21,977 research outputs found
Erasure Correction for Noisy Radio Networks
The radio network model is a well-studied model of wireless, multi-hop networks. However, radio networks make the strong assumption that messages are delivered deterministically. The recently introduced noisy radio network model relaxes this assumption by dropping messages independently at random.
In this work we quantify the relative computational power of noisy radio networks and classic radio networks. In particular, given a non-adaptive protocol for a fixed radio network we show how to reliably simulate this protocol if noise is introduced with a multiplicative cost of poly(log Delta, log log n) rounds where n is the number nodes in the network and Delta is the max degree. Moreover, we demonstrate that, even if the simulated protocol is not non-adaptive, it can be simulated with a multiplicative O(Delta log ^2 Delta) cost in the number of rounds. Lastly, we argue that simulations with a multiplicative overhead of o(log Delta) are unlikely to exist by proving that an Omega(log Delta) multiplicative round overhead is necessary under certain natural assumptions
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break
Quantum Key Distribution (QKD) protocols which employ a particular message
authentication code suggested previously. This authentication code, featuring
low key consumption, is not Information-Theoretically Secure (ITS) since for
each message the eavesdropper has intercepted she is able to send a different
message from a set of messages that she can calculate by finding collisions of
a cryptographic hash function. However, when this authentication code was
introduced it was shown to prevent straightforward Man-In-The-Middle (MITM)
attacks against QKD protocols.
In this paper, we prove that the set of messages that collide with any given
message under this authentication code contains with high probability a message
that has small Hamming distance to any other given message. Based on this fact
we present extended MITM attacks against different versions of BB84 QKD
protocols using the addressed authentication code; for three protocols we
describe every single action taken by the adversary. For all protocols the
adversary can obtain complete knowledge of the key, and for most protocols her
success probability in doing so approaches unity.
Since the attacks work against all authentication methods which allow to
calculate colliding messages, the underlying building blocks of the presented
attacks expose the potential pitfalls arising as a consequence of non-ITS
authentication in QKD-postprocessing. We propose countermeasures, increasing
the eavesdroppers demand for computational power, and also prove necessary and
sufficient conditions for upgrading the discussed authentication code to the
ITS level.Comment: 34 page
Seeing double with K2: Testing re-inflation with two remarkably similar planets around red giant branch stars
Despite more than 20 years since the discovery of the first gas giant planet
with an anomalously large radius, the mechanism for planet inflation remains
unknown. Here, we report the discovery of EPIC228754001.01, an inflated gas
giant planet found with the NASA K2 Mission, and a revised mass for another
inflated planet, K2-97b. These planets reside on ~9 day orbits around host
stars which recently evolved into red giants. We constrain the irradiation
history of these planets using models constrained by asteroseismology and
Keck/HIRES spectroscopy and radial velocity measurements. We measure planet
radii of 1.31 +\- 0.11 Rjup and and 1.30 +\- 0.07 Rjup, respectively. These
radii are typical for planets receiving the current irradiation, but not the
former, zero age main sequence irradiation of these planets. This suggests that
the current sizes of these planets are directly correlated to their current
irradiation. Our precise constraints of the masses and radii of the stars and
planets in these systems allow us to constrain the planetary heating efficiency
of both systems as 0.03% +0.03%/-0.02%. These results are consistent with a
planet re-inflation scenario, but suggest the efficiency of planet re-inflation
may be lower than previously theorized. Finally, we discuss the agreement
within 10% of stellar masses and radii, and planet masses, radii, and orbital
periods of both systems and speculate that this may be due to selection bias in
searching for planets around evolved stars.Comment: 18 pages, 15 figures, accepted to AJ. Figures 11, 12, and 13 are the
key figures of the pape
Practical quantum key distribution over a 48-km optical fiber network
The secure distribution of the secret random bit sequences known as "key"
material, is an essential precursor to their use for the encryption and
decryption of confidential communications. Quantum cryptography is a new
technique for secure key distribution with single-photon transmissions:
Heisenberg's uncertainty principle ensures that an adversary can neither
successfully tap the key transmissions, nor evade detection (eavesdropping
raises the key error rate above a threshold value). We have developed
experimental quantum cryptography systems based on the transmission of
non-orthogonal photon states to generate shared key material over
multi-kilometer optical fiber paths and over line-of-sight links. In both
cases, key material is built up using the transmission of a single-photon per
bit of an initial secret random sequence. A quantum-mechanically random subset
of this sequence is identified, becoming the key material after a data
reconciliation stage with the sender. Here we report the most recent results of
our optical fiber experiment in which we have performed quantum key
distribution over a 48-km optical fiber network at Los Alamos using photon
interference states with the B92 and BB84 quantum key distribution protocols.Comment: 13 pages, 7 figures, .pdf format submitted to Journal of Modern
Optic
A luminous blue kilonova and an off-axis jet from a compact binary merger at z=0.1341
The recent discovery of a faint gamma-ray burst (GRB) coincident with the
gravitational wave (GW) event GW 170817 revealed the existence of a population
of low-luminosity short duration gamma-ray transients produced by neutron star
mergers in the nearby Universe. These events could be routinely detected by
existing gamma-ray monitors, yet previous observations failed to identify them
without the aid of GW triggers. Here we show that GRB150101B was an analogue of
GRB170817A located at a cosmological distance. GRB 150101B was a faint short
duration GRB characterized by a bright optical counterpart and a long-lived
X-ray afterglow. These properties are unusual for standard short GRBs and are
instead consistent with an explosion viewed off-axis: the optical light is
produced by a luminous kilonova component, while the observed X-rays trace the
GRB afterglow viewed at an angle of ~13 degrees. Our findings suggest that
these properties could be common among future electromagnetic counterparts of
GW sources.Comment: 28 pages, 8 figures, 2 tables. Accepted for publicatio
NMR Quantum Computation
In this article I will describe how NMR techniques may be used to build
simple quantum information processing devices, such as small quantum computers,
and show how these techniques are related to more conventional NMR experiments.Comment: Pedagogical mini review of NMR QC aimed at NMR folk. Commissioned by
Progress in NMR Spectroscopy (in press). 30 pages RevTex including 15 figures
(4 low quality postscript images
Mapping DSP algorithms to a reconfigurable architecture Adaptive Wireless Networking (AWGN)
This report will discuss the Adaptive Wireless Networking project. The vision of the Adaptive Wireless Networking project will be given. The strategy of the project will be the implementation of multiple communication systems in dynamically reconfigurable heterogeneous hardware. An overview of a wireless LAN communication system, namely HiperLAN/2, and a Bluetooth communication system will be given. Possible implementations of these systems in a dynamically reconfigurable architecture are discussed. Suggestions for future activities in the Adaptive Wireless Networking project are also given
- …