10,467 research outputs found

    Security of Plug-and-Play QKD Arrangements with Finite Resources

    Get PDF
    The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship

    Low-complexity Multiclass Encryption by Compressed Sensing

    Get PDF
    The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security may seem compromised by the linearity of its encoding process. In this paper we apply this simple encoding to define a general private-key encryption scheme in which a transmitter distributes the same encoded measurements to receivers of different classes, which are provided partially corrupted encoding matrices and are thus allowed to decode the acquired signal at provably different levels of recovery quality. The security properties of this scheme are thoroughly analysed: firstly, the properties of our multiclass encryption are theoretically investigated by deriving performance bounds on the recovery quality attained by lower-class receivers with respect to high-class ones. Then we perform a statistical analysis of the measurements to show that, although not perfectly secure, compressed sensing grants some level of security that comes at almost-zero cost and thus may benefit resource-limited applications. In addition to this we report some exemplary applications of multiclass encryption by compressed sensing of speech signals, electrocardiographic tracks and images, in which quality degradation is quantified as the impossibility of some feature extraction algorithms to obtain sensitive information from suitably degraded signal recoveries.Comment: IEEE Transactions on Signal Processing, accepted for publication. Article in pres

    Accuracy requirements to test the applicability of the random cascade model to supersonic turbulence

    Full text link
    A model, which is widely used for inertial rang statistics of supersonic turbulence in the context of molecular clouds and star formation, expresses (measurable) relative scaling exponents Z_p of two-point velocity statistics as a function of two parameters, beta and Delta. The model relates them to the dimension D of the most dissipative structures, D=3-Delta/(1-beta). While this description has proved most successful for incompressible turbulence (beta=Delta=2/3, and D=1), its applicability in the highly compressible regime remains debated. For this regime, theoretical arguments suggest D=2 and Delta=2/3, or Delta=1. Best estimates based on 3D periodic box simulations of supersonic isothermal turbulence yield Delta=0.71 and D=1.9, with uncertainty ranges of Delta in [0.67, 0.78] and D in [2.04,1.60]. With these 5-10\% uncertainty ranges just marginally including the theoretical values of Delta=2/3 and D=2, doubts remain whether the model indeed applies and, if it applies, for what values of beta and Delta. We use a Monte Carlo approach to mimic actual simulation data and examine what factors are most relevant for the fit quality. We estimate that 0.1% (0.05%) accurate Z_p, with p=1...5, should allow for 2% (1%) accurate estimates of beta and Delta in the highly compressible regime, but not in the mildly compressible regime. We argue that simulation-based Z_p with such accuracy are within reach of today's computer resources. If this kind of data does not allow for the expected high quality fit of beta and Delta, then this may indicate the inapplicability of the model for the simulation data. In fact, other models than the one we examine here have been suggested.Comment: 8 pages, 8 figures, accepted by Astronomy and Astrophysic

    Programmable coherent linear quantum operations with high-dimensional optical spatial modes

    Get PDF
    A simple and flexible scheme for high-dimensional linear quantum operations on optical transverse spatial modes is demonstrated. The quantum Fourier transformation (QFT) and quantum state tomography (QST) via symmetric informationally complete positive operator-valued measures (SIC POVMs) are implemented with dimensionality of 15. The matrix fidelity of QFT is 0.85, while the statistical fidelity of SIC POVMs and fidelity of QST are ~0.97 and up to 0.853, respectively. We believe that our device has the potential for further exploration of high-dimensional spatial entanglement provided by spontaneous parametric down conversion in nonlinear crystals
    • …
    corecore