5,468 research outputs found

    Secret key generation from Gaussian sources using lattice hashing

    Full text link
    We propose a simple yet complete lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves strong secret key rates up to 1/2 nat from the optimal in the case of "degraded" source models. The novel ingredient of our scheme is a lattice-hashing technique, based on the notions of flatness factor and channel intrinsic randomness. The proposed scheme does not require dithering.Comment: 5 pages, Conference (ISIT 2013

    The Harris-Luck criterion for random lattices

    Get PDF
    The Harris-Luck criterion judges the relevance of (potentially) spatially correlated, quenched disorder induced by, e.g., random bonds, randomly diluted sites or a quasi-periodicity of the lattice, for altering the critical behavior of a coupled matter system. We investigate the applicability of this type of criterion to the case of spin variables coupled to random lattices. Their aptitude to alter critical behavior depends on the degree of spatial correlations present, which is quantified by a wandering exponent. We consider the cases of Poissonian random graphs resulting from the Voronoi-Delaunay construction and of planar, ``fat'' ϕ3\phi^3 Feynman diagrams and precisely determine their wandering exponents. The resulting predictions are compared to various exact and numerical results for the Potts model coupled to these quenched ensembles of random graphs.Comment: 13 pages, 9 figures, 2 tables, REVTeX 4. Version as published, one figure added for clarification, minor re-wordings and typo cleanu

    Exact location of the multicritical point for finite-dimensional spin glasses: A conjecture

    Full text link
    We present a conjecture on the exact location of the multicritical point in the phase diagram of spin glass models in finite dimensions. By generalizing our previous work, we combine duality and gauge symmetry for replicated random systems to derive formulas which make it possible to understand all the relevant available numerical results in a unified way. The method applies to non-self-dual lattices as well as to self dual cases, in the former case of which we derive a relation for a pair of values of multicritical points for mutually dual lattices. The examples include the +-J and Gaussian Ising spin glasses on the square, hexagonal and triangular lattices, the Potts and Z_q models with chiral randomness on these lattices, and the three-dimensional +-J Ising spin glass and the random plaquette gauge model.Comment: 27 pages, 3 figure

    A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

    Get PDF
    Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation. We construct a round-optimal (2 rounds) universally composable (UC) protocol for oblivious transfer secure against active adaptive adversaries from any OW-CPA secure public-key encryption scheme with certain properties in the random oracle model (ROM). In terms of computation, our protocol only requires the generation of a public/secret-key pair, two encryption operations and one decryption operation, apart from a few calls to the random oracle. In~terms of communication, our protocol only requires the transfer of one public-key, two ciphertexts, and three binary strings of roughly the same size as the message. Next, we show how to instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE, and CDH assumptions. Our instantiations based on the low noise LPN, McEliece, and QC-MDPC assumptions are the first UC-secure OT protocols based on coding assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3) low communication and computational complexities. Previous results in this setting only achieved static security and used costly cut-and-choose techniques.Our instantiation based on CDH achieves adaptive security at the small cost of communicating only two more group elements as compared to the gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which only achieves static security in the ROM

    Locations of multicritical points for spin glasses on regular lattices

    Full text link
    We present an analysis leading to precise locations of the multicritical points for spin glasses on regular lattices. The conventional technique for determination of the location of the multicritical point was previously derived using a hypothesis emerging from duality and the replica method. In the present study, we propose a systematic technique, by an improved technique, giving more precise locations of the multicritical points on the square, triangular, and hexagonal lattices by carefully examining relationship between two partition functions related with each other by the duality. We can find that the multicritical points of the ±J\pm J Ising model are located at pc=0.890813p_c = 0.890813 on the square lattice, where pcp_c means the probability of Jij=J(>0)J_{ij} = J(>0), at pc=0.835985p_c = 0.835985 on the triangular lattice, and at pc=0.932593p_c = 0.932593 on the hexagonal lattice. These results are in excellent agreement with recent numerical estimations.Comment: 17pages, this is the published version with some minnor corrections. Previous title was "Precise locations of multicritical points for spin glasses on regular lattices

    Quantum logic is undecidable

    Full text link
    We investigate the first-order theory of closed subspaces of complex Hilbert spaces in the signature (,,0,1)(\lor,\perp,0,1), where `\perp' is the orthogonality relation. Our main result is that already its quasi-identities are undecidable: there is no algorithm to decide whether an implication between equations and orthogonality relations implies another equation. This is a corollary of a recent result of Slofstra in combinatorial group theory. It follows upon reinterpreting that result in terms of the hypergraph approach to quantum contextuality, for which it constitutes a proof of the inverse sandwich conjecture. It can also be interpreted as stating that a certain quantum satisfiability problem is undecidable.Comment: 11 pages. v3: improved exposition. v4: minor clarification
    corecore