12,699 research outputs found

    Security of Plug-and-Play QKD Arrangements with Finite Resources

    Get PDF
    The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship

    B\"acklund transformations in 2D dilaton gravity

    Get PDF
    We give a B\"acklund transformation connecting a generic 2D dilaton gravity theory to a generally covariant free field theory. This transformation provides an explicit canonical transformation relating both theories.Comment: LaTeX file, 7 page

    Virasoro Orbits, AdS_3 Quantum Gravity and Entropy

    Get PDF
    We analyse the canonical structure of AdS_3 gravity in terms of the coadjoint orbits of the Virasoro group. There is one subset of orbits, associated to BTZ black hole solutions, that can be described by a pair of chiral free fields with a background charge. There is also a second subset of orbits, associated to point-particle solutions, that are described by two pairs of chiral free fields obeying a constraint. All these orbits admit K\"ahler quantization and generate a Hilbert space which, despite of having Δ0(Δˉ0)=0\Delta_0(\bar{\Delta}_0)=0, does not provide the right degeneracy to account for the Bekenstein-Hawking entropy due to the breakdown of modular invariance. Therefore, additional degrees of freedom, reestablishing modular invariance, are necessarily required to properly account for the black hole entropy.Comment: LaTex file, 12 pages. New references adde
    • …
    corecore