82,063 research outputs found

    Composable security of delegated quantum computation

    Full text link
    Delegating difficult computations to remote large computation facilities, with appropriate security guarantees, is a possible solution for the ever-growing needs of personal computing power. For delegated computation protocols to be usable in a larger context---or simply to securely run two protocols in parallel---the security definitions need to be composable. Here, we define composable security for delegated quantum computation. We distinguish between protocols which provide only blindness---the computation is hidden from the server---and those that are also verifiable---the client can check that it has received the correct result. We show that the composable security definition capturing both these notions can be reduced to a combination of several distinct "trace-distance-type" criteria---which are, individually, non-composable security definitions. Additionally, we study the security of some known delegated quantum computation protocols, including Broadbent, Fitzsimons and Kashefi's Universal Blind Quantum Computation protocol. Even though these protocols were originally proposed with insufficient security criteria, they turn out to still be secure given the stronger composable definitions.Comment: 37+9 pages, 13 figures. v3: minor changes, new references. v2: extended the reduction between composable and local security to include entangled inputs, substantially rewritten the introduction to the Abstract Cryptography (AC) framewor

    Spooky Action at a Distance

    Get PDF
    This article studies quantum mechanical entanglement. We begin by illustrating why entanglement implies action at a distance. We then introduce a simple criterion for determining when a pure quantum state is entangled. Finally, we present a measure for the amount of entanglement for a pure state.Comment: A survey of entanglement for students and general reader. 13 page

    Topologically Alice Strings and Monopoles

    Full text link
    Symmetry breaking can produce ``Alice'' strings, which alter scattered charges and carry monopole number and charge when twisted into loops. Alice behavior arises algebraically, when strings obstruct unbroken symmetries -- a fragile criterion. We give a topological criterion, compelling Alice behavior or deforming it away. Our criterion, that \pi_o(H) acts nontrivially on \pi_1(H), links topologically Alice strings to topological monopoles. We twist topologically Alice loops to form monopoles. We show that Alice strings of condensed matter systems (nematic liquid crystals, helium 3A, and related non-chiral Bose condensates and amorphous chiral superconductors) are topologically Alice, and support fundamental monopole charge when twisted into loops. Thus they might be observed indirectly, not as strings, but as loop-like point defects. We describe other models, showing Alice strings failing our topological criterion; and twisted Alice loops supporting deposited, but not fundamental, monopole number.Comment: 2 figures; this paper consolidates preprints hep-th/0304161 and hep-th/0304162, to appear in Phys. Rev.

    Quantum Communications Based on Quantum Hashing

    Get PDF
    In this paper we consider an application of the recently proposed quantum hashing technique for computing Boolean functions in the quantum communication model. The combination of binary functions on non-binary quantum hash function is done via polynomial presentation, which we have called a characteristic of a Boolean function. Based on the characteristic polynomial presentation of Boolean functions and quantum hashing technique we present a method for computing Boolean functions in the quantum one-way communication model, where one of the parties performs his computations and sends a message to the other party, who must output the result after his part of computations. Some of the results are also true in a more restricted Simultaneous Message Passing model with no shared resources, in which communicating parties can interact only via the referee. We give several examples of Boolean functions whose polynomial presentations have specific properties allowing for construction of quantum communication protocols that are provably exponentially better than classical ones in the simultaneous message passing setting

    First LHC results on coherent J/psi photoproduction in ultra-peripheral Pb-Pb collisions at sqrt{s_NN} = 2.76 TeV

    Full text link
    The first LHC measurement on ultra-peripheral heavy-ion collisions was carried out with the ALICE experiment. In this paper, ALICE results on exclusive J/psi studies in Pb-Pb collisions at sqrt(s_NN) = 2.76 TeV, in the rapidity region -3.6 < y < -2.6, are given. The coherent J/psi cross section was found to be dsigma/dy_coh_J/\psi = 1.00 +/- 0.18 (stat) +0.24 -0.26 (syst) mb. These studies favour theoretical models that include strong modifications to the nuclear gluon density, also known as nuclear gluon shadowing.Comment: Presented at DIFFRACTION 2012: International Workshop on Diffraction in High-Energy Physics. Puerto del Carmen, Canary Islands, 10-15 September 201
    • …
    corecore