21,977 research outputs found

    Erasure Correction for Noisy Radio Networks

    Get PDF
    The radio network model is a well-studied model of wireless, multi-hop networks. However, radio networks make the strong assumption that messages are delivered deterministically. The recently introduced noisy radio network model relaxes this assumption by dropping messages independently at random. In this work we quantify the relative computational power of noisy radio networks and classic radio networks. In particular, given a non-adaptive protocol for a fixed radio network we show how to reliably simulate this protocol if noise is introduced with a multiplicative cost of poly(log Delta, log log n) rounds where n is the number nodes in the network and Delta is the max degree. Moreover, we demonstrate that, even if the simulated protocol is not non-adaptive, it can be simulated with a multiplicative O(Delta log ^2 Delta) cost in the number of rounds. Lastly, we argue that simulations with a multiplicative overhead of o(log Delta) are unlikely to exist by proving that an Omega(log Delta) multiplicative round overhead is necessary under certain natural assumptions

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Seeing double with K2: Testing re-inflation with two remarkably similar planets around red giant branch stars

    Get PDF
    Despite more than 20 years since the discovery of the first gas giant planet with an anomalously large radius, the mechanism for planet inflation remains unknown. Here, we report the discovery of EPIC228754001.01, an inflated gas giant planet found with the NASA K2 Mission, and a revised mass for another inflated planet, K2-97b. These planets reside on ~9 day orbits around host stars which recently evolved into red giants. We constrain the irradiation history of these planets using models constrained by asteroseismology and Keck/HIRES spectroscopy and radial velocity measurements. We measure planet radii of 1.31 +\- 0.11 Rjup and and 1.30 +\- 0.07 Rjup, respectively. These radii are typical for planets receiving the current irradiation, but not the former, zero age main sequence irradiation of these planets. This suggests that the current sizes of these planets are directly correlated to their current irradiation. Our precise constraints of the masses and radii of the stars and planets in these systems allow us to constrain the planetary heating efficiency of both systems as 0.03% +0.03%/-0.02%. These results are consistent with a planet re-inflation scenario, but suggest the efficiency of planet re-inflation may be lower than previously theorized. Finally, we discuss the agreement within 10% of stellar masses and radii, and planet masses, radii, and orbital periods of both systems and speculate that this may be due to selection bias in searching for planets around evolved stars.Comment: 18 pages, 15 figures, accepted to AJ. Figures 11, 12, and 13 are the key figures of the pape

    Practical quantum key distribution over a 48-km optical fiber network

    Full text link
    The secure distribution of the secret random bit sequences known as "key" material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg's uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. Here we report the most recent results of our optical fiber experiment in which we have performed quantum key distribution over a 48-km optical fiber network at Los Alamos using photon interference states with the B92 and BB84 quantum key distribution protocols.Comment: 13 pages, 7 figures, .pdf format submitted to Journal of Modern Optic

    A luminous blue kilonova and an off-axis jet from a compact binary merger at z=0.1341

    Get PDF
    The recent discovery of a faint gamma-ray burst (GRB) coincident with the gravitational wave (GW) event GW 170817 revealed the existence of a population of low-luminosity short duration gamma-ray transients produced by neutron star mergers in the nearby Universe. These events could be routinely detected by existing gamma-ray monitors, yet previous observations failed to identify them without the aid of GW triggers. Here we show that GRB150101B was an analogue of GRB170817A located at a cosmological distance. GRB 150101B was a faint short duration GRB characterized by a bright optical counterpart and a long-lived X-ray afterglow. These properties are unusual for standard short GRBs and are instead consistent with an explosion viewed off-axis: the optical light is produced by a luminous kilonova component, while the observed X-rays trace the GRB afterglow viewed at an angle of ~13 degrees. Our findings suggest that these properties could be common among future electromagnetic counterparts of GW sources.Comment: 28 pages, 8 figures, 2 tables. Accepted for publicatio

    NMR Quantum Computation

    Get PDF
    In this article I will describe how NMR techniques may be used to build simple quantum information processing devices, such as small quantum computers, and show how these techniques are related to more conventional NMR experiments.Comment: Pedagogical mini review of NMR QC aimed at NMR folk. Commissioned by Progress in NMR Spectroscopy (in press). 30 pages RevTex including 15 figures (4 low quality postscript images

    Mapping DSP algorithms to a reconfigurable architecture Adaptive Wireless Networking (AWGN)

    Get PDF
    This report will discuss the Adaptive Wireless Networking project. The vision of the Adaptive Wireless Networking project will be given. The strategy of the project will be the implementation of multiple communication systems in dynamically reconfigurable heterogeneous hardware. An overview of a wireless LAN communication system, namely HiperLAN/2, and a Bluetooth communication system will be given. Possible implementations of these systems in a dynamically reconfigurable architecture are discussed. Suggestions for future activities in the Adaptive Wireless Networking project are also given
    corecore