1,808 research outputs found
Characterization of Collective Gaussian Attacks and Security of Coherent-State Quantum Cryptography
We provide a simple description of the most general collective Gaussian
attack in continuous-variable quantum cryptography. In the scenario of such
general attacks, we analyze the asymptotic secret-key rates which are
achievable with coherent states, joint measurements of the quadratures and
one-way classical communication.Comment: 4 pages, 1 figure + 1 Table, REVteX. More descriptive titl
Generalized relation between the relative entropy and dissipation for nonequilibrium systems
Recently, Kawai, Parrondo, and Van den Broeck have related dissipation to
time-reversal asymmetry. We generalized the result by considering a protocol
where the physical system is driven away from an initial thermal equilibrium
state with temperature to a final thermal equilibrium state at a
different temperature. We illustrate the result using a model with an exact
solution, i.e., a particle in a moving one-dimensional harmonic well.Comment: 4 page
Sky maps without anisotropies in the cosmic microwave background are a better fit to WMAP's uncalibrated time ordered data than the official sky maps
The purpose of this reanalysis of the WMAP uncalibrated time ordered data
(TOD) was two fold. The first was to reassess the reliability of the detection
of the anisotropies in the official WMAP sky maps of the cosmic microwave
background (CMB). The second was to assess the performance of a proposed
criterion in avoiding systematic error in detecting a signal of interest. The
criterion was implemented by testing the null hypothesis that the uncalibrated
TOD was consistent with no anisotropies when WMAP's hourly calibration
parameters were allowed to vary. It was shown independently for all 20 WMAP
channels that sky maps with no anisotropies were a better fit to the TOD than
those from the official analysis. The recently launched Planck satellite should
help sort out this perplexing result.Comment: 11 pages with 1 figure and 2 tables. Extensively rewritten to explain
the research bette
Note on exponential families of distributions
We show that an arbitrary probability distribution can be represented in
exponential form. In physical contexts, this implies that the equilibrium
distribution of any classical or quantum dynamical system is expressible in
grand canonical form.Comment: 5 page
Parameter estimation in pair hidden Markov models
This paper deals with parameter estimation in pair hidden Markov models
(pair-HMMs). We first provide a rigorous formalism for these models and discuss
possible definitions of likelihoods. The model being biologically motivated,
some restrictions with respect to the full parameter space naturally occur.
Existence of two different Information divergence rates is established and
divergence property (namely positivity at values different from the true one)
is shown under additional assumptions. This yields consistency for the
parameter in parametrization schemes for which the divergence property holds.
Simulations illustrate different cases which are not covered by our results.Comment: corrected typo
How much measurement independence is needed in order to demonstrate nonlocality?
If nonlocality is to be inferred from a violation of Bell's inequality, an
important assumption is that the measurement settings are freely chosen by the
observers, or alternatively, that they are random and uncorrelated with the
hypothetical local variables. We study the case where this assumption is
weakened, so that measurement settings and local variables are at least
partially correlated. As we show, there is a connection between this type of
model and models which reproduce nonlocal correlations by allowing classical
communication between the distant parties, and a connection with models that
exploit the detection loophole. We show that even if Bob's choices are
completely independent, all correlations obtained from projective measurements
on a singlet can be reproduced, with the correlation (measured by mutual
information) between Alice's choice and local variables less than or equal to a
single bit.Comment: 5 pages, 1 figure. v2 Various improvements in presentation. Results
unchange
A Statistical Mechanical Load Balancer for the Web
The maximum entropy principle from statistical mechanics states that a closed
system attains an equilibrium distribution that maximizes its entropy. We first
show that for graphs with fixed number of edges one can define a stochastic
edge dynamic that can serve as an effective thermalization scheme, and hence,
the underlying graphs are expected to attain their maximum-entropy states,
which turn out to be Erdos-Renyi (ER) random graphs. We next show that (i) a
rate-equation based analysis of node degree distribution does indeed confirm
the maximum-entropy principle, and (ii) the edge dynamic can be effectively
implemented using short random walks on the underlying graphs, leading to a
local algorithm for the generation of ER random graphs. The resulting
statistical mechanical system can be adapted to provide a distributed and local
(i.e., without any centralized monitoring) mechanism for load balancing, which
can have a significant impact in increasing the efficiency and utilization of
both the Internet (e.g., efficient web mirroring), and large-scale computing
infrastructure (e.g., cluster and grid computing).Comment: 11 Pages, 5 Postscript figures; added references, expanded on
protocol discussio
Is a multiple excitation of a single atom equivalent to a single excitation of an ensemble of atoms?
Recent technological advances have enabled to isolate, control and measure
the properties of a single atom, leading to the possibility to perform
statistics on the behavior of single quantum systems. These experiments have
enabled to check a question which was out of reach previously: Is the
statistics of a repeatedly excitation of an atom N times equivalent to a single
excitation of an ensemble of N atoms? We present a new method to analyze
quantum measurements which leads to the postulation that the answer is most
probably no. We discuss the merits of the analysis and its conclusion.Comment: 3 pages, 3 figure
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing
We derive a bound for the security of QKD with finite resources under one-way
post-processing, based on a definition of security that is composable and has
an operational meaning. While our proof relies on the assumption of collective
attacks, unconditional security follows immediately for standard protocols like
Bennett-Brassard 1984 and six-states. For single-qubit implementations of such
protocols, we find that the secret key rate becomes positive when at least
N\sim 10^5 signals are exchanged and processed. For any other discrete-variable
protocol, unconditional security can be obtained using the exponential de
Finetti theorem, but the additional overhead leads to very pessimistic
estimates
- …