5,468 research outputs found
Secret key generation from Gaussian sources using lattice hashing
We propose a simple yet complete lattice-based scheme for secret key
generation from Gaussian sources in the presence of an eavesdropper, and show
that it achieves strong secret key rates up to 1/2 nat from the optimal in the
case of "degraded" source models. The novel ingredient of our scheme is a
lattice-hashing technique, based on the notions of flatness factor and channel
intrinsic randomness. The proposed scheme does not require dithering.Comment: 5 pages, Conference (ISIT 2013
The Harris-Luck criterion for random lattices
The Harris-Luck criterion judges the relevance of (potentially) spatially
correlated, quenched disorder induced by, e.g., random bonds, randomly diluted
sites or a quasi-periodicity of the lattice, for altering the critical behavior
of a coupled matter system. We investigate the applicability of this type of
criterion to the case of spin variables coupled to random lattices. Their
aptitude to alter critical behavior depends on the degree of spatial
correlations present, which is quantified by a wandering exponent. We consider
the cases of Poissonian random graphs resulting from the Voronoi-Delaunay
construction and of planar, ``fat'' Feynman diagrams and precisely
determine their wandering exponents. The resulting predictions are compared to
various exact and numerical results for the Potts model coupled to these
quenched ensembles of random graphs.Comment: 13 pages, 9 figures, 2 tables, REVTeX 4. Version as published, one
figure added for clarification, minor re-wordings and typo cleanu
Exact location of the multicritical point for finite-dimensional spin glasses: A conjecture
We present a conjecture on the exact location of the multicritical point in
the phase diagram of spin glass models in finite dimensions. By generalizing
our previous work, we combine duality and gauge symmetry for replicated random
systems to derive formulas which make it possible to understand all the
relevant available numerical results in a unified way. The method applies to
non-self-dual lattices as well as to self dual cases, in the former case of
which we derive a relation for a pair of values of multicritical points for
mutually dual lattices. The examples include the +-J and Gaussian Ising spin
glasses on the square, hexagonal and triangular lattices, the Potts and Z_q
models with chiral randomness on these lattices, and the three-dimensional +-J
Ising spin glass and the random plaquette gauge model.Comment: 27 pages, 3 figure
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a
number of applications, in particular, as an essential building block for
two-party and multi-party computation. We construct a round-optimal (2 rounds)
universally composable (UC) protocol for oblivious transfer secure against
active adaptive adversaries from any OW-CPA secure public-key encryption scheme
with certain properties in the random oracle model (ROM). In terms of
computation, our protocol only requires the generation of a public/secret-key
pair, two encryption operations and one decryption operation, apart from a few
calls to the random oracle. In~terms of communication, our protocol only
requires the transfer of one public-key, two ciphertexts, and three binary
strings of roughly the same size as the message. Next, we show how to
instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE,
and CDH assumptions. Our instantiations based on the low noise LPN, McEliece,
and QC-MDPC assumptions are the first UC-secure OT protocols based on coding
assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3)
low communication and computational complexities. Previous results in this
setting only achieved static security and used costly cut-and-choose
techniques.Our instantiation based on CDH achieves adaptive security at the
small cost of communicating only two more group elements as compared to the
gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which
only achieves static security in the ROM
Locations of multicritical points for spin glasses on regular lattices
We present an analysis leading to precise locations of the multicritical
points for spin glasses on regular lattices. The conventional technique for
determination of the location of the multicritical point was previously derived
using a hypothesis emerging from duality and the replica method. In the present
study, we propose a systematic technique, by an improved technique, giving more
precise locations of the multicritical points on the square, triangular, and
hexagonal lattices by carefully examining relationship between two partition
functions related with each other by the duality. We can find that the
multicritical points of the Ising model are located at
on the square lattice, where means the probability of ,
at on the triangular lattice, and at on the
hexagonal lattice. These results are in excellent agreement with recent
numerical estimations.Comment: 17pages, this is the published version with some minnor corrections.
Previous title was "Precise locations of multicritical points for spin
glasses on regular lattices
Quantum logic is undecidable
We investigate the first-order theory of closed subspaces of complex Hilbert
spaces in the signature , where `' is the
orthogonality relation. Our main result is that already its quasi-identities
are undecidable: there is no algorithm to decide whether an implication between
equations and orthogonality relations implies another equation. This is a
corollary of a recent result of Slofstra in combinatorial group theory. It
follows upon reinterpreting that result in terms of the hypergraph approach to
quantum contextuality, for which it constitutes a proof of the inverse sandwich
conjecture. It can also be interpreted as stating that a certain quantum
satisfiability problem is undecidable.Comment: 11 pages. v3: improved exposition. v4: minor clarification
- …