40,176 research outputs found

    A proposal for founding mistrustful quantum cryptography on coin tossing

    Full text link
    A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multi-party computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signalling constraints into account. The best that can be hoped for, in general, are quantum protocols computationally secure against quantum attack. I describe here a method for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin tossing protocol. No security proof is attempted, but I sketch reasons why these protocols might resist quantum computational attack.Comment: Title altered in deference to Physical Review's fear of question marks. Published version; references update

    A Fourier approach to cloud motion estimation

    Get PDF
    A Fourier technique is described for estimating cloud motion from pairs of pictures using the phase of the cross spectral density. The method allows motion estimates to be made for individual spatial frequencies, which are related to cloud pattern dimensions. Results obtained are presented and compared with the results of a Fourier domain cross correlation scheme. Using both artificial and real cloud data show that the technique is relatively sensitive to the presence of mixtures of motions, changes in cloud shape, and edge effects

    Beating the PNS attack in practical quantum cryptography

    Full text link
    In practical quantum key distribution, weak coherent state is often used and the channel transmittance can be very small therefore the protocol could be totally insecure under the photon-number-splitting attack. We propose an efficient method to verify the upper bound of the fraction of counts caused by multi-photon pluses transmitted from Alice to Bob, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for decoy pulse. Our verified upper bound is sufficiently tight for QKD with very lossy channel, in both asymptotic case and non-asymptotic case. The coherent states with mean photon number from 0.2 to 0.5 can be used in practical quantum cryptography. We show that so far our protocol is the onlyonly decoy-state protocol that really works for currently existing set-ups.Comment: So far this is the unique decoy-state protocol which really works efficiently in practice. Prior art results are commented in both main context and the Appendi

    Furniture Stability: A Review of Data and Testing Results

    Get PDF
    This report by Kids In Danger (KID) and Shane's Foundation focuses on tip-overs of dressers and chests. ASTM International, which has developed thousands of voluntary industry consensus technical standards, has a standard in place to test furniture stability. However, furniture on the market is not required to conform, resulting in widespread non-compliance. Additionally, these standards are too lenient and require reform, as testing protocols have remained virtually unchanged for over a decade, despite continuing injuries and deaths. Units may pass the standard, but still present a significant risk. KID advocates for a two-pronged approach to decreasing tip-over incidents:Increasing consumer awareness of the danger of furniture tip-overs and knowledge of the actions needed to keep children safe, andImproving furniture stability by strengthening standards, making those standards mandatory and enforceable and promoting changes in furniture design.KID compiled data from incidents reported to the U.S. Consumer Product Safety Commission (CPSC) by various sources and from the National Electronic Injury Surveillance System (NEISS). These include reports from January 1, 2010 to October 14, 2015. Findings of the data analysis include:Two-year-olds are the age group most affected by tip-overs, especially in regard to fatal incidents.Children age 2 to 5 accounted for 77% of total incidents.The age range of children injured is wider than the age range of children killed by tip-overs.Fatalities accounted for 12% of total incidents.Head injuries (37%) were the most common category of injury.Almost all (98.7%) of head injuries are related to a television tipping over on a child.KID conducted performance tests on a sample of 19 dressers and chests. Testing was run at the UL Furniture Center of Excellence in Holland, Michigan. UL laboratory technicians followed a testing protocol developed by KID. The protocol included tests based on the current voluntary standard for furniture stability. KID added tests that, among other things, evaluated for tip-overs when more weight was added (simulating larger children), drawers were full of clothes, furniture was placed on carpeting as opposed to bare flooring, televisions were placed on top of the furniture, and additional drawers were opened simultaneous with weighting one drawer. These additional tests were intended to be more representative of real-world scenarios.Test results include:Only nine of the 19 units passed performance tests based on the current tip-over safety standard, ASTM F2057.Only two units passed all tests, including the additional testing protocols added by KID.The weight of a television or any type placed on top of the unit did not decrease the stability of furniture.Furniture placed on carpet is less stable than furniture placed on hard floors.Many units remained stable when more than 70 pounds was placed on an open drawer, while others tipped with less than half that weight

    Detection of low energy single ion impacts in micron scale transistors at room temperature

    Get PDF
    We report the detection of single ion impacts through monitoring of changes in the source-drain currents of field effect transistors (FET) at room temperature. Implant apertures are formed in the interlayer dielectrics and gate electrodes of planar, micro-scale FETs by electron beam assisted etching. FET currents increase due to the generation of positively charged defects in gate oxides when ions (121Sb12+, 14+, Xe6+; 50 to 70 keV) impinge into channel regions. Implant damage is repaired by rapid thermal annealing, enabling iterative cycles of device doping and electrical characterization for development of single atom devices and studies of dopant fluctuation effects

    Similarity transformations approach for a generalized Fokker-Planck equation

    Get PDF
    By using similarity transformations approach, the exact propagator for a generalized one-dimensional Fokker-Planck equation, with linear drift force and space-time dependent diffusion coefficient, is obtained. The method is simple and enables us to recover and generalize special cases studied through the Lie algebraic approach and the Green function technique.Comment: 8 pages, no figure

    Insecurity of position-based quantum cryptography protocols against entanglement attacks

    Full text link
    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. In contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate at most 85%. We conjecture that the modified protocol is unconditionally secure and prove this to be true when the shared quantum resource between the adversaries is a two- or three- level system

    On the communication cost of entanglement transformations

    Get PDF
    We study the amount of communication needed for two parties to transform some given joint pure state into another one, either exactly or with some fidelity. Specifically, we present a method to lower bound this communication cost even when the amount of entanglement does not increase. Moreover, the bound applies even if the initial state is supplemented with unlimited entanglement in the form of EPR pairs, and the communication is allowed to be quantum mechanical. We then apply the method to the determination of the communication cost of asymptotic entanglement concentration and dilution. While concentration is known to require no communication whatsoever, the best known protocol for dilution, discovered by Lo and Popescu [Phys. Rev. Lett. 83(7):1459--1462, 1999], requires a number of bits to be exchanged which is of the order of the square root of the number of EPR pairs. Here we prove a matching lower bound of the same asymptotic order, demonstrating the optimality of the Lo-Popescu protocol up to a constant factor and establishing the existence of a fundamental asymmetry between the concentration and dilution tasks. We also discuss states for which the minimal communication cost is proportional to their entanglement, such as the states recently introduced in the context of ``embezzling entanglement'' [W. van Dam and P. Hayden, quant-ph/0201041].Comment: 9 pages, 1 figure. Added a reference and some further explanations. In v3 some arguments are given in more detai
    • …
    corecore