20,627 research outputs found

    Two monotonic functions involving gamma function and volume of unit ball

    Full text link
    In present paper, we prove the monotonicity of two functions involving the gamma function Γ(x)\Gamma(x) and relating to the nn-dimensional volume of the unit ball Bn\mathbb{B}^n in Rn\mathbb{R}^n.Comment: 7 page

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    Probing Spatial Variation Of The Fine-Structure Constant Using The CMB

    Get PDF
    The fine-structure constant, α, controls the strength of the electromagnetic interaction. There are extensions of the standard model in which α is dynamical on cosmological length and time scales. The physics of the cosmic microwave background (CMB) depends on the value of α. The effects of spatial variation in α on the CMB are similar to those produced by weak lensing: smoothing of the power spectrum, and generation of non-Gaussian features. These would induce a bias to estimates of the weak-lensing potential power spectrum of the CMB. Using this effect, Planck measurements of the temperature and polarization power spectrum, as well as estimates of CMB lensing, are used to place limits (95% C.L.) on the amplitude of a scale-invariant angular power spectrum of α fluctuations relative to the mean value (CαL=AαSI/[L(L+1)]) of AαSI≤1.6×10−5. The limits depend on the assumed shape of the α-fluctuation power spectrum. For example, for a white-noise angular power spectrum (CαL=AαWN), the limit is AαWN≤2.3×10−8. It is found that the response of the CMB to α fluctuations depends on a separate-universe approximation, such that theoretical predictions are only reliable for α multipoles with L≲100. An optimal trispectrum estimator can be constructed and it is found that it is only marginally more sensitive than lensing techniques for Planck but significantly more sensitive when considering the next generation of experiments. For a future CMB experiment with cosmic-variance limited polarization sensitivity (e.g., CMB-S4), the optimal estimator could detect α fluctuations with AαSI\u3e1.9×10−6 and AαWN\u3e1.4×10−9

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Full text link
    Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we experimentally demonstrate a technically feasible "intercept-and-resend" attack that exploits such a security loophole in a commercial "plug & play" QKD system. The resulting quantum bit error rate is 19.7%, which is below the proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314, 2007) proposed by our group.Comment: 16 pages, 6 figure

    Generation of GHZ entangled states of photons in multiple cavities via a superconducting qutrit or an atom through resonant interaction

    Full text link
    We propose an efficient method to generate a GHZ entangled state of n photons in n microwave cavities (or resonators) via resonant interaction to a single superconducting qutrit. The deployment of a qutrit, instead of a qubit, as the coupler enables us to use resonant interactions exclusively for all qutrit-cavity and qutrit-pulse operations. This unique approach significantly shortens the time of operation which is advantageous to reducing the adverse effects of qutrit decoherence and cavity decay on fidelity of the protocol. Furthermore, the protocol involves no measurement on either the state of qutrit or cavity photons. We also show that the protocol can be generalized to other systems by replacing the superconducting qutrit coupler with different types of physical qutrit, such as an atom in the case of cavity QED, to accomplish the same task.Comment: 11 pages, 5 figures, accepted by Phys. Rev.

    Precision measurement of charge number with optomechanically induced transparency

    Full text link
    We propose a potentially practical scheme to precisely measure the charge numbers of small charged objects by optomechanical systems using optomechanically induced transparency (OMIT). In contrast to the conventional measurements based on the noise backaction on the optomechanical systems, our scheme makes use of the small deformation of the mechanical resonator sensitive to the charge number of the nearby charged object, which could achieve the detection of a single charge. The relationship between the charge number and the window width of the OMIT is investigated and the feasibility of the scheme is justified by numerical simulation using currently available experimental values.Comment: 6 pages,4 figure

    Side-channel-free quantum key distribution

    Get PDF
    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.Comment: Considering general quantum systems, we extended QKD to the presence of an untrusted relay, whose measurement creates secret correlations in remote stations (achievable rate lower-bounded by the coherent information). This key ingredient, i.e., the use of a measurement-based untrusted relay, has been called 'measurement-device independence' in another arXiv submission (arXiv:1109.1473
    • …
    corecore