2,458 research outputs found

    Quantum protocols for anonymous voting and surveying

    Get PDF
    We describe quantum protocols for voting and surveying. A key feature of our schemes is the use of entangled states to ensure that the votes are anonymous and to allow the votes to be tallied. The entanglement is distributed over separated sites; the physical inaccessibility of any one site is sufficient to guarantee the anonymity of the votes. The security of these protocols with respect to various kinds of attack is discussed. We also discuss classical schemes and show that our quantum voting protocol represents a N-fold reduction in computational complexity, where N is the number of voters.Comment: 8 pages. V2 includes the modifications made for the published versio

    Absorption spectra of Fe L-lines in Seyfert 1 galaxies

    Full text link
    Absorption L-lines of iron ions are observed, in absorption, in spectra of Seyfert 1 galaxies by the new generation of X-ray satellites: Chandra (NASA) and XMM-Newton (ESA). Lines associated to Fe23+ to Fe17+ are well resolved. Whereas, those corresponding to Fe16+ to Fe6+ are unresolved. Forbidden transitions of the Fe16+ to Fe6+ ions were previously observed, for the same objects, in the visible and infra-red regions, showing that the plasma had a low density. To interpret X-ray, visible and infra-red data, astrophysical models assume an extended absorbing medium of very low density surrounding an intense X-ray source. We have calculated atomic data (wavelengths, radiative and autoionization rates) for n=2 to n'=3-4 transitions and used them to construct refined synthetic spectra of the unresolved part of the L-line spectra.Comment: 17 pages, 5 figures, Journal of Quantitative Spectroscopy and Radiative Transfer, in pres

    Resolved 24.5 micron emission from massive young stellar objects

    Full text link
    Massive young stellar objects (MYSO) are surrounded by massive dusty envelopes. Our aim is to establish their density structure on scales of ~1000 AU, i.e. a factor 10 increase in angular resolution compared to similar studies performed in the (sub)mm. We have obtained diffraction-limited (0.6") 24.5 micron images of 14 well-known massive star formation regions with Subaru/COMICS. The images reveal the presence of discrete MYSO sources which are resolved on arcsecond scales. For many sources, radiative transfer models are capable of satisfactorily reproducing the observations. They are described by density powerlaw distributions (n(r) ~ r^(-p)) with p = 1.0 +/-0.25. Such distributions are shallower than those found on larger scales probed with single-dish (sub)mm studies. Other sources have density laws that are shallower/steeper than p = 1.0 and there is evidence that these MYSOs are viewed near edge-on or near face-on, respectively. The images also reveal a diffuse component tracing somewhat larger scale structures, particularly visible in the regions S140, AFGL 2136, IRAS 20126+4104, Mon R2, and Cep A. We thus find a flattening of the MYSO envelope density law going from ~10 000 AU down to scales of ~1000 AU. We propose that this may be evidence of rotational support of the envelope (abridged).Comment: 21 pages, accepted for A&

    Polar Field Reversal Observations with Hinode

    Full text link
    We have been monitoring yearly variation in the Sun's polar magnetic fields with the Solar Optical Telescope aboard {\it Hinode} to record their evolution and expected reversal near the solar maximum. All magnetic patches in the magnetic flux maps are automatically identified to obtain the number density and magnetic flux density as a function of th total magnetic flux per patch. The detected magnetic flux per patch ranges over four orders of magnitude (101510^{15} -- 102010^{20} Mx). The higher end of the magnetic flux in the polar regions is about one order of magnitude larger than that of the quiet Sun, and nearly that of pores. Almost all large patches (≥1018 \geq 10^{18} Mx) have the same polarity, while smaller patches have a fair balance of both polarities. The polarity of the polar region as a whole is consequently determined only by the large magnetic concentrations. A clear decrease in the net flux of the polar region is detected in the slow rising phase of the current solar cycle. The decrease is more rapid in the north polar region than in the south. The decrease in the net flux is caused by a decrease in the number and size of the large flux concentrations as well as the appearance of patches with opposite polarity at lower latitudes. In contrast, we do not see temporal change in the magnetic flux associated with the smaller patches (<1018 < 10^{18} Mx) and that of the horizontal magnetic fields during the years 2008--2012.Comment: 21 pages, 7 figures. Accepted for publication in Ap

    Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols

    Full text link
    Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum's work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make - especially if the mail system cannot be trusted. When conspiring with the recipient of the cast ballots, privacy is broken. It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. This emphasizes the importance of using: (1) Unconditional security for secure network communication. (2) Reduce reliance on untrusted computers. In this paper we explore how to remove the mail system trust assumption in code voting. We use PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod  10\mod 10 addition correctly with a 99\% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems. Given that end users of our proposed voting scheme construction are humans we \emph{cannot use} classical Secure Multi Party Computation protocols. Our solutions are for both single and multi-seat elections achieving: \begin{enumerate}[i)] \item An anonymous and perfectly secure communication network secure against a tt-bounded passive adversary used to deliver voting, \item The end step of the protocol can be handled by a human to evade the threat of malware. \end{enumerate} We do not focus on active adversaries
    • …
    corecore