7,758 research outputs found
Duality of privacy amplification against quantum adversaries and data compression with quantum side information
We show that the tasks of privacy amplification against quantum adversaries
and data compression with quantum side information are dual in the sense that
the ability to perform one implies the ability to perform the other. These are
two of the most important primitives in classical information theory, and are
shown to be connected by complementarity and the uncertainty principle in the
quantum setting. Applications include a new uncertainty principle formulated in
terms of smooth min- and max-entropies, as well as new conditions for
approximate quantum error correction.Comment: v2: Includes a derivation of an entropic uncertainty principle for
smooth min- and max-entropies. Discussion of the
Holevo-Schumacher-Westmoreland theorem remove
Detection of Laplace-resonant three-planet systems from transit timing variations
Transit timing variations (TTVs) are useful to constrain the existence of
perturbing planets, especially in resonant systems where the variations are
strongly enhanced. Here we focus on Laplace-resonant three-planet systems, and
assume the inner planet transits the star. A dynamical study is performed for
different masses of the three bodies, with a special attention to terrestrial
planets. We consider a maximal time-span of ~ 100 years and discuss the shape
of the inner planet TTVs curve. Using frequency analysis, we highlight the
three periods related to the evolution of the system: two periods associated
with the Laplace-resonant angle and the third one with the precession of the
pericenters. These three periods are clearly detected in the TTVs of an inner
giant planet perturbed by two terrestrial companions. Only two periods are
detected for a Jupiter-Jupiter-Earth configuration (the ones associated with
the giant interactions) or for three terrestrial planets (the Laplace periods).
However, the latter system can be constrained from the inner planet TTVs. We
finally remark that the TTVs of resonant three or two Jupiter systems mix up,
when the period of the Laplace resonant angle matches the pericenter precession
of the two-body configuration. This study highlights the importance of TTVs
long-term observational programs for the detection of multiple-planet resonant
systems.Comment: 8 pages, 8 figures, accepted in MNRA
The chaetognatha of the Eastropic Expedition, with notes as to their possible value as indicators of hydrographic conditions
ENGLISH: The purpose of this study was to investigate the possibility that certain species of Chaetognatha found in Eastern Tropical Pacific waters can serve as biological indicators of oceanographic features. "Indicator" organisms have been found useful in identifying water types, in tracing the pattern of current systems, and in tracing the origin of moving water masses. To be of use in this type of study, the organisms must be sufficiently abundant to be readily sampled, and easily identified to species; they must also, at least partially, fulfill the additional requisites listed and discussed by Sverdrup, Johnson, and Fleming (1942, pp. 866-867). Among several groups of organisms fulfilling these requirements are the Chaetognatha. Specimens of this group of animals occurred in large numbers in the plankton samples used for this study. The works of Thomson (1947), Fraser (1942), Ritter-Zahony (1911), and Sund (1959) were used for identification.
SPANISH: El objetivo de este estudio ha sido el de investigar la posibilidad de utilizar ciertas especies de quetognatos encontrados en el PacĂfico Oriental Tropical como indicadoras biolĂłgicas de caracterĂsticas oceanográficas. Organismos "indicadores" fueron encontrados Ăştiles para la identificaciĂłn de tipos de agua, el trazado del rĂ©gimen de los sistemas de corrientes y la determinaciĂłn del origen de masas de agua en movimiento. Para servir a este tipo de estudios, los organismos deben ser lo suficientemente abundantes como para ser fácilmente muestreados e identificados hasta la especie; tambiĂ©n deben satisfacer, por lo menos parcialmente, los requerimientos indicados y discutidos par Sverdrup, Johnson y Fleming (1942, pags. 866-867)
Large Hadron Collider constraints on a light baryon number violating sbottom coupling to a top and a light quark
We investigate a model of R-parity violating (RPV) supersymmetry in which the
right-handed sbottom is the lightest supersymmetric particle, and a baryon
number violating coupling involving a top is the only non-negligible RPV
coupling. This model evades proton decay and flavour constraints. We consider
in turn each of the couplings lambda"_{313} and lambda"_{323} as the only
non-negligible RPV coupling, and we recast two recent Large Hadron Collider
(LHC) measurements and searches (CMS top transverse momentum p_T(t) spectrum
and ATLAS multiple jet resonance search) in the form of constraints on the
mass-coupling parameter planes. We delineate a large region in the parameter
space of the mass of the sbottom (m_{b_R}) and the lambda"_{313} coupling that
is ruled out by the measurements, as well as a smaller region in the parameter
space of m_{b_R} and lambda"_{323}. A certain region of the
m_{b_R}-lambda"_{313} parameter space was previously found to successfully
explain the anomalously large ttbar forward backward asymmetry measured by
Tevatron experiments. The entire region is excluded at the 95% CL by CMS
measurements of the top p_T spectrum. We also present p_T(ttbar) distributions
of the forward-backward asymmetry for this model.Comment: 9 pages, 9 figures. v2 has minor corrections, in part due to extra
diagrams at order alpha_s^2 lamba''^
Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"
Comment on "Indispensable Finite Time Correlations for Fokker-Planck
Equations from Time Series Data"Comment: 2 pages, 1 figur
Linear flavour violation and anomalies in B physics
We propose renormalizable models of new physics that can explain various
anomalies observed in decays of B-mesons to electron and muon pairs. The new
physics states couple to linear combinations of Standard Model fermions,
yielding a pattern of flavour violation that gives a consistent fit to the
gamut of flavour data. Accidental symmetries prevent contributions to baryon-
and lepton-number-violating processes, as well as enforcing a loop suppression
of new physics contributions to flavour violating processes. Data require that
the new flavour-breaking couplings are largely aligned with the Yukawa
couplings of the SM and so we also explore patterns of flavour symmetry
breaking giving rise to this structure.Comment: v2: 28 pages, 10 figures. Added two appendices to make the SU(2)
structure of the model clearer, and to discuss Z/photon penguin
contributions. Updated a bound on Bs mixing, and added references.
Conclusions unchanged. Version to appear in JHE
Hint of Lepton Flavour Non-Universality in Meson Decays
The LHCb collaboration has recently presented their result on R_K = BR(B+ ->
K+ mu+ mu-)/ BR(B+ -> K+ e+ e-) for the dilepton invariant mass bin m_{ll}^2 =
1-6 GeV^2 (l = mu, e). The measurement shows an intriguing 2.6 sigma deviation
from the Standard Model (SM) prediction. In view of this, we study model
independent New Physics (NP) explanations of R_K consistent with other
measurements involving b -> s l l transition, relaxing the assumption of lepton
universality. We perform a Bayesian statistical fit to the NP Wilson
Coefficients and compare the Bayes Factors of the different hypotheses in order
to quantify their goodness-of-fit. We show that the data slightly favours NP in
the muon sector over NP in the electron sector.Comment: Final version, to appear in JHE
An information-theoretic security proof for QKD protocols
We present a new technique for proving the security of quantum key
distribution (QKD) protocols. It is based on direct information-theoretic
arguments and thus also applies if no equivalent entanglement purification
scheme can be found. Using this technique, we investigate a general class of
QKD protocols with one-way classical post-processing. We show that, in order to
analyze the full security of these protocols, it suffices to consider
collective attacks. Indeed, we give new lower and upper bounds on the
secret-key rate which only involve entropies of two-qubit density operators and
which are thus easy to compute. As an illustration of our results, we analyze
the BB84, the six-state, and the B92 protocol with one-way error correction and
privacy amplification. Surprisingly, the performance of these protocols is
increased if one of the parties adds noise to the measurement data before the
error correction. In particular, this additional noise makes the protocols more
robust against noise in the quantum channel.Comment: 18 pages, 3 figure
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
Device independent quantum key distribution aims to provide a higher degree
of security than traditional QKD schemes by reducing the number of assumptions
that need to be made about the physical devices used. The previous proof of
security by Pironio et al. applies only to collective attacks where the state
is identical and independent and the measurement devices operate identically
for each trial in the protocol. We extend this result to a more general class
of attacks where the state is arbitrary and the measurement devices have no
memory. We accomplish this by a reduction of arbitrary adversary strategies to
qubit strategies and a proof of security for qubit strategies based on the
previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits
for clarit
- …