Tal Mor

ORCID: 0000-0003-2074-0498
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Advanced NMR Techniques and Applications
  • Quantum and electron transport phenomena
  • Quantum many-body systems
  • Advanced MRI Techniques and Applications
  • Markov Chains and Monte Carlo Methods
  • NMR spectroscopy and applications
  • Electron Spin Resonance Studies
  • Atomic and Subatomic Physics Research
  • Neural Networks and Applications
  • Theoretical and Computational Physics
  • Stochastic Gradient Optimization Techniques
  • Chaos-based Image/Signal Encryption
  • Genomics and Phylogenetic Studies
  • Parallel Computing and Optimization Techniques
  • Optical Network Technologies
  • Biofield Effects and Biophysics
  • Semiconductor Quantum Structures and Devices
  • Computability, Logic, AI Algorithms
  • Quantum-Dot Cellular Automata
  • Cryptography and Data Security
  • RNA and protein synthesis mechanisms
  • Benford’s Law and Fraud Detection

Technion – Israel Institute of Technology
2015-2024

Sheba Medical Center
2019

Tel Aviv University
1993-2019

University of Haifa
2014

Ariel University
2000-2006

University of California, Los Angeles
1996-2005

Université de Montréal
1998-2005

UCLA Health
2003

Jet Propulsion Laboratory
2002

Israel Electric (Israel)
2002

We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from sender receiver. As we show, even distribution with perfect qubits might not be achievable over long distances when other are taken account. Furthermore, existing experimental schemes (based on weak pulses) currently do offer unconditional security for reported signal strength. Finally show that parametric down-conversion...

10.1103/physrevlett.85.1330 article EN Physical Review Letters 2000-08-07

We exhibit an orthogonal set of product states two three-state particles that nevertheless cannot be reliably distinguished by a pair separated observers ignorant which the has been presented to them, even if are allowed any sequence local operations and classical communication between separate observers. It is proved there finite gap mutual information obtainable joint measurement on these in only actions permitted. This result implies existence separable superoperators implemented locally....

10.1103/physreva.59.1070 article EN Physical Review A 1999-02-01

We apply the full power of modern electronic band-structure engineering and epitaxial heterostructures to design a transistor that can sense control single-donor electron spin. Spin-resonance transistors may form technological basis for quantum information processing. One- two-qubit operations are performed by applying gate bias. The bias electric field pulls wave function away from dopant ion into layers different alloy composition. Owing variation g factor...

10.1103/physreva.62.012306 article EN Physical Review A 2000-06-13

An unextendible product basis (UPB) for a multipartite quantum system is an incomplete orthogonal whose complementary subspace contains no state. We give examples of UPBs, and show that the uniform mixed state over to any UPB bound entangled exhibit tripartite 2x2x2 has entanglement but bipartite entanglement, i.e. all three corresponding 2x4 states are unentangled. members not perfectly distinguishable by local POVMs classical communication.

10.1103/physrevlett.82.5385 article EN Physical Review Letters 1999-06-28

The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt channel creates errors in transmission. For given error rate, amount information may have leaked to eavesdropper depends both particular and strategy. In this work, we discuss cryptographic protocols based transmission weak coherent states present system, symbiosis two existing systems, for which available is significantly reduced. This therefore safer than previous ones. We also suggest...

10.1103/physreva.51.1863 article EN Physical Review A 1995-03-01

Secure key distribution among two remote parties is impossible when both are classical, unless some unproven computation-complexity assumptions made, such as the difficulty of factorizing large numbers. On other hand, a secure possible quantum. What only one party (Alice) quantum, yet (Bob) has classical capabilities? We present protocol with this constraint and prove its robustness against attacks: we that any attempt an adversary to obtain information necessarily induces errors legitimate...

10.1103/physrevlett.99.140501 article EN Physical Review Letters 2007-10-05

Secure key distribution between two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions made, such as the difficulty of factorizing large numbers. On other hand, a secure possible quantum. What only one party (Alice) quantum, yet (Bob) has classical capabilities? Recently, semiquantum protocol was presented [M. Boyer, D. Kenigsberg, and T. Mor, Phys. Rev. Lett. 99, 140501 (2007)], in which yet, proven to be...

10.1103/physreva.79.032341 article EN Physical Review A 2009-03-30

Quantum correlations between two particles show non-classical properties which can be used for providing secure transmission of information. We present a quantum cryptographic system, in users store memories kept center. Correlations the stored by are created upon request projecting their product state onto fully entangled state. Our system allows communication any pair who have same Unlike other systems, it work without channels and is suitable building network. also modified with many centers.

10.1103/physreva.54.2651 article EN Physical Review A 1996-10-01

We present here algorithmic cooling (via polarization heat bath)-a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, cleans dirty bits beyond the Shannon's bound on data compression, by using set rapidly thermal-relaxing bits. Such auxiliary could be implemented get into thermal equilibrium with environment, e.g., electron spins. Interestingly, interaction usually...

10.1073/pnas.241641898 article EN Proceedings of the National Academy of Sciences 2002-03-19

Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum (SQKD) protocols, such as "QKD with classical Bob" and Alice" (that have both been proven robust), achieve this goal even if one of the is classical. However, existing SQKD are not experimentally feasible current technology. Here we suggest new protocol, "Classical Alice controllable mirror", that can be implemented technology (using 4-level systems instead qubits),...

10.1103/physreva.96.062335 article EN Physical review. A/Physical review, A 2017-12-29

We present strong attacks against quantum key distribution schemes which use memories and gates to attack directly the final key. analyze a specific of this type, for we find density matrices available eavesdropper optimal information can be extracted from them. prove security discuss any allowed by rules mechanics.

10.1103/physrevlett.78.2256 article EN Physical Review Letters 1997-03-17

10.1016/j.tcs.2004.03.041 article EN publisher-specific-oa Theoretical Computer Science 2004-04-15

Simultaneous near-certain preparation of qubits (quantum bits) in their ground states is a key hurdle quantum computing proposals as varied liquid-state NMR and ion traps. ``Closed-system'' cooling mechanisms are limited applicability due to the need for continual supply ancillas fault tolerance, high initial temperatures some systems. ``Open-system'' therefore required. We describe new, efficient initialization procedure such open With this procedure, an $n$-qubit device that originally...

10.1103/physrevlett.94.120501 article EN Physical Review Letters 2005-04-01

A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set necessary to perform in realistic noisy environment. The new consists two single-qubit gates (Hadamard ${σ_z}^{1/4}$), one double-qubit gate (Controlled-NOT). Since the consisting Controlled-NOT Hadamard not universal, achieves universality by including only additional elementary (in sense that it does include angles are irrational multiples $π$) gate, hence, potentially simplest can...

10.48550/arxiv.quant-ph/9906054 preprint EN other-oa arXiv (Cornell University) 1999-01-01

A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set necessary to perform in realistic noisy environment. The new consists two single-qubit gates (Hadamard /spl sigma//sub z//sup 1/4 /) one double-qubit gate (Controlled-NOT). Since the consisting Controlled-NOT Hadamard not universal, achieves universality by including only additional elementary (in sense that it does include angles are irrational multiples pi/) gate, hence, potentially...

10.1109/sffcs.1999.814621 article EN 2003-01-20

An efficient technique to generate ensembles of spins that are highly polarized by external magnetic fields is the Holy Grail in Nuclear Magnetic Resonance (NMR) spectroscopy. Since spin-half nuclei have steady-state polarization biases increase inversely with temperature, exhibiting high considered cool, even when their environment warm. Existing spin-cooling techniques limited efficiency and usefulness. Algorithmic cooling a promising new approach employs data compression methods open...

10.1142/s0219749904000419 article EN International Journal of Quantum Information 2004-12-01

Controlled preparation of highly pure quantum states is at the core practical applications information science, from state initialization most algorithms to a reliable supply ancilla qubits that satisfy fault-tolerance threshold for error correction. Heat-bath algorithmic cooling has been shown purify by controlled redistribution entropy and multiple contact with bath, not only ensemble implementations but also technologies strong imperfect measurements. However, an implicit restriction...

10.1088/1367-2630/aa8fe0 article EN cc-by New Journal of Physics 2017-09-29

In this paper we use properties of quantum mixed states to find bounds on various measures their distinguishability. These are used for analyzing strong joint attacks against key distribution which probes, memories, and gates attack directly the final key. We present a wide class attacks, prove security them.

10.1103/physrevlett.79.4034 article EN Physical Review Letters 1997-11-17

Article Free Access Share on A proof of the security quantum key distribution (extended abstract) Authors: Eli Biham Computer Science Department, Technion, Haifa 32000, Israel IsraelView Profile , Michel Boyer DIRO, Université de Montréal, Canada CanadaView P. Oscar Boykin Dept. Electrical Engineering, UCLA, Los Angeles, CA CAView Tal Mor and College Judea Samaria, Ariel, Vwani Roychowdhury Authors Info & Claims STOC '00: Proceedings thirty-second annual ACM symposium Theory computingMay...

10.1145/335305.335406 article EN 2000-05-01

Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions made, such as the difficulty of factorizing large numbers. On other hand, a secure possible quantum. What only one party (Alice) quantum, yet (Bob) has classical capabilities? We present protocols with this constraint, and prove their robustness against attacks: we that any attempt an adversary to obtain information even...

10.1109/icqnm.2007.18 article EN 2007-01-01

For several decades it was believed that information-secure key distribution requires both the sender and receiver to have ability generate and/or manipulate quantum states. Earlier, we showed in which one party is classical possible [Boyer, Kenigsberg, Mor, Phys. Rev. Lett. 99, 140501 (2007)]. A surprising very nice extension of result suggested by Zou, Qiu, Li, Wu, Li [Phys. 79, 052312 (2009)]. Their paper suggests sufficient for originator states (the person holding technology) just...

10.1103/physreva.83.046301 article EN Physical Review A 2011-04-11

We prove the security of quantum key distribution against most general attacks which can be performed on channel, by an eavesdropper who has unlimited computation abilities, and full power allowed rules classical physics. A created that way then used to transmit secure messages in a their is also unaffected future.

10.48550/arxiv.quant-ph/9912053 preprint EN other-oa arXiv (Cornell University) 1999-01-01
Coming Soon ...