Quantum Key Distribution, Energy-Time Entanglement, Quantum Information, Kvantkryptering, Energi-Tid-Snärjning, Kvantinformation
National Category
Other Physics Topics
Identifiers
urn:nbn:se:liu:diva-114073 (URN)10.3384/lic.diva-114073 (DOI)978-91-7519-118-8 (ISBN)
Presentation
2015-02-27, Visionen, B-huset, Campus Valla, Linköpings Universitet, Linköping, 13:15 (English)
Opponent
Supervisors
Available from: 2015-02-18 Created: 2015-02-06 Last updated: 2019-11-18Bibliographically approved
Jogenfors, J., Elhassan, A. M., Ahrens, J., Bourennane, M. & Larsson, J.-Å. (2015). Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution. Science Advances, 1(11), 1-7, Article ID e1500793.
Open this publication in new window or tab >>Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
Show others...
2015 (English)In: Science Advances, E-ISSN 2375-2548, Vol. 1, no 11, p. 1-7, article id e1500793Article in journal (Refereed) Published
Abstract [en]

Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson’s configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.

Place, publisher, year, edition, pages
American Association for the Advancement of Science, 2015
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:liu:diva-114210 (URN)10.1126/sciadv.1500793 (DOI)000216604200020 ()
Note

At the time for thesis presentation publication was in status: Manuscript

At the time for thesis presentation name of publication was: A Classical-Light Attack on Energy-Time Entangled Quantum Key Distribution, and Countermeasures

Available from: 2015-02-13 Created: 2015-02-13 Last updated: 2020-06-08Bibliographically approved
Jogenfors, J. & Larsson, J.-Å. (2014). Energy-time entanglement, elements of reality, and local realism. Journal of Physics A: Mathematical and Theoretical, 47(42), 424032
Open this publication in new window or tab >>Energy-time entanglement, elements of reality, and local realism
2014 (English)In: Journal of Physics A: Mathematical and Theoretical, ISSN 1751-8113, E-ISSN 1751-8121, Vol. 47, no 42, p. 424032-Article in journal (Refereed) Published
Abstract [en]

The Franson interferometer, proposed in 1989 (Franson 1989 Phys. Rev. Lett. 62 2205-08), beautifully shows the counter-intuitive nature of light. The quantum description predicts sinusoidal interference for specific outcomes of the experiment, and these predictions can be verified in experiment. In the spirit of Einstein, Podolsky, and Rosen it is possible to ask if the quantum-mechanical description (of this setup) can be considered complete. This question will be answered in detail in this paper, by delineating the quite complicated relation between energy-time entanglement experiments and Einstein-Podolsky-Rosen (EPR) elements of reality. The mentioned sinusoidal interference pattern is the same as that giving a violation in the usual Bell experiment. Even so, depending on the precise requirements made on the local realist model, this can imply (a) no violation, (b) smaller violation than usual, or (c) full violation of the appropriate statistical bound. Alternatives include (a) using only the measurement outcomes as EPR elements of reality, (b) using the emission time as EPR element of reality, (c) using path realism, or (d) using a modified setup. This paper discusses the nature of these alternatives and how to choose between them. The subtleties of this discussion needs to be taken into account when designing and setting up experiments intended to test local realism. Furthermore, these considerations are also important for quantum communication, for example in Bell-inequality-based quantum cryptography, especially when aiming for device independence.

Place, publisher, year, edition, pages
IOP Publishing: Hybrid Open Access, 2014
Keywords
bell inequalities; energy-time entanglement; elements of reality
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:liu:diva-112643 (URN)10.1088/1751-8113/47/42/424032 (DOI)000344222200033 ()
Available from: 2014-12-05 Created: 2014-12-05 Last updated: 2017-12-05
Lavesson, N., Jogenfors, J. & Widlund, O. (2014). Modeling of streamers in transformer oil using OpenFOAM. Compel, 33(4), 1272-1281
Open this publication in new window or tab >>Modeling of streamers in transformer oil using OpenFOAM
2014 (English)In: Compel, ISSN 0332-1649, Vol. 33, no 4, p. 1272-1281Article in journal (Refereed) Published
Abstract [en]

Purpose – A model for streamers based on charge transport has been developed by MIT and ABB. The purpose of this paper is to investigate the consequences of changing numerical method from the finite element method (FEM) to the finite volume method (FVM) for simulations using the streamer model. The new solver is also used to extend the simulations to 3D. Design/methodology/approach – The equations from the MIT-ABB streamer model are implemented in OpenFOAM which uses the FVM. Checks of the results are performed including verification of convergence. The solver is then applied to some of the key simulations from the FEM model and results presented. Findings – The results for second mode streamers are confirmed, whereas the results for third mode streamers differ significantly leading to questioning of one hypothesis proposed based on the FEM results. The 3D simulations give consistent results and show a way forward for future simulations. Originality/value – The FVM has not been applied to the model before and led to more confidence in second mode result and revising of third mode results. In addition the new simulation method makes it possible to extend the results to 3D.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2014
Keywords
Finite volume method; Dielectric breakdown; OpenFOAM; Streamers; Transformer oil
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:liu:diva-111308 (URN)10.1108/COMPEL-12-2012-0361 (DOI)000341713000016 ()
Available from: 2014-10-14 Created: 2014-10-14 Last updated: 2017-12-05Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8032-1466

Search in DiVA

Show all publications