11,243 research outputs found

    Secret key distillation from shielded two-qubit states

    Full text link
    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.Comment: 5 page

    Quantum Key Distribution Using Quantum Faraday Rotators

    Full text link
    We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of the Faraday rotators. The protocol is unconditionally secure against collective attacks for multi-photon source up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology on semiconductors.Comment: 7 pages, 7 EPS figure

    Secrecy content of two-qubit states

    Get PDF
    We analyze the set of two-qubit states from which a secret key can be extracted by single-copy measurements plus classical processing of the outcomes. We introduce a key distillation protocol and give the corresponding necessary and sufficient condition for positive key extraction. Our results imply that the critical error rate derived by Chau, Phys. Rev. A {\bf 66}, 060302 (2002), for a secure key distribution using the six-state scheme is tight. Remarkably, an optimal eavesdropping attack against this protocol does not require any coherent quantum operation.Comment: 5 pages, RevTe

    Extending the Real-Time Maude Semantics of Ptolemy to Hierarchical DE Models

    Full text link
    This paper extends our Real-Time Maude formalization of the semantics of flat Ptolemy II discrete-event (DE) models to hierarchical models, including modal models. This is a challenging task that requires combining synchronous fixed-point computations with hierarchical structure. The synthesis of a Real-Time Maude verification model from a Ptolemy II DE model, and the formal verification of the synthesized model in Real-Time Maude, have been integrated into Ptolemy II, enabling a model-engineering process that combines the convenience of Ptolemy II DE modeling and simulation with formal verification in Real-Time Maude.Comment: In Proceedings RTRTS 2010, arXiv:1009.398

    Quantum mechanics emerges from information theory applied to causal horizons

    Full text link
    It is suggested that quantum mechanics is not fundamental but emerges from classical information theory applied to causal horizons. The path integral quantization and quantum randomness can be derived by considering information loss of fields or particles crossing Rindler horizons for accelerating observers. This implies that information is one of the fundamental roots of all physical phenomena. The connection between this theory and Verlinde's entropic gravity theory is also investigated.Comment: REvtex4-1, 6pages, 2 figures, final versio

    Key distillation from quantum channels using two-way communication protocols

    Get PDF
    We provide a general formalism to characterize the cryptographic properties of quantum channels in the realistic scenario where the two honest parties employ prepare and measure protocols and the known two-way communication reconciliation techniques. We obtain a necessary and sufficient condition to distill a secret key using this type of schemes for Pauli qubit channels and generalized Pauli channels in higher dimension. Our results can be applied to standard protocols such as BB84 or six-state, giving a critical error rate of 20% and 27.6%, respectively. We explore several possibilities to enlarge these bounds, without any improvement. These results suggest that there may exist weakly entangling channels useless for key distribution using prepare and measure schemes.Comment: 21 page

    Subthreshold characteristics of pentacene field-effect transistors influenced by grain boundaries.

    Get PDF
    Grain boundaries in polycrystalline pentacene films significantly affect the electrical characteristics of pentacene field-effect transistors (FETs). Upon reversal of the gate voltage sweep direction, pentacene FETs exhibited hysteretic behaviours in the subthreshold region, which was more pronounced for the FET having smaller pentacene grains. No shift in the flat-band voltage of the metal-insulator-semiconductor capacitor elucidates that the observed hysteresis was mainly caused by the influence of localized trap states existing at pentacene grain boundaries. From the results of continuous on/off switching operation of the pentacene FETs, hole depletion during the off period is found to be limited by pentacene grain boundaries. It is suggested that the polycrystalline nature of a pentacene film plays an important role on the dynamic characteristics of pentacene FETs

    Effects of 3D-printed polycaprolactone/��-tricalcium phosphate membranes on guided bone regeneration

    Get PDF
    This study was conducted to compare 3D-printed polycaprolactone (PCL) and polycaprolactone/��-tricalcium phosphate (PCL/��-TCP) membranes with a conventional commercial collagen membrane in terms of their abilities to facilitate guided bone regeneration (GBR). Fabricated membranes were tested for dry and wet mechanical properties. Fibroblasts and preosteoblasts were seeded into the membranes and rates and patterns of proliferation were analyzed using a kit-8 assay and by scanning electron microscopy. Osteogenic differentiation was verified by alizarin red S and alkaline phosphatase (ALP) staining. An in vivo experiment was performed using an alveolar bone defect beagle model, in which defects in three dogs were covered with different membranes. CT and histological analyses at eight weeks after surgery revealed that 3D-printed PCL/��-TCP membranes were more effective than 3D-printed PCL, and substantially better than conventional collagen membranes in terms of biocompatibility and bone regeneration and, thus, at facilitating GBR. ? 2017 by the authors. Licensee MDPI, Basel, Switzerland.118Ysciescopu

    Unusual Higgs or Supersymmetry from Natural Electroweak Symmetry Breaking

    Full text link
    This review provides an elementary discussion of electroweak symmetry breaking in the minimal and the next-to-minimal supersymmetric models with the focus on the fine-tuning problem -- the tension between natural electroweak symmetry breaking and the direct search limit on the Higgs boson mass. Two generic solutions of the fine-tuning problem are discussed in detail: models with unusual Higgs decays; and models with unusual pattern of soft supersymmetry breaking parameters.Comment: 23 pages, 6 figures; invited review by MPL
    corecore