7,758 research outputs found

    Duality of privacy amplification against quantum adversaries and data compression with quantum side information

    Full text link
    We show that the tasks of privacy amplification against quantum adversaries and data compression with quantum side information are dual in the sense that the ability to perform one implies the ability to perform the other. These are two of the most important primitives in classical information theory, and are shown to be connected by complementarity and the uncertainty principle in the quantum setting. Applications include a new uncertainty principle formulated in terms of smooth min- and max-entropies, as well as new conditions for approximate quantum error correction.Comment: v2: Includes a derivation of an entropic uncertainty principle for smooth min- and max-entropies. Discussion of the Holevo-Schumacher-Westmoreland theorem remove

    Detection of Laplace-resonant three-planet systems from transit timing variations

    Get PDF
    Transit timing variations (TTVs) are useful to constrain the existence of perturbing planets, especially in resonant systems where the variations are strongly enhanced. Here we focus on Laplace-resonant three-planet systems, and assume the inner planet transits the star. A dynamical study is performed for different masses of the three bodies, with a special attention to terrestrial planets. We consider a maximal time-span of ~ 100 years and discuss the shape of the inner planet TTVs curve. Using frequency analysis, we highlight the three periods related to the evolution of the system: two periods associated with the Laplace-resonant angle and the third one with the precession of the pericenters. These three periods are clearly detected in the TTVs of an inner giant planet perturbed by two terrestrial companions. Only two periods are detected for a Jupiter-Jupiter-Earth configuration (the ones associated with the giant interactions) or for three terrestrial planets (the Laplace periods). However, the latter system can be constrained from the inner planet TTVs. We finally remark that the TTVs of resonant three or two Jupiter systems mix up, when the period of the Laplace resonant angle matches the pericenter precession of the two-body configuration. This study highlights the importance of TTVs long-term observational programs for the detection of multiple-planet resonant systems.Comment: 8 pages, 8 figures, accepted in MNRA

    The chaetognatha of the Eastropic Expedition, with notes as to their possible value as indicators of hydrographic conditions

    Get PDF
    ENGLISH: The purpose of this study was to investigate the possibility that certain species of Chaetognatha found in Eastern Tropical Pacific waters can serve as biological indicators of oceanographic features. "Indicator" organisms have been found useful in identifying water types, in tracing the pattern of current systems, and in tracing the origin of moving water masses. To be of use in this type of study, the organisms must be sufficiently abundant to be readily sampled, and easily identified to species; they must also, at least partially, fulfill the additional requisites listed and discussed by Sverdrup, Johnson, and Fleming (1942, pp. 866-867). Among several groups of organisms fulfilling these requirements are the Chaetognatha. Specimens of this group of animals occurred in large numbers in the plankton samples used for this study. The works of Thomson (1947), Fraser (1942), Ritter-Zahony (1911), and Sund (1959) were used for identification. SPANISH: El objetivo de este estudio ha sido el de investigar la posibilidad de utilizar ciertas especies de quetognatos encontrados en el Pacífico Oriental Tropical como indicadoras biológicas de características oceanográficas. Organismos "indicadores" fueron encontrados útiles para la identificación de tipos de agua, el trazado del régimen de los sistemas de corrientes y la determinación del origen de masas de agua en movimiento. Para servir a este tipo de estudios, los organismos deben ser lo suficientemente abundantes como para ser fácilmente muestreados e identificados hasta la especie; también deben satisfacer, por lo menos parcialmente, los requerimientos indicados y discutidos par Sverdrup, Johnson y Fleming (1942, pags. 866-867)

    Large Hadron Collider constraints on a light baryon number violating sbottom coupling to a top and a light quark

    Get PDF
    We investigate a model of R-parity violating (RPV) supersymmetry in which the right-handed sbottom is the lightest supersymmetric particle, and a baryon number violating coupling involving a top is the only non-negligible RPV coupling. This model evades proton decay and flavour constraints. We consider in turn each of the couplings lambda"_{313} and lambda"_{323} as the only non-negligible RPV coupling, and we recast two recent Large Hadron Collider (LHC) measurements and searches (CMS top transverse momentum p_T(t) spectrum and ATLAS multiple jet resonance search) in the form of constraints on the mass-coupling parameter planes. We delineate a large region in the parameter space of the mass of the sbottom (m_{b_R}) and the lambda"_{313} coupling that is ruled out by the measurements, as well as a smaller region in the parameter space of m_{b_R} and lambda"_{323}. A certain region of the m_{b_R}-lambda"_{313} parameter space was previously found to successfully explain the anomalously large ttbar forward backward asymmetry measured by Tevatron experiments. The entire region is excluded at the 95% CL by CMS measurements of the top p_T spectrum. We also present p_T(ttbar) distributions of the forward-backward asymmetry for this model.Comment: 9 pages, 9 figures. v2 has minor corrections, in part due to extra diagrams at order alpha_s^2 lamba''^

    Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"

    Get PDF
    Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"Comment: 2 pages, 1 figur

    Linear flavour violation and anomalies in B physics

    Get PDF
    We propose renormalizable models of new physics that can explain various anomalies observed in decays of B-mesons to electron and muon pairs. The new physics states couple to linear combinations of Standard Model fermions, yielding a pattern of flavour violation that gives a consistent fit to the gamut of flavour data. Accidental symmetries prevent contributions to baryon- and lepton-number-violating processes, as well as enforcing a loop suppression of new physics contributions to flavour violating processes. Data require that the new flavour-breaking couplings are largely aligned with the Yukawa couplings of the SM and so we also explore patterns of flavour symmetry breaking giving rise to this structure.Comment: v2: 28 pages, 10 figures. Added two appendices to make the SU(2) structure of the model clearer, and to discuss Z/photon penguin contributions. Updated a bound on Bs mixing, and added references. Conclusions unchanged. Version to appear in JHE

    Hint of Lepton Flavour Non-Universality in BB Meson Decays

    Get PDF
    The LHCb collaboration has recently presented their result on R_K = BR(B+ -> K+ mu+ mu-)/ BR(B+ -> K+ e+ e-) for the dilepton invariant mass bin m_{ll}^2 = 1-6 GeV^2 (l = mu, e). The measurement shows an intriguing 2.6 sigma deviation from the Standard Model (SM) prediction. In view of this, we study model independent New Physics (NP) explanations of R_K consistent with other measurements involving b -> s l l transition, relaxing the assumption of lepton universality. We perform a Bayesian statistical fit to the NP Wilson Coefficients and compare the Bayes Factors of the different hypotheses in order to quantify their goodness-of-fit. We show that the data slightly favours NP in the muon sector over NP in the electron sector.Comment: Final version, to appear in JHE

    An information-theoretic security proof for QKD protocols

    Full text link
    We present a new technique for proving the security of quantum key distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the BB84, the six-state, and the B92 protocol with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.Comment: 18 pages, 3 figure

    Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    Full text link
    Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al. applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits for clarit
    • …
    corecore