82,063 research outputs found
Composable security of delegated quantum computation
Delegating difficult computations to remote large computation facilities,
with appropriate security guarantees, is a possible solution for the
ever-growing needs of personal computing power. For delegated computation
protocols to be usable in a larger context---or simply to securely run two
protocols in parallel---the security definitions need to be composable. Here,
we define composable security for delegated quantum computation. We distinguish
between protocols which provide only blindness---the computation is hidden from
the server---and those that are also verifiable---the client can check that it
has received the correct result. We show that the composable security
definition capturing both these notions can be reduced to a combination of
several distinct "trace-distance-type" criteria---which are, individually,
non-composable security definitions.
Additionally, we study the security of some known delegated quantum
computation protocols, including Broadbent, Fitzsimons and Kashefi's Universal
Blind Quantum Computation protocol. Even though these protocols were originally
proposed with insufficient security criteria, they turn out to still be secure
given the stronger composable definitions.Comment: 37+9 pages, 13 figures. v3: minor changes, new references. v2:
extended the reduction between composable and local security to include
entangled inputs, substantially rewritten the introduction to the Abstract
Cryptography (AC) framewor
Spooky Action at a Distance
This article studies quantum mechanical entanglement. We begin by
illustrating why entanglement implies action at a distance. We then introduce a
simple criterion for determining when a pure quantum state is entangled.
Finally, we present a measure for the amount of entanglement for a pure state.Comment: A survey of entanglement for students and general reader. 13 page
Topologically Alice Strings and Monopoles
Symmetry breaking can produce ``Alice'' strings, which alter scattered
charges and carry monopole number and charge when twisted into loops. Alice
behavior arises algebraically, when strings obstruct unbroken symmetries -- a
fragile criterion. We give a topological criterion, compelling Alice behavior
or deforming it away. Our criterion, that \pi_o(H) acts nontrivially on
\pi_1(H), links topologically Alice strings to topological monopoles. We twist
topologically Alice loops to form monopoles. We show that Alice strings of
condensed matter systems (nematic liquid crystals, helium 3A, and related
non-chiral Bose condensates and amorphous chiral superconductors) are
topologically Alice, and support fundamental monopole charge when twisted into
loops. Thus they might be observed indirectly, not as strings, but as loop-like
point defects. We describe other models, showing Alice strings failing our
topological criterion; and twisted Alice loops supporting deposited, but not
fundamental, monopole number.Comment: 2 figures; this paper consolidates preprints hep-th/0304161 and
hep-th/0304162, to appear in Phys. Rev.
Quantum Communications Based on Quantum Hashing
In this paper we consider an application of the recently proposed quantum
hashing technique for computing Boolean functions in the quantum communication
model. The combination of binary functions on non-binary quantum hash function
is done via polynomial presentation, which we have called a characteristic of a
Boolean function. Based on the characteristic polynomial presentation of
Boolean functions and quantum hashing technique we present a method for
computing Boolean functions in the quantum one-way communication model, where
one of the parties performs his computations and sends a message to the other
party, who must output the result after his part of computations. Some of the
results are also true in a more restricted Simultaneous Message Passing model
with no shared resources, in which communicating parties can interact only via
the referee. We give several examples of Boolean functions whose polynomial
presentations have specific properties allowing for construction of quantum
communication protocols that are provably exponentially better than classical
ones in the simultaneous message passing setting
First LHC results on coherent J/psi photoproduction in ultra-peripheral Pb-Pb collisions at sqrt{s_NN} = 2.76 TeV
The first LHC measurement on ultra-peripheral heavy-ion collisions was
carried out with the ALICE experiment. In this paper, ALICE results on
exclusive J/psi studies in Pb-Pb collisions at sqrt(s_NN) = 2.76 TeV, in the
rapidity region -3.6 < y < -2.6, are given. The coherent J/psi cross section
was found to be dsigma/dy_coh_J/\psi = 1.00 +/- 0.18 (stat) +0.24 -0.26 (syst)
mb. These studies favour theoretical models that include strong modifications
to the nuclear gluon density, also known as nuclear gluon shadowing.Comment: Presented at DIFFRACTION 2012: International Workshop on Diffraction
in High-Energy Physics. Puerto del Carmen, Canary Islands, 10-15 September
201
- …