2,798 research outputs found

    Exact bond percolation thresholds in two dimensions

    Full text link
    Recent work in percolation has led to exact solutions for the site and bond critical thresholds of many new lattices. Here we show how these results can be extended to other classes of graphs, significantly increasing the number and variety of solved problems. Any graph that can be decomposed into a certain arrangement of triangles, which we call self-dual, gives a class of lattices whose percolation thresholds can be found exactly by a recently introduced triangle-triangle transformation. We use this method to generalize Wierman's solution of the bow-tie lattice to yield several new solutions. We also give another example of a self-dual arrangement of triangles that leads to a further class of solvable problems. There are certainly many more such classes.Comment: Accepted for publication in J. Phys

    Unconditionally verifiable blind computation

    Get PDF
    Blind Quantum Computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol, or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. The authors, together with Broadbent, previously proposed a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with new functionality allowing blind computational basis measurements, which we use to construct a new verifiable BQC protocol based on a new class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. The new resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest neighbour form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.Comment: 46 pages, 10 figures. Additional protocol added which allows arbitrary circuits to be verified with polynomial securit

    Percolative shunting on electrified surface

    Full text link
    The surface discharge of electrified dielectrics at high humidity is considered. The percolative nature of charge transport in electrets is established. Particular attention is given to the phenomena of adsorption and nucleation of electrically conducting phase in the cause of percolation cluster growth on electrified surface. The critical index of the correlation lenght for percolation cluster is found, and its value is in good agreement with the known theoretical estimations.Comment: 4 pages with 1 figure, revtex, published in Tech. Phys. Lett. 25 (1999) 877-879 with one additional figur

    Survival of microencapsulated probiotic Lactobacillus paracasei LBC-1e during manufacture of Mozzarellacheese and simulated gastric digestion

    Get PDF
    An erythromycin-resistant strain of probiotic Lactobacillus paracasei ssp. paracasei LBC-1 (LBC-1e) was added to part-skim Mozzarella cheese in alginate-microencapsulated or free form at a level of 108 and 107 cfu/g, respectively. Survival of LBC-1e and total lactic acid bacteria (LAB) was investigated through the pasta filata process of cheese making (in which the cheese curd was heated to 55°C and stretched in 70°C-hot brine), followed by storage at 4°C for 6 wk and simulated gastric and intestinal digestion. This included incubation in 0.1 M and 0.01 M HCl, 0.9 M H3PO4, and a simulated intestinal juice consisting of pancreatin and bile salts in a pH 7.4 phosphate buffer. Some reductions were observed in both free and encapsulated LBC-1e during heating and stretching, with encapsulated LBC-1e surviving slightly better. Changes in total LAB losses during heating and stretching did not reach statistical significance. During storage, a decrease was observed in total LAB, but no statistically significant decrease was observed in LBC-1e. Survival during gastric digestion in HCl was dependent on the extent of neutralization of HCl by the cheese, with more survival in the weaker acid, in which pH increased to 4.4 after cheese addition. The alginate microcapsules did not provide any protection against the HCl. It is interesting that survival of the encapsulated LBC-1e was greater during incubation in H3PO4 than in the HCl gastric juices. Proper selection of simulated gastric digestion media is important for predicting the delivery of probiotic bacteria into the human intestinal tract. Neither free nor encapsulated LBC-1e was affected by incubation in the pancreatin-bile solution. Based on the level of probiotic bacteria in cheese needed to provide a health benefit and its survival during simulated gastric digestion, as determined in this study, it should theoretically be possible to lower the amount that needs to be ingested in cheese by up to a factor of 103 compared with other fermented dairy foods or when consumed as supplements

    Non-adaptive Measurement-based Quantum Computation and Multi-party Bell Inequalities

    Full text link
    Quantum correlations exhibit behaviour that cannot be resolved with a local hidden variable picture of the world. In quantum information, they are also used as resources for information processing tasks, such as Measurement-based Quantum Computation (MQC). In MQC, universal quantum computation can be achieved via adaptive measurements on a suitable entangled resource state. In this paper, we look at a version of MQC in which we remove the adaptivity of measurements and aim to understand what computational abilities still remain in the resource. We show that there are explicit connections between this model of computation and the question of non-classicality in quantum correlations. We demonstrate this by focussing on deterministic computation of Boolean functions, in which natural generalisations of the Greenberger-Horne-Zeilinger (GHZ) paradox emerge; we then explore probabilistic computation, via which multipartite Bell Inequalities can be defined. We use this correspondence to define families of multi-party Bell inequalities, which we show to have a number of interesting contrasting properties.Comment: 13 pages, 4 figures, final version accepted for publicatio

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code
    corecore