User profiles for H. Lo

Hoi-Kwong Lo

- Verified email at comm.utoronto.ca - Cited by 30384

Hong K LO

- Verified email at ust.hk - Cited by 13561

Secure quantum key distribution

HK Lo, M Curty, K Tamaki - Nature Photonics, 2014 - nature.com
Secure communication is crucial in the Internet Age, and quantum mechanics stands poised
to revolutionize cryptography as we know it today. In this Review, we introduce the …

Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
… If we allow one-way key reconciliation, the cost in this step is H(A\B), where A and B represent
the random variables of Alice,s and Bob,s sifted key, respectively. In a symmetric channel …

Exoskeleton robots for upper-limb rehabilitation: State of the art and future prospects

HS Lo, SQ Xie - Medical engineering & physics, 2012 - Elsevier
Current health services are struggling to provide optimal rehabilitation therapy to victims of
stroke. This has motivated researchers to explore the use of robotic devices to provide …

Unconditional security of quantum key distribution over arbitrarily long distances

HK Lo, HF Chau - science, 1999 - science.org
… For a review on quantum cryptography, see, for example, H.-K. … H.-K. Lo particularly thanks
A. Ekert for pressing him to investigate the security of QKD. We thank numerous colleagues, …

Decoy state quantum key distribution

HK Lo, X Ma, K Chen - Physical review letters, 2005 - APS
H.-KL also thanks travel support from the INI, Cambridge, UK, and from the IQI at Caltech
through … fields.utoronto.ca/programs/scientific/04-05/quantumIC/ abstracts/lo.ppt July, 2004. …

[HTML][HTML] Nonfilamentous C. albicans mutants are avirulent

HJ Lo, JR Köhler, B DiDomenico, D Loebenberg… - Cell, 1997 - cell.com
… G) cph1/cph1 efg1/efg1 (HLC54); (H) cph1/cph1 efg1/efg1 containing an integrated copy of
EFG1 … (h) cph1/cph1 efg1/efg1 in three macrophages 20 hr after infection, containing up to 80 …

Measurement-device-independent quantum key distribution

HK Lo, M Curty, B Qi - Physical review letters, 2012 - APS
How to remove detector side channel attacks has been a notoriously hard problem in
quantum cryptography. Here, we propose a simple solution to this problem—measurement-device-…

Improved broadband and quasi-omnidirectional anti-reflection properties with biomimetic silicon nanostructures

…, CY Peng, TA Liu, YK Hsu, CL Pan, HC Lo… - Nature …, 2007 - nature.com
Nature routinely produces nanostructured surfaces with useful properties 1 , 2 , 3 , 4 , such
as the self-cleaning lotus leaf 5 , the colour of the butterfly wing 6 , the photoreceptor in …

How to share a quantum secret

R Cleve, D Gottesman, HK Lo - Physical review letters, 1999 - APS
We investigate the concept of quantum secret sharing. In a (k, n) threshold scheme, a secret
quantum state is divided into n shares such that any k of those shares can be used to …

Security of quantum key distribution with imperfect devices

D Gottesman, HK Lo, N Lutkenhaus… - … Theory, 2004. ISIT …, 2004 - ieeexplore.ieee.org
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol
in the case where the source and detector are under the limited control of an adversary. …